Warning: Permanently added '[localhost]:2354' (ECDSA) to the list of known hosts. 2021/08/24 04:25:48 fuzzer started 2021/08/24 04:25:48 dialing manager at localhost:35811 2021/08/24 04:25:59 syscalls: 2135 2021/08/24 04:25:59 code coverage: enabled 2021/08/24 04:25:59 comparison tracing: enabled 2021/08/24 04:25:59 extra coverage: enabled 2021/08/24 04:25:59 setuid sandbox: enabled 2021/08/24 04:25:59 namespace sandbox: enabled 2021/08/24 04:25:59 Android sandbox: enabled 2021/08/24 04:25:59 fault injection: enabled 2021/08/24 04:25:59 leak checking: enabled 2021/08/24 04:25:59 net packet injection: enabled 2021/08/24 04:25:59 net device setup: enabled 2021/08/24 04:25:59 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/08/24 04:25:59 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/08/24 04:25:59 USB emulation: enabled 2021/08/24 04:25:59 hci packet injection: enabled 2021/08/24 04:25:59 wifi device emulation: enabled 2021/08/24 04:25:59 802.15.4 emulation: enabled 2021/08/24 04:25:59 fetching corpus: 50, signal 26125/27909 (executing program) 2021/08/24 04:25:59 fetching corpus: 100, signal 39372/42733 (executing program) 2021/08/24 04:25:59 fetching corpus: 150, signal 50827/55623 (executing program) 2021/08/24 04:25:59 fetching corpus: 200, signal 56456/62655 (executing program) 2021/08/24 04:26:00 fetching corpus: 250, signal 59967/67617 (executing program) 2021/08/24 04:26:00 fetching corpus: 300, signal 63429/72414 (executing program) 2021/08/24 04:26:00 fetching corpus: 350, signal 68402/78599 (executing program) 2021/08/24 04:26:00 fetching corpus: 400, signal 71300/82779 (executing program) 2021/08/24 04:26:00 fetching corpus: 450, signal 75375/87990 (executing program) 2021/08/24 04:26:00 fetching corpus: 500, signal 78492/92255 (executing program) 2021/08/24 04:26:00 fetching corpus: 550, signal 80816/95766 (executing program) 2021/08/24 04:26:00 fetching corpus: 600, signal 83007/99101 (executing program) 2021/08/24 04:26:00 fetching corpus: 650, signal 85553/102746 (executing program) 2021/08/24 04:26:00 fetching corpus: 700, signal 87282/105576 (executing program) 2021/08/24 04:26:01 fetching corpus: 750, signal 89589/108922 (executing program) 2021/08/24 04:26:01 fetching corpus: 800, signal 91741/112069 (executing program) 2021/08/24 04:26:01 fetching corpus: 850, signal 93630/114950 (executing program) 2021/08/24 04:26:01 fetching corpus: 900, signal 95012/117375 (executing program) 2021/08/24 04:26:01 fetching corpus: 950, signal 96255/119677 (executing program) 2021/08/24 04:26:01 fetching corpus: 1000, signal 97819/122210 (executing program) 2021/08/24 04:26:01 fetching corpus: 1050, signal 100108/125329 (executing program) 2021/08/24 04:26:01 fetching corpus: 1100, signal 102148/128231 (executing program) 2021/08/24 04:26:01 fetching corpus: 1150, signal 103579/130563 (executing program) 2021/08/24 04:26:01 fetching corpus: 1200, signal 104415/132404 (executing program) 2021/08/24 04:26:02 fetching corpus: 1250, signal 106093/134900 (executing program) 2021/08/24 04:26:02 fetching corpus: 1300, signal 108089/137611 (executing program) 2021/08/24 04:26:02 fetching corpus: 1350, signal 110598/140706 (executing program) 2021/08/24 04:26:02 fetching corpus: 1400, signal 111425/142455 (executing program) 2021/08/24 04:26:02 fetching corpus: 1450, signal 112832/144655 (executing program) 2021/08/24 04:26:02 fetching corpus: 1500, signal 113966/146617 (executing program) 2021/08/24 04:26:02 fetching corpus: 1550, signal 114945/148529 (executing program) 2021/08/24 04:26:02 fetching corpus: 1600, signal 116064/150464 (executing program) 2021/08/24 04:26:02 fetching corpus: 1650, signal 117549/152658 (executing program) 2021/08/24 04:26:02 fetching corpus: 1700, signal 118433/154413 (executing program) 2021/08/24 04:26:03 fetching corpus: 1750, signal 119785/156433 (executing program) 2021/08/24 04:26:03 fetching corpus: 1800, signal 120554/158037 (executing program) 2021/08/24 04:26:03 fetching corpus: 1850, signal 121811/159993 (executing program) 2021/08/24 04:26:03 fetching corpus: 1900, signal 123114/161996 (executing program) 2021/08/24 04:26:03 fetching corpus: 1950, signal 124088/163764 (executing program) 2021/08/24 04:26:03 fetching corpus: 2000, signal 125471/165702 (executing program) 2021/08/24 04:26:03 fetching corpus: 2050, signal 126368/167298 (executing program) 2021/08/24 04:26:03 fetching corpus: 2100, signal 127475/169019 (executing program) 2021/08/24 04:26:03 fetching corpus: 2150, signal 128370/170534 (executing program) 2021/08/24 04:26:04 fetching corpus: 2200, signal 129406/172231 (executing program) 2021/08/24 04:26:04 fetching corpus: 2250, signal 130237/173752 (executing program) 2021/08/24 04:26:04 fetching corpus: 2300, signal 131050/175210 (executing program) 2021/08/24 04:26:04 fetching corpus: 2350, signal 131771/176659 (executing program) 2021/08/24 04:26:04 fetching corpus: 2400, signal 132918/178376 (executing program) 2021/08/24 04:26:04 fetching corpus: 2450, signal 134504/180330 (executing program) 2021/08/24 04:26:04 fetching corpus: 2500, signal 135474/181826 (executing program) 2021/08/24 04:26:04 fetching corpus: 2550, signal 136295/183312 (executing program) 2021/08/24 04:26:04 fetching corpus: 2600, signal 137038/184637 (executing program) 2021/08/24 04:26:04 fetching corpus: 2650, signal 138431/186358 (executing program) 2021/08/24 04:26:05 fetching corpus: 2700, signal 139589/187941 (executing program) 2021/08/24 04:26:05 fetching corpus: 2750, signal 140664/189451 (executing program) 2021/08/24 04:26:05 fetching corpus: 2800, signal 141927/191036 (executing program) 2021/08/24 04:26:05 fetching corpus: 2850, signal 142850/192434 (executing program) 2021/08/24 04:26:05 fetching corpus: 2900, signal 143516/193683 (executing program) 2021/08/24 04:26:05 fetching corpus: 2950, signal 144024/194847 (executing program) 2021/08/24 04:26:05 fetching corpus: 3000, signal 144739/196081 (executing program) 2021/08/24 04:26:05 fetching corpus: 3050, signal 145277/197223 (executing program) 2021/08/24 04:26:05 fetching corpus: 3100, signal 146246/198618 (executing program) 2021/08/24 04:26:05 fetching corpus: 3150, signal 147239/199987 (executing program) 2021/08/24 04:26:05 fetching corpus: 3200, signal 147872/201147 (executing program) 2021/08/24 04:26:06 fetching corpus: 3250, signal 148578/202355 (executing program) 2021/08/24 04:26:06 fetching corpus: 3300, signal 149378/203551 (executing program) 2021/08/24 04:26:06 fetching corpus: 3350, signal 150057/204710 (executing program) 2021/08/24 04:26:06 fetching corpus: 3400, signal 150738/205834 (executing program) 2021/08/24 04:26:06 fetching corpus: 3450, signal 151364/206930 (executing program) 2021/08/24 04:26:06 fetching corpus: 3500, signal 152142/208070 (executing program) 2021/08/24 04:26:06 fetching corpus: 3550, signal 152681/209112 (executing program) 2021/08/24 04:26:06 fetching corpus: 3600, signal 153206/210174 (executing program) 2021/08/24 04:26:06 fetching corpus: 3650, signal 153847/211252 (executing program) 2021/08/24 04:26:06 fetching corpus: 3700, signal 154468/212271 (executing program) 2021/08/24 04:26:06 fetching corpus: 3750, signal 154988/213304 (executing program) 2021/08/24 04:26:07 fetching corpus: 3800, signal 155394/214258 (executing program) 2021/08/24 04:26:07 fetching corpus: 3850, signal 156117/215295 (executing program) 2021/08/24 04:26:07 fetching corpus: 3900, signal 156673/216248 (executing program) 2021/08/24 04:26:07 fetching corpus: 3950, signal 157471/217287 (executing program) 2021/08/24 04:26:07 fetching corpus: 4000, signal 158077/218298 (executing program) 2021/08/24 04:26:07 fetching corpus: 4050, signal 158447/219177 (executing program) 2021/08/24 04:26:07 fetching corpus: 4100, signal 159050/220111 (executing program) 2021/08/24 04:26:07 fetching corpus: 4150, signal 159716/221051 (executing program) 2021/08/24 04:26:07 fetching corpus: 4200, signal 160173/221967 (executing program) 2021/08/24 04:26:07 fetching corpus: 4250, signal 160927/222934 (executing program) 2021/08/24 04:26:08 fetching corpus: 4300, signal 161413/223804 (executing program) 2021/08/24 04:26:08 fetching corpus: 4350, signal 161996/224752 (executing program) 2021/08/24 04:26:08 fetching corpus: 4400, signal 162572/225620 (executing program) 2021/08/24 04:26:08 fetching corpus: 4450, signal 163239/226518 (executing program) 2021/08/24 04:26:08 fetching corpus: 4500, signal 163891/227452 (executing program) 2021/08/24 04:26:08 fetching corpus: 4550, signal 164508/228398 (executing program) 2021/08/24 04:26:08 fetching corpus: 4600, signal 164974/229243 (executing program) 2021/08/24 04:26:08 fetching corpus: 4650, signal 165761/230177 (executing program) 2021/08/24 04:26:08 fetching corpus: 4700, signal 166359/231003 (executing program) 2021/08/24 04:26:09 fetching corpus: 4750, signal 166735/231763 (executing program) 2021/08/24 04:26:09 fetching corpus: 4800, signal 167172/232522 (executing program) 2021/08/24 04:26:09 fetching corpus: 4850, signal 167709/233335 (executing program) 2021/08/24 04:26:09 fetching corpus: 4900, signal 168332/234153 (executing program) 2021/08/24 04:26:09 fetching corpus: 4950, signal 168940/234957 (executing program) 2021/08/24 04:26:09 fetching corpus: 5000, signal 169347/235734 (executing program) 2021/08/24 04:26:09 fetching corpus: 5050, signal 169770/236500 (executing program) 2021/08/24 04:26:09 fetching corpus: 5100, signal 170122/237220 (executing program) 2021/08/24 04:26:09 fetching corpus: 5150, signal 170449/237922 (executing program) 2021/08/24 04:26:09 fetching corpus: 5200, signal 171008/238639 (executing program) 2021/08/24 04:26:09 fetching corpus: 5250, signal 171493/239364 (executing program) 2021/08/24 04:26:09 fetching corpus: 5300, signal 171835/240034 (executing program) 2021/08/24 04:26:10 fetching corpus: 5350, signal 172274/240754 (executing program) 2021/08/24 04:26:10 fetching corpus: 5400, signal 172910/241506 (executing program) 2021/08/24 04:26:10 fetching corpus: 5450, signal 173540/242245 (executing program) 2021/08/24 04:26:10 fetching corpus: 5500, signal 173969/242930 (executing program) 2021/08/24 04:26:10 fetching corpus: 5550, signal 174473/243581 (executing program) 2021/08/24 04:26:10 fetching corpus: 5600, signal 174950/244230 (executing program) 2021/08/24 04:26:10 fetching corpus: 5650, signal 175499/244927 (executing program) 2021/08/24 04:26:10 fetching corpus: 5700, signal 176039/245585 (executing program) 2021/08/24 04:26:10 fetching corpus: 5750, signal 176393/246241 (executing program) 2021/08/24 04:26:10 fetching corpus: 5800, signal 176818/246858 (executing program) 2021/08/24 04:26:11 fetching corpus: 5850, signal 177113/247466 (executing program) 2021/08/24 04:26:11 fetching corpus: 5900, signal 177425/248102 (executing program) 2021/08/24 04:26:11 fetching corpus: 5950, signal 177834/248739 (executing program) 2021/08/24 04:26:11 fetching corpus: 6000, signal 178287/249366 (executing program) 2021/08/24 04:26:11 fetching corpus: 6050, signal 178622/249925 (executing program) 2021/08/24 04:26:11 fetching corpus: 6100, signal 179019/250546 (executing program) 2021/08/24 04:26:11 fetching corpus: 6150, signal 179422/251122 (executing program) 2021/08/24 04:26:11 fetching corpus: 6200, signal 179715/251724 (executing program) 2021/08/24 04:26:11 fetching corpus: 6250, signal 180099/252362 (executing program) 2021/08/24 04:26:11 fetching corpus: 6300, signal 180664/252951 (executing program) 2021/08/24 04:26:12 fetching corpus: 6350, signal 181052/253346 (executing program) 2021/08/24 04:26:12 fetching corpus: 6400, signal 181701/253346 (executing program) 2021/08/24 04:26:12 fetching corpus: 6450, signal 182138/253346 (executing program) 2021/08/24 04:26:12 fetching corpus: 6500, signal 182443/253346 (executing program) 2021/08/24 04:26:12 fetching corpus: 6550, signal 182899/253346 (executing program) 2021/08/24 04:26:12 fetching corpus: 6600, signal 183180/253346 (executing program) 2021/08/24 04:26:12 fetching corpus: 6650, signal 183524/253346 (executing program) 2021/08/24 04:26:12 fetching corpus: 6700, signal 183858/253346 (executing program) 2021/08/24 04:26:12 fetching corpus: 6750, signal 184169/253346 (executing program) 2021/08/24 04:26:12 fetching corpus: 6800, signal 184423/253346 (executing program) 2021/08/24 04:26:12 fetching corpus: 6850, signal 184939/253346 (executing program) 2021/08/24 04:26:13 fetching corpus: 6900, signal 185221/253346 (executing program) 2021/08/24 04:26:13 fetching corpus: 6950, signal 185537/253346 (executing program) 2021/08/24 04:26:13 fetching corpus: 7000, signal 186089/253346 (executing program) 2021/08/24 04:26:13 fetching corpus: 7050, signal 186365/253346 (executing program) 2021/08/24 04:26:13 fetching corpus: 7100, signal 186620/253346 (executing program) 2021/08/24 04:26:13 fetching corpus: 7150, signal 186987/253346 (executing program) 2021/08/24 04:26:13 fetching corpus: 7200, signal 187380/253346 (executing program) 2021/08/24 04:26:13 fetching corpus: 7250, signal 187680/253346 (executing program) 2021/08/24 04:26:13 fetching corpus: 7300, signal 187984/253346 (executing program) 2021/08/24 04:26:13 fetching corpus: 7350, signal 188338/253346 (executing program) 2021/08/24 04:26:13 fetching corpus: 7400, signal 188545/253346 (executing program) 2021/08/24 04:26:14 fetching corpus: 7450, signal 188986/253346 (executing program) 2021/08/24 04:26:14 fetching corpus: 7500, signal 189369/253346 (executing program) 2021/08/24 04:26:14 fetching corpus: 7550, signal 189648/253346 (executing program) 2021/08/24 04:26:14 fetching corpus: 7600, signal 189929/253346 (executing program) 2021/08/24 04:26:14 fetching corpus: 7650, signal 190283/253346 (executing program) 2021/08/24 04:26:14 fetching corpus: 7700, signal 190652/253346 (executing program) 2021/08/24 04:26:14 fetching corpus: 7750, signal 190938/253346 (executing program) 2021/08/24 04:26:14 fetching corpus: 7800, signal 191259/253346 (executing program) 2021/08/24 04:26:14 fetching corpus: 7850, signal 191558/253346 (executing program) 2021/08/24 04:26:14 fetching corpus: 7900, signal 191828/253346 (executing program) 2021/08/24 04:26:14 fetching corpus: 7950, signal 192164/253346 (executing program) 2021/08/24 04:26:15 fetching corpus: 8000, signal 192573/253346 (executing program) 2021/08/24 04:26:15 fetching corpus: 8050, signal 192861/253346 (executing program) 2021/08/24 04:26:15 fetching corpus: 8100, signal 193132/253346 (executing program) 2021/08/24 04:26:15 fetching corpus: 8150, signal 193381/253346 (executing program) 2021/08/24 04:26:15 fetching corpus: 8200, signal 193775/253346 (executing program) 2021/08/24 04:26:15 fetching corpus: 8250, signal 194171/253346 (executing program) 2021/08/24 04:26:15 fetching corpus: 8300, signal 194484/253346 (executing program) 2021/08/24 04:26:15 fetching corpus: 8350, signal 194755/253346 (executing program) 2021/08/24 04:26:15 fetching corpus: 8400, signal 195051/253346 (executing program) 2021/08/24 04:26:15 fetching corpus: 8450, signal 195373/253346 (executing program) 2021/08/24 04:26:16 fetching corpus: 8500, signal 195776/253346 (executing program) 2021/08/24 04:26:16 fetching corpus: 8550, signal 196004/253346 (executing program) 2021/08/24 04:26:16 fetching corpus: 8600, signal 196380/253346 (executing program) 2021/08/24 04:26:16 fetching corpus: 8650, signal 196653/253346 (executing program) 2021/08/24 04:26:16 fetching corpus: 8700, signal 196963/253346 (executing program) 2021/08/24 04:26:16 fetching corpus: 8750, signal 197345/253346 (executing program) 2021/08/24 04:26:16 fetching corpus: 8800, signal 197667/253346 (executing program) 2021/08/24 04:26:16 fetching corpus: 8850, signal 197929/253346 (executing program) 2021/08/24 04:26:16 fetching corpus: 8900, signal 198128/253346 (executing program) 2021/08/24 04:26:16 fetching corpus: 8950, signal 198407/253346 (executing program) 2021/08/24 04:26:17 fetching corpus: 9000, signal 198802/253346 (executing program) 2021/08/24 04:26:17 fetching corpus: 9050, signal 199097/253346 (executing program) 2021/08/24 04:26:17 fetching corpus: 9100, signal 199452/253346 (executing program) 2021/08/24 04:26:17 fetching corpus: 9150, signal 199818/253346 (executing program) 2021/08/24 04:26:17 fetching corpus: 9200, signal 200075/253346 (executing program) 2021/08/24 04:26:17 fetching corpus: 9250, signal 200461/253346 (executing program) 2021/08/24 04:26:17 fetching corpus: 9300, signal 200669/253346 (executing program) 2021/08/24 04:26:17 fetching corpus: 9350, signal 201164/253346 (executing program) 2021/08/24 04:26:17 fetching corpus: 9400, signal 201658/253346 (executing program) 2021/08/24 04:26:17 fetching corpus: 9450, signal 201858/253346 (executing program) 2021/08/24 04:26:17 fetching corpus: 9500, signal 202122/253347 (executing program) 2021/08/24 04:26:17 fetching corpus: 9550, signal 202339/253348 (executing program) 2021/08/24 04:26:18 fetching corpus: 9600, signal 202611/253348 (executing program) 2021/08/24 04:26:18 fetching corpus: 9650, signal 202912/253348 (executing program) 2021/08/24 04:26:18 fetching corpus: 9700, signal 203212/253349 (executing program) 2021/08/24 04:26:18 fetching corpus: 9750, signal 203495/253349 (executing program) 2021/08/24 04:26:18 fetching corpus: 9800, signal 203697/253353 (executing program) 2021/08/24 04:26:18 fetching corpus: 9850, signal 203920/253353 (executing program) 2021/08/24 04:26:18 fetching corpus: 9900, signal 204183/253353 (executing program) 2021/08/24 04:26:18 fetching corpus: 9950, signal 204544/253353 (executing program) 2021/08/24 04:26:18 fetching corpus: 10000, signal 204754/253353 (executing program) 2021/08/24 04:26:18 fetching corpus: 10050, signal 205070/253353 (executing program) 2021/08/24 04:26:18 fetching corpus: 10100, signal 205315/253353 (executing program) 2021/08/24 04:26:19 fetching corpus: 10150, signal 205555/253353 (executing program) 2021/08/24 04:26:19 fetching corpus: 10200, signal 205814/253353 (executing program) 2021/08/24 04:26:19 fetching corpus: 10250, signal 206080/253353 (executing program) 2021/08/24 04:26:19 fetching corpus: 10300, signal 206348/253353 (executing program) 2021/08/24 04:26:19 fetching corpus: 10350, signal 206632/253378 (executing program) 2021/08/24 04:26:19 fetching corpus: 10400, signal 206962/253378 (executing program) 2021/08/24 04:26:19 fetching corpus: 10450, signal 207214/253378 (executing program) 2021/08/24 04:26:19 fetching corpus: 10500, signal 207580/253378 (executing program) 2021/08/24 04:26:19 fetching corpus: 10550, signal 207863/253378 (executing program) 2021/08/24 04:26:20 fetching corpus: 10600, signal 208103/253378 (executing program) 2021/08/24 04:26:20 fetching corpus: 10650, signal 208403/253378 (executing program) 2021/08/24 04:26:20 fetching corpus: 10700, signal 208629/253378 (executing program) 2021/08/24 04:26:20 fetching corpus: 10750, signal 208798/253378 (executing program) 2021/08/24 04:26:20 fetching corpus: 10800, signal 209056/253378 (executing program) 2021/08/24 04:26:20 fetching corpus: 10850, signal 209405/253378 (executing program) 2021/08/24 04:26:20 fetching corpus: 10900, signal 209715/253378 (executing program) 2021/08/24 04:26:20 fetching corpus: 10950, signal 209975/253378 (executing program) 2021/08/24 04:26:20 fetching corpus: 11000, signal 210222/253378 (executing program) 2021/08/24 04:26:20 fetching corpus: 11050, signal 210570/253380 (executing program) 2021/08/24 04:26:21 fetching corpus: 11100, signal 210836/253380 (executing program) 2021/08/24 04:26:21 fetching corpus: 11150, signal 211037/253380 (executing program) 2021/08/24 04:26:21 fetching corpus: 11200, signal 211232/253380 (executing program) 2021/08/24 04:26:21 fetching corpus: 11250, signal 211505/253380 (executing program) 2021/08/24 04:26:21 fetching corpus: 11300, signal 211762/253384 (executing program) 2021/08/24 04:26:21 fetching corpus: 11350, signal 212049/253384 (executing program) 2021/08/24 04:26:21 fetching corpus: 11400, signal 212256/253384 (executing program) 2021/08/24 04:26:21 fetching corpus: 11450, signal 212458/253384 (executing program) 2021/08/24 04:26:21 fetching corpus: 11500, signal 212788/253384 (executing program) 2021/08/24 04:26:21 fetching corpus: 11550, signal 213085/253384 (executing program) 2021/08/24 04:26:21 fetching corpus: 11600, signal 213274/253384 (executing program) 2021/08/24 04:26:21 fetching corpus: 11650, signal 213486/253384 (executing program) 2021/08/24 04:26:22 fetching corpus: 11700, signal 213711/253384 (executing program) 2021/08/24 04:26:22 fetching corpus: 11750, signal 214043/253384 (executing program) 2021/08/24 04:26:22 fetching corpus: 11800, signal 214316/253384 (executing program) 2021/08/24 04:26:22 fetching corpus: 11850, signal 214566/253384 (executing program) 2021/08/24 04:26:22 fetching corpus: 11900, signal 214814/253384 (executing program) 2021/08/24 04:26:22 fetching corpus: 11950, signal 215085/253384 (executing program) 2021/08/24 04:26:22 fetching corpus: 12000, signal 215364/253384 (executing program) 2021/08/24 04:26:22 fetching corpus: 12050, signal 215627/253384 (executing program) 2021/08/24 04:26:22 fetching corpus: 12100, signal 215945/253384 (executing program) 2021/08/24 04:26:23 fetching corpus: 12150, signal 216140/253384 (executing program) 2021/08/24 04:26:23 fetching corpus: 12200, signal 216326/253384 (executing program) 2021/08/24 04:26:23 fetching corpus: 12250, signal 216610/253384 (executing program) 2021/08/24 04:26:23 fetching corpus: 12300, signal 216882/253384 (executing program) 2021/08/24 04:26:23 fetching corpus: 12350, signal 217112/253384 (executing program) 2021/08/24 04:26:23 fetching corpus: 12400, signal 217278/253384 (executing program) 2021/08/24 04:26:23 fetching corpus: 12450, signal 217517/253384 (executing program) 2021/08/24 04:26:23 fetching corpus: 12500, signal 217688/253384 (executing program) 2021/08/24 04:26:23 fetching corpus: 12550, signal 217936/253384 (executing program) 2021/08/24 04:26:23 fetching corpus: 12600, signal 218153/253384 (executing program) 2021/08/24 04:26:24 fetching corpus: 12650, signal 218321/253384 (executing program) 2021/08/24 04:26:24 fetching corpus: 12700, signal 218606/253384 (executing program) 2021/08/24 04:26:24 fetching corpus: 12750, signal 218806/253384 (executing program) 2021/08/24 04:26:24 fetching corpus: 12800, signal 219026/253384 (executing program) 2021/08/24 04:26:24 fetching corpus: 12850, signal 219241/253384 (executing program) 2021/08/24 04:26:24 fetching corpus: 12900, signal 219419/253384 (executing program) 2021/08/24 04:26:24 fetching corpus: 12950, signal 219621/253384 (executing program) 2021/08/24 04:26:24 fetching corpus: 13000, signal 219851/253384 (executing program) 2021/08/24 04:26:24 fetching corpus: 13050, signal 220075/253384 (executing program) 2021/08/24 04:26:24 fetching corpus: 13100, signal 220310/253384 (executing program) 2021/08/24 04:26:24 fetching corpus: 13150, signal 220533/253384 (executing program) 2021/08/24 04:26:25 fetching corpus: 13200, signal 220709/253384 (executing program) 2021/08/24 04:26:25 fetching corpus: 13250, signal 220879/253384 (executing program) 2021/08/24 04:26:25 fetching corpus: 13300, signal 221042/253384 (executing program) 2021/08/24 04:26:25 fetching corpus: 13350, signal 221232/253384 (executing program) 2021/08/24 04:26:25 fetching corpus: 13400, signal 221444/253384 (executing program) 2021/08/24 04:26:25 fetching corpus: 13450, signal 221605/253384 (executing program) 2021/08/24 04:26:25 fetching corpus: 13500, signal 222350/253384 (executing program) 2021/08/24 04:26:25 fetching corpus: 13550, signal 222576/253384 (executing program) 2021/08/24 04:26:25 fetching corpus: 13600, signal 222795/253384 (executing program) 2021/08/24 04:26:25 fetching corpus: 13650, signal 223021/253384 (executing program) 2021/08/24 04:26:25 fetching corpus: 13700, signal 223161/253384 (executing program) 2021/08/24 04:26:26 fetching corpus: 13750, signal 223336/253384 (executing program) 2021/08/24 04:26:26 fetching corpus: 13800, signal 223483/253384 (executing program) 2021/08/24 04:26:26 fetching corpus: 13850, signal 223710/253384 (executing program) 2021/08/24 04:26:26 fetching corpus: 13900, signal 223872/253384 (executing program) 2021/08/24 04:26:26 fetching corpus: 13950, signal 224057/253384 (executing program) 2021/08/24 04:26:26 fetching corpus: 14000, signal 224207/253384 (executing program) 2021/08/24 04:26:26 fetching corpus: 14050, signal 224376/253384 (executing program) 2021/08/24 04:26:26 fetching corpus: 14100, signal 224571/253384 (executing program) 2021/08/24 04:26:26 fetching corpus: 14150, signal 224754/253384 (executing program) 2021/08/24 04:26:26 fetching corpus: 14200, signal 224955/253384 (executing program) 2021/08/24 04:26:27 fetching corpus: 14250, signal 225230/253384 (executing program) 2021/08/24 04:26:27 fetching corpus: 14300, signal 225478/253384 (executing program) 2021/08/24 04:26:27 fetching corpus: 14350, signal 225666/253384 (executing program) 2021/08/24 04:26:27 fetching corpus: 14400, signal 225840/253384 (executing program) 2021/08/24 04:26:27 fetching corpus: 14400, signal 225840/253384 (executing program) 2021/08/24 04:26:29 starting 8 fuzzer processes 04:26:29 executing program 0: setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x0, @multicast2, 0x4e22, 0x2, 'nq\x00', 0x22, 0x7a, 0x5c}, {@multicast1, 0x4e23, 0x2000, 0x0, 0x5, 0x7008fa98}}, 0x44) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000080)='nq\x00', 0x0, 0xffffffffffffffff) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f00000000c0)={0x6, 0x0, 0x100, 0x5f9, 0x8, "4a37c11c55dd0a096b763de7e7a3cd75388f30", 0x10000, 0x1}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000100)) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) ioctl$KDSKBLED(r0, 0x4b65, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x101100, 0x0) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, 0xd, 0x6, 0x401, 0x0, 0x0, {0x1, 0x0, 0x9}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x3}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x8000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r0, &(0x7f00000003c0)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000004c0)=0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = accept$packet(r0, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000600)=0x14) r7 = accept4$bt_l2cap(r1, &(0x7f0000000640)={0x1f, 0x0, @none}, &(0x7f0000000680)=0xe, 0x800) r8 = openat2$dir(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x450202, 0x82, 0x12}, 0x18) r9 = getgid() r10 = getpid() r11 = geteuid() sendmsg$netlink(r2, &(0x7f0000000840)={&(0x7f0000000340)=@kern={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000480)=[{&(0x7f0000000380)={0x38, 0x1b, 0x0, 0x70bd28, 0x25dfdbfd, "", [@generic="4d1a941ff08e136be31a7c33bff10ad0d5020caa7c9fd122948e4f4e8cdacefe9f40ab75cb"]}, 0x38}, {&(0x7f0000000400)={0x64, 0x3a, 0x800, 0x70bd2d, 0x25dfdbff, "", [@typed={0x8, 0x3a, 0x0, 0x0, @fd=r3}, @generic="cece071735dbe5792694e519d40c0a5c7bb78ae534073e8f2cb52a963377cf52453b43cdc065e743eebbb2", @typed={0x8, 0x50, 0x0, 0x0, @u32=0x8}, @generic="f81a0b15c7ef462713e5aa36599707678bfa5a8da8a352eb5b"]}, 0x64}], 0x2, &(0x7f0000000780)=[@cred={{0x1c, 0x1, 0x2, {r4, 0xffffffffffffffff, r5}}}, @rights={{0x30, 0x1, 0x1, [r1, r0, r6, r0, r1, r7, r0, r8]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r9}}}, @cred={{0x1c, 0x1, 0x2, {r10, r11}}}], 0x90, 0x100}, 0x0) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) 04:26:29 executing program 1: r0 = accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) r1 = dup3(r0, 0xffffffffffffffff, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0xc00, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access', 0x3d, r2}}, {@version_9p2000}, {@access_any}, {@fscache}, {@aname={'aname', 0x3d, ')@}'}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) r3 = socket(0x1a, 0x80000, 0x30000000) bind$unix(r3, &(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e) r4 = open$dir(&(0x7f00000003c0)='./file0\x00', 0x803, 0x102) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440), &(0x7f0000000480)={'U+', 0x800}, 0x16, 0x7ec3ac474383b6ce) mount$9p_xen(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x280001, &(0x7f0000000580)={'trans=xen,', {[{@nodevmap}], [{@uid_eq={'uid', 0x3d, r2}}, {@smackfsdef={'smackfsdef', 0x3d, 'fscache'}}, {@obj_user}, {@seclabel}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}]}}) fchownat(r1, &(0x7f0000000600)='./file0\x00', r2, 0xffffffffffffffff, 0x1000) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r5, 0x84009422, &(0x7f0000000640)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) connect$unix(r3, &(0x7f0000000a40)=@file={0x0, './file0\x00'}, 0x6e) name_to_handle_at(r4, &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)=@orangefs_parent={0x28, 0x2, {{"94539777775e1d5edd3cc3b1603302f5", 0xfffffffd}, {"06a7934da55b1fd31aeab0dc4bec81fc", 0xfff}}}, &(0x7f0000000b40), 0x1000) connect$unix(r0, &(0x7f0000000b80)=@abs={0x1, 0x0, 0x4e20}, 0x6e) connect$unix(r3, &(0x7f0000000c00)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r3, &(0x7f0000000c80)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) open_by_handle_at(r6, &(0x7f0000000d00)=@ocfs2_parent={0x18, 0x2, {{0x2, 0x401, 0xfffffffd}, {0x10000000, 0xfffff863, 0x4d9}}}, 0x48342) 04:26:29 executing program 2: setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000000)=0x4, 0x2) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000040)) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x2000, 0x0) r1 = openat(r0, &(0x7f00000000c0)='./file0\x00', 0x280, 0x125) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x101040, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000140)={0x0, 0xfffffffffffffff7, 0xffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_TDLS_OPER(r4, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x4c, 0x0, 0x4, 0x70bd2a, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}]}, 0x4c}}, 0x4000) creat(&(0x7f0000000300)='./file0\x00', 0x8) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000380)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r5, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x28, 0x0, 0x2, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x3, 0x1}}}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8810}, 0x40080) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), r4) r8 = dup(r3) syz_io_uring_submit(0x0, 0x0, &(0x7f00000004c0)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x3, 0x0, @fd=r8, 0x400, 0x0, 0xa3, 0x2}, 0x7) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f0000000500)={r3, 0x76, 0x1, 0x400}) getsockopt$bt_BT_RCVMTU(r9, 0x112, 0xd, &(0x7f0000000540)=0x5, &(0x7f0000000580)=0x2) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r5, 0x8010671f, &(0x7f0000000600)={&(0x7f00000005c0)=""/16, 0x10}) sendmsg$NL80211_CMD_CONNECT(r3, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x38, r7, 0x4, 0x70bd2b, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_KEYS={0x24, 0x51, 0x0, 0x1, [{0x20, 0x0, 0x0, 0x1, [@NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_MODE={0x5, 0x9, 0x2}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_SEQ={0x8, 0x4, "3c7dd0a7"}]}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) syzkaller login: [ 68.183343] audit: type=1400 audit(1629779189.224:6): avc: denied { execmem } for pid=274 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 04:26:29 executing program 3: ioctl$SNAPSHOT_FREE(0xffffffffffffffff, 0x3305) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400900, 0x4) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000040)={0x0, {}, 0x0, {}, 0x8, 0x3, 0x1a, 0x0, "7d2b3e15434b2ce3c82c4cd307d9b69eec12acf3f4198282a7da2c432d9d77fd7ba858adfde9c096c7e309d0a395cbe238583686209ea67b212121e694a45861", "638ff8fd7dac563c4a605e48cf82f8c316e1061d0318465e9261ccbc7d438fd8", [0x100000001, 0x6]}) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x80000, 0x18) r2 = syz_open_dev$vcsu(&(0x7f0000000140), 0x100, 0x60041) execveat(r2, &(0x7f0000000180)='./file1\x00', &(0x7f0000000240)=[&(0x7f00000001c0)='\xa2\x00', &(0x7f0000000200)=']$&^&\x00'], &(0x7f0000000400)=[&(0x7f0000000280)='#[!.\x13\xb4\x00', &(0x7f00000002c0)=':\x00', &(0x7f0000000300)='!:@\x00', &(0x7f0000000340)='$\x00', &(0x7f0000000380)='&.\x97+...}\'{,\x00', &(0x7f00000003c0)='\x00'], 0x800) open_by_handle_at(r2, &(0x7f0000000440)=@ceph_nfs_snapfh={0x1c, 0x4e, {0xffffffffb8d89ab2, 0x5, 0xfffffffffffff001, 0x1000}}, 0x42001) close_range(r2, 0xffffffffffffffff, 0x0) r3 = openat(r2, &(0x7f0000000480)='./file0\x00', 0x412000, 0x54) r4 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x569200, 0x10a}, 0x18) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f00000004c0)=',\\\x00', &(0x7f0000000500)='./file0\x00', r4) r5 = openat(r3, &(0x7f00000005c0)='./file1\x00', 0x80401, 0x100) r6 = creat(&(0x7f0000000600)='./file1\x00', 0xa0) ioctl$SNAPSHOT_FREE(r6, 0x3305) clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) write$evdev(r5, &(0x7f0000000680)=[{{r7, r8/1000+60000}, 0x15, 0x1f, 0x4}], 0x18) setxattr$trusted_overlay_upper(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740)={0x0, 0xfb, 0xc5, 0x3, 0x3, "a856d4ec411b90dcfc3d0991abe58380", "6b18b635a047376d529211374c077fea58dd70d7c2da2c0bad3ca0781029d96073f41de7fb86dfe0d3fcb384b9b10b1c88dac3465be8699b0ebc7a7289a38908727767e2e4ebe6668d90c33c1196514b1865d9a291f635bad1f35089e263c0bedd0698cf4f3fd90914ce6799e8b059ba4a520efb272de7d0e375d2f5b6d8794f6de4111f0b2b5a5ae517de3878d150493edf5650b3c5d892b64f3bf4513bf3a544346befbc677c12ac01e519cbf7e322"}, 0xc5, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000dc0)=0x0) r10 = accept4$bt_l2cap(r1, &(0x7f0000001280), &(0x7f00000012c0)=0xe, 0x800) sendmsg$netlink(r0, &(0x7f0000001780)={&(0x7f0000000840)=@proc={0x10, 0x0, 0x25dfdbfb, 0x800000}, 0xc, &(0x7f0000001240)=[{&(0x7f0000000880)={0x374, 0x25, 0x300, 0x70bd27, 0x25dfdbfe, "", [@nested={0x362, 0x58, 0x0, 0x1, [@generic="2ec8be02e9096d6e543b7784dc4e83ddf6f65f3ceeca07cde8b09c6b21a24a848f300c31b2fdbb765e208f227091b97c556f2ceeba214da84528c968e6afbefd7bf52cb8682bd22839e6d28e0482c18c32796900302fd762dea606ef12e62dada1951fe90871037ddbe568a2b9db450f75fca0aca4eaa22fd10d052dad6bfb90545b7c2d08be8b25e4b00da52d74c041845be0b3dc11987fc8a85e5ef597cafb3b94d030618b40777de05488f0ea75a5f4d0406c40950179fca2a4abc263041cb288cab609fea75899b97969b90310ccdac7c4462b2d0a940504676900240a2d2beb513b422f63b772cf1156247f", @generic="eb804edc51086d529ed1f5e98eff4b4df8914498d632ec9aaf708a7c2dee4ca6ebcee669da1fbecfa357251e9c8246ea532cf6c385d5710f1f47f906035b138c464938dddb47b53b190666b091e8d6d0c93995df69f77c7c22ccc74e38d89886d724c060be00bf695476af8a428b523818fdea7de09af01913464e267f38bfbed9e22668f3cae0eeb2a743cfc58982b0ee0dca86045d974db8088b0d8e3ff843d9152e39254665e92a0cf60ec9837dbbf7e5833ce4830fe7ab8c4a445b245abf78a56681aca4a65020714abeabbb69f57eb2a42dff720712ccf2e485cb77d2844b717b0fc448f96695e1a75189e6", @generic="7e9cc07a9aeea6240f93c35a09220b6363228b8c6d420dc282d72eb635e79ae23dbc4281953dd8415a3872fc3a003166c38927bb563464abbd7f2943a1a823ff7defb4570e2b9ad48d169efd6e332b81f28862df3a494c944d76a11129258ec7a2072011d5541acadbfff98cb64d1d38b5abb42ef046a87c4ebf3e7c27066045da0ecacd2c54fae1d852fd0e2082499754ebb584ae82a0b67e68f07103c8f0cb0b9523246928017ed417d58842dff1dddcc8ebd4aca3c01620ef3acc8cbaee70917d590c4d7f4cbcb91078d055b6f625", @generic="134761b6ed9a9e307208c5f0de61aed8852a7f8bb9c32a2604ba3165962b568ecf2f431417f9a050815ccc2d00797a399ae92daa733a0e1b11cb6be17e835aae58fa63960483052a8e5645b7dc94c4aecb03eb23614b72c1a45c2ab8da4f7d5143fb92e07ded1c9b7618ed88fb1ccc87ce13f0edde1576823a0f7b70e745a91cbeec132f023d8d3aa92a991f7dbd35b7c596ad195eea72f6397018100f157f58297e27f2ebc0c58ef8d70345ae7c4e81e61a"]}]}, 0x374}, {&(0x7f0000000c00)={0x1b8, 0x36, 0x10, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1a8, 0x1, 0x0, 0x1, [@typed={0x4, 0x90}, @typed={0xe2, 0x18, 0x0, 0x0, @binary="6f27136412921330f23c59cbb7d3c26b445304238ecef31075f64d036075fd3cc11e6832c79ed205c9a1a365193133fc92f0b0876a1f7360b15bec677cfc1da2062e8f79a0a5432eb29f7f00d258b66949d79f8f8663c701bf3f3267e10e234fc7604fe815bd5c4316715272540b94ac0a1d7c0d52a96a7f7c7dc44a0d5ed26272e813489c38fa762c90d0c87986cf85660069c0ae4bee840523b7ad92383f9601e844cc36fd82a048c12408a3709b3519282c210afb4dcb5800ed6757694d2432c1c8f8086a0838a409d71a7f36b398300e8ed5eccc701ee09bf71527d0"}, @generic="7f8cc9fef0f7abd54352f05e509695711356b14024f945c0f46f1d06dd105f0b7c4b5ed627ea2229f9a5144c1ceb4e19c5586c21fac069adc698ac15695273876d2523dfc5faa4d0a316f4652c3321312292a96829ed0bcb6697064ad11b328f7947fc3c4c86078f28931c0cddd2bb4a681037c088bfecff4c8e11c7e21a2d5585ac5bddb4d387941dcfa9c27f3a6914d9f41f0b1b9b9cd2fd0dcfbfd20fd8ad73e8d4c10d4cac085f245873b2f344df769db274", @typed={0x8, 0x5b, 0x0, 0x0, @u32=0xfffffffc}]}]}, 0x1b8}, {&(0x7f0000000e00)={0x254, 0x1c, 0x400, 0x70bd27, 0x25dfdbff, "", [@generic="a8dab6810487d5bf731cc8085e4c2a1b6a1e0945d412193b9f870b45290e13a44f1ff7d3fd49feb5b58e58eea13d62548a07ad81236c30994e776db3df2fe394d5e863502bc7ac570d05ad1f12adde3948b51c0cf484b00be44d65a618a0a305e9a77d5de3b33b4f51f063728bc679d178b8b13f5b9592d895c7af0e6e7b8bf38f7a4538a4bbb86e2fd63055b5718c33f037cddd7b4029fde18ba3d30ffa551ae73dbb2379bcd0d302d6e70a1a0b6be0e86c30b3acf9e9adbe01b504300961af", @nested={0x35, 0x20, 0x0, 0x1, [@generic="047cc75fa2426de585b9cc65132fc74d5529560ab5400752386a2e8e8965c5002967e684a510785448", @typed={0x8, 0x26, 0x0, 0x0, @pid}]}, @typed={0x8, 0x6, 0x0, 0x0, @ipv4=@private=0xa010102}, @typed={0x8, 0x0, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x4, 0x38}, @nested={0xf5, 0x32, 0x0, 0x1, [@typed={0x8, 0x43, 0x0, 0x0, @u32=0x3ff}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r9}, @generic="a433fa2634b662e9161067eacc07f19cba8b1e55bb1f2b74599c539af791977ae2a29059d0d669018e77820afc264a9c3bea668f513c7f2464a88e6eabe1465882cb78d27afefe80389e02198ec25d1422d6b88a684d0a7bdb7ce2130f8bc923950c2489dcbc2188a4325d8dd5f5bc7a5424002e13dc67f13924e3958dff9347e36110fae3cfd22966be0f25524867eb714355738426eb7f83d604213ec0d4057213f6ea442d378de9bc97b36814a1f02a7ae18eae830eb5852af65bcdf8247d8c755b0d91b100ca809f3a739e68869ceba785eae9368499ce1510d785f8f39b0c"]}, @generic="6ac40b7f144ff5542f23ded3f730e330fdc6480bd26376fa954f04d30e409d453e2696b75a702454259659c153", @nested={0x10, 0x49, 0x0, 0x1, [@typed={0xc, 0x71, 0x0, 0x0, @u64=0x20}]}]}, 0x254}, {&(0x7f0000001080)={0x1b0, 0x12, 0x400, 0x70bd28, 0x25dfdbfe, "", [@generic="d4bcdc4505c47851b157b359ea58f0edb79e6898d6c8966f6bf7274bb3468191c5e354df912eadbc95692b6a5036e67735afa30122d7bc0c20629fb906bc641ae538f804fedb3d0a4e2a40d9fe41509830440a77b5304c2e066c47ef26095b226cc71feec1f4972f2c297c3821e006035a412ee4d8da196bc53149933727b307f23a5b37f897846f91188ebb7ebe2e558c2e9e07a9e74bc542e0e8d7c95cbae4ee4535e617dbf6bc", @generic="03ca700796b41a694508c7e3284c74d82797d012d24251ec52c55d553a0fb20d4fc6c1e6e57017f31ba0ac4b50bf4d2bbd3bdf3853bcbdd262089fb1b467fd76834486c4fa02182c234d8e613503f4cf8793050f46aa1bab0261ec23ba8cec7616f36f39b5a2fbf092a8efdb89b99b24ba4a86137b0c0d5987c44b2232c205eeb8e22e2824221fb32a4993bc253e9f6651b4ed72d0ddc500e081473b659a8f0d80ff5f3e2f93b8b2f6027e13dc0c68b8023613632751baac5882310bc910197cd3b8499f6746f6a3dc0f4999c98cb9ff72f49c342a0488550b4bc9143e4e5bbe48277f0a1417ed1e2b0922fe427fb66ad6226a2f71aa"]}, 0x1b0}], 0x4, &(0x7f0000001640)=[@rights={{0x30, 0x1, 0x1, [r10, 0xffffffffffffffff, r5, r5, r4, r5, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r4, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [r6, r5]}}, @rights={{0x2c, 0x1, 0x1, [r1, r6, r6, r1, r5, r5, r1]}}, @rights={{0x2c, 0x1, 0x1, [r3, r0, r2, r3, r6, r4, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x120, 0x20000001}, 0x20000000) 04:26:29 executing program 5: ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000000)=""/19) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)={{0x10b, 0x6c, 0x1, 0x15f, 0x344, 0x444d, 0x1c, 0x200}, "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", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x1720) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000001780)=""/4096) ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000002780)={0x2, 0x3, 0xffffffffffffffff, 0x6, 0xffffffffffffffff}) ioctl$FITHAW(0xffffffffffffffff, 0xc0045878) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FIBMAP(r0, 0x1, &(0x7f00000027c0)=0x25c) pipe(&(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VT_RELDISP(r2, 0x5605) getsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002840), &(0x7f0000002880)=0x4) r3 = syz_open_dev$char_raw(&(0x7f00000028c0), 0x1, 0x80) fsetxattr$security_selinux(r3, &(0x7f0000002900), &(0x7f0000002940)='system_u:object_r:systemd_unit_file_t:s0\x00', 0x29, 0x3) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000002980), &(0x7f00000029c0)=0xc) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f0000002a00)) ioctl$BTRFS_IOC_QUOTA_CTL(r2, 0xc0109428, &(0x7f0000002a40)={0x2, 0x10001}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000002ac0), r2) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000002c40)={'ip6gre0\x00', &(0x7f0000002bc0)={'syztnl2\x00', 0x0, 0x29, 0x38, 0x5, 0x7fff, 0xb0, @dev={0xfe, 0x80, '\x00', 0x1a}, @private2={0xfc, 0x2, '\x00', 0x1}, 0x8, 0x700, 0x7ff, 0x2}}) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r2, &(0x7f0000002d00)={&(0x7f0000002a80)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000002cc0)={&(0x7f0000002c80)={0x2c, r4, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x101}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4004081}, 0x5) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000002d80)) 04:26:29 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000000)) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000040)="21a2dd28ce959aeeaef031a5bdcf18158800cc4f53e66e2112188c72e2aa3dd16ca0c2bd5a47f1ebe5d5fa8f9934c005f9c60c190214c0e56de7518a6ac17e4d718cd457854965f21ec14adbd57d0a47dc241ed22208ac6d4d10ff8ac94cb3a101bc930dc1be1b7258441e72498f68", 0x6f}, {&(0x7f00000000c0)="fa2934a9c885e8c6b3e9cc6403f4297462ab95152f65fdfc18cf73c1d5863726f7d6792b87044415839e09ea15a405b19a497a33c947eb4ec104b4fff07d296922b9c7e11f05f3710e49ee942f97e5429bb908c34eaa08993f72459e40f9add9eca7cca61bbabae9f35c536977f5abfb9c3cebb6bf1b30bf", 0x78}, {&(0x7f0000000140)="c2de5a8ed87d936214b0483111824c61bf1778df5c19a8f89dac471421884598923969a6445bc900306a06b72b08d67cc46dd44c7be55d67b581bd7b891d52c56b433842d48e2c35f9b16cf5651a3081e309fdbb1d7a0578ce00a91984f6ebc79e0bcabf487df9c50aa34c04fadab7aa297783b83482ad806d0e3aa18e56ee96e25f1ee43e26ad59075ef419ac83376244bcfead8e6143c34251c50dcd27500ee5e678bc15920e7ac31d", 0xaa}], 0x3) ioctl$int_out(r0, 0x5460, &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)) r1 = timerfd_create(0x0, 0x80000) fcntl$setstatus(r1, 0x4, 0x26800) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000002c0)) syncfs(r0) r2 = openat(r0, &(0x7f00000004c0)='./file0\x00', 0x200200, 0x4) timerfd_settime(r2, 0x1, &(0x7f0000000500)={{0x77359400}, {0x0, 0x3938700}}, &(0x7f0000000540)) syncfs(r1) lseek(0xffffffffffffffff, 0x2, 0x0) r3 = fsmount(r0, 0x1, 0x0) fsetxattr$trusted_overlay_opaque(r3, &(0x7f0000000580), &(0x7f00000005c0), 0x2, 0x3) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) syncfs(r3) r4 = syz_open_dev$vcsa(&(0x7f0000000600), 0x8, 0x40400) openat(r4, &(0x7f0000000640)='./file0\x00', 0x402601, 0x180) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f00000006c0)) 04:26:29 executing program 6: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='#\x00', r0) r2 = add_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="24da4e2e93b13d0c88563bf4505beda799a16fde3d4186891b7f1f918a1aed831ef4fa81ef9dd9f5400c70e5927f2982bfe31efb8551c9", 0x37, r0) r3 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r3, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) r4 = request_key(&(0x7f00000003c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='id_resolver\x00', r0) r5 = add_key(&(0x7f0000000300)='syzkaller\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)="c4b89a44a2095ca9cbf30dac5b0a0c1f78c6f33b66d69f6fce70e430bc2c13ab216d52", 0x23, r4) add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$fscrypt_provisioning(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000580)={0x0, 0x0, @c}, 0x29, r5) r7 = add_key$keyring(&(0x7f0000000640), &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r6, &(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x2}, r7) request_key(&(0x7f00000006c0)='rxrpc_s\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000740)='abcdefghijklmnopqrstuvwxyz0123456', r5) r8 = add_key$keyring(&(0x7f0000000800), &(0x7f0000000840)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x2}, 0x0, 0x0, r8) r9 = add_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0)={'syz', 0x3}, &(0x7f0000000900)="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", 0x1000, r5) r10 = add_key$fscrypt_provisioning(&(0x7f0000001900), &(0x7f0000001940)={'syz', 0x2}, &(0x7f0000001980)={0x3, 0x0, @d}, 0x18, r9) keyctl$search(0xa, r10, &(0x7f00000019c0)='.request_key_auth\x00', &(0x7f0000001a00)={'syz', 0x0}, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000001a40)='trusted\x00', &(0x7f0000001a80)='abcdefghijklmnop') request_key(&(0x7f0000001ac0)='blacklist\x00', &(0x7f0000001b00)={'syz', 0x3}, &(0x7f0000001b40)='*\x00', r0) 04:26:29 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$802154_dgram(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)="cd3727e8f715df5d6283a85cc7b458f6b26604ca1b2730694f745962d3b5c88a6b6352f48ead0e4ac54188026cdff1a45a1e8849fa32d4246e9382e8c3459956ba1c9bc016b39c98d8efb41e31e065781ad1e03cf0a1ac02c49bfb6c5ed9d9d20424d310deaa5e1903f5adab91c5e800db85145b73f386", 0x77}, 0x1, 0x0, 0x0, 0x4000004}, 0x4004) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000100)) setsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f0000000180)=0x3, 0x4) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x248000, 0x0) sendmsg$802154_dgram(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0302}}}, 0x14, &(0x7f0000000280)={&(0x7f0000000240)="cafda403a0457518acc02e01432c1ad3ca", 0x11}, 0x1, 0x0, 0x0, 0x20000051}, 0x4840) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000380)={0x7f, 0x6c, 0x1}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000007c0)=[{&(0x7f00000003c0)="dded40d9ea65e7d384e734180d949bd06faea25ea7cb5e91984f07a90a5cb844684c841a7bc1d34c4ad0b31223de239b6af6334fc799ecddd96c8551701ca4100b182fb628b39aa9ed69b1f438efad737151fc397579ed312134d9a40ee9f9dd49a5eaf26fc2dc7415c0926ab15c49e6f41f702541d43dc206f44d5e9a54a90131", 0x81}, {&(0x7f0000000480)="65be72144286da2709d6c4a8b1efac2a7290202df70ab6f0e647dcf767f615bf602c3748533a6957b1d0a867b5419c95f0e8a6ca9889bca38fe137fed62f8b3a9fc94ed12dbfcd6e3ad13300f087f60097cbca83dc227e37f0afa0ba5c4c7ffd6042173a2dde7bff5d5d309e024a1556a05feaada1c049d3eeea8c96182f426c6c6b3b6682", 0x85}, {&(0x7f0000000540)="99cb514f6700a4c4a3d74d10c4906efe4c358c5cde0311da552eeb3c9271877f764284a13c7d2ce17cff6a3013fe29aac489e3eeb792269c9e3bf34eb08f3410bdd46e999eb826797c693c9d16cc5b564e5677f76ea32520a708fcd5f567cd2f5f2a84baf4fd4282cb", 0x69}, {&(0x7f00000005c0)="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", 0xfa}, {&(0x7f00000006c0)="059a9425fc10d88c176fec077818bd439eabc1cb5a0848e9a81da77b0ae4930dd6b9a915a6313e3b07ce33d10e931a352303598857fba7cab1025c7018ddebb955740fd68cd5d4ef4724ea5e1d6771d6878415f3b9cba3cfaf9e88a94fbd446b13c694672a863421fd0ac128293e871f532a6d5d8bf3cc8bb6f1477460c9c9d7fb132f3cd730d26a9eb25c3e666f744c467493f6a725d5c1c171d4a03bdb6618d0347199eb56a98c611ebdd118690635badb39f9afd8d7dc70b3a4fc856c3cc69500c472de24c7869ee90e2fc12416ffa16287d96b6077e1eedeeaf4770d2067f60ab52edc6c8352a0ef817d", 0xec}], 0x5, 0x0) r2 = syz_io_uring_complete(0x0) sendmsg$unix(r2, &(0x7f0000000cc0)={&(0x7f0000000840)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000c40)=[{&(0x7f00000008c0)="eb57fbd7422c05ac7c871a10b8ab6a335994bcadcfbfc0f504ccd2cc97d43aa2a782ce00256a3849b6ee12aaa06decf8880f8471c01a26e3ad4afe42a87000953885f4b52b6976a4bc35ff730218e8a0a032d04e822a0b18c451250c34751d76c3a8203bbce774354ae9f249b6ea9d1aabc6e28b71d074cc66f65a77d50debea9f310bc59dc76001dd7d190b57e6d0407a1a844c7a9bf4e91a8b8d554b506ca2d3b26aa743129a33b7a9b31bf6e076f4794a1c5f908c04", 0xb7}, {&(0x7f0000000980)="2072f5674353cd4622ffc721035f02e6827be639be43e13342405da055fd5c7981ff4c7d306aa7388b40063967488697a339427cb0e4a70504ee951b7b98a7627cf059c829f1266fb3d07dd5ee28ca465f4f5a882da174757f54d3328e202f3ac702ba1a61ea3b65f2cf1c6259545d18253b199102c919c7555d095d2669b948d868f6264d7f0a6774c13245640b4c983525294e810262248b8e495066877c484c6e600991005ee3d17c104d841461adf943b4b0800109d07edae4d28da57386f0c17d88f93034e0eae6", 0xca}, {&(0x7f0000000a80)="707431a75dd34625c9d659877fd4745336d6ccc53df5b60438b151a108626d54c08dea3a2cdef4", 0x27}, {&(0x7f0000000ac0)="3fc5313caa3d2168d8a7bddc1f0ab57c999e46cded18f887ef8011b96ac70d1ca442362f03f933326c8435d8259f2eb82d7ab6d354487bd31e3af3d3edb90cd1bf08c0b29f24bdf112f9c1f613941aeaddc0df278ecb536f84d22f95554e962eec05b395f0b413ef51e5495e894a51b77417e2dbad9def971029a6edae916f0ba25cfd844a3ec6d7afb914bc96cd9cc4fc238e6f05fa4c33f52d10254252f0b5f394e9c38439ae3dea107c2b14056d5a5dfccdbb4ffde20e9658051aca3dea951a91a03cd14389e0347a9118ef532784d8d1a3451d1c43938630912e69818140b852aa000bddd5", 0xe7}, {&(0x7f0000000bc0)="50cdd4db5d4eca0eb2e84b18106bd540c856de57a46a819f23326e861911b2f76fa1fb6a63d2077a8218b0e0870a5a225da87a39b57c5e250f1642ba7eefe267561fa554673f2869dffd9005d7b14b78db1ba9651a483c79f451c83d6207607485433f908dbf3c664cd24cd3db67a52df0a26d", 0x73}], 0x5, 0x0, 0x0, 0x840}, 0x20040005) chdir(&(0x7f0000000d00)='./file0\x00') r3 = add_key$keyring(&(0x7f0000000d40), &(0x7f0000000d80)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r4 = add_key$keyring(&(0x7f0000000dc0), &(0x7f0000000e00)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$reject(0x13, r3, 0x6, 0x6, r4) r5 = open(&(0x7f0000000e40)='./file0\x00', 0x20500, 0x0) getsockopt$WPAN_SECURITY_LEVEL(r5, 0x0, 0x2, &(0x7f0000000e80), &(0x7f0000000ec0)=0x4) r6 = dup2(r5, r1) ioctl$BTRFS_IOC_SET_FEATURES(r6, 0x40309439, &(0x7f0000000f00)={0x1, 0x0, 0x6}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000f80)={0x4, &(0x7f0000000f40)=[{0x0, 0x1}, {0x0, 0x6, 0x81, 0xd}, {0x8, 0x96, 0x92}, {0x40, 0x5, 0x6, 0xb6}]}, 0x10) [ 68.389998] cgroup: Unknown subsys name 'perf_event' [ 68.396599] cgroup: Unknown subsys name 'net_cls' [ 68.403494] cgroup: Unknown subsys name 'perf_event' [ 68.404806] cgroup: Unknown subsys name 'net_cls' [ 68.406187] cgroup: Unknown subsys name 'perf_event' [ 68.407389] cgroup: Unknown subsys name 'net_cls' [ 68.418827] cgroup: Unknown subsys name 'perf_event' [ 68.419803] cgroup: Unknown subsys name 'net_cls' [ 68.422492] cgroup: Unknown subsys name 'perf_event' [ 68.423408] cgroup: Unknown subsys name 'net_cls' [ 68.426955] cgroup: Unknown subsys name 'perf_event' [ 68.427782] cgroup: Unknown subsys name 'net_cls' [ 68.436656] cgroup: Unknown subsys name 'perf_event' [ 68.439676] cgroup: Unknown subsys name 'net_cls' [ 68.445332] cgroup: Unknown subsys name 'perf_event' [ 68.446619] cgroup: Unknown subsys name 'net_cls' [ 71.578615] Bluetooth: hci2: command 0x0409 tx timeout [ 71.578947] Bluetooth: hci3: command 0x0409 tx timeout [ 71.579823] Bluetooth: hci5: command 0x0409 tx timeout [ 71.580624] Bluetooth: hci4: command 0x0409 tx timeout [ 71.582443] Bluetooth: hci0: command 0x0409 tx timeout [ 71.642057] Bluetooth: hci7: command 0x0409 tx timeout [ 71.643067] Bluetooth: hci1: command 0x0409 tx timeout [ 71.643860] Bluetooth: hci6: command 0x0409 tx timeout [ 73.626320] Bluetooth: hci0: command 0x041b tx timeout [ 73.627562] Bluetooth: hci4: command 0x041b tx timeout [ 73.629973] Bluetooth: hci5: command 0x041b tx timeout [ 73.632320] Bluetooth: hci3: command 0x041b tx timeout [ 73.633187] Bluetooth: hci2: command 0x041b tx timeout [ 73.690197] Bluetooth: hci6: command 0x041b tx timeout [ 73.691344] Bluetooth: hci1: command 0x041b tx timeout [ 73.693774] Bluetooth: hci7: command 0x041b tx timeout [ 75.673988] Bluetooth: hci2: command 0x040f tx timeout [ 75.674977] Bluetooth: hci3: command 0x040f tx timeout [ 75.675816] Bluetooth: hci5: command 0x040f tx timeout [ 75.678065] Bluetooth: hci4: command 0x040f tx timeout [ 75.679271] Bluetooth: hci0: command 0x040f tx timeout [ 75.737929] Bluetooth: hci7: command 0x040f tx timeout [ 75.738720] Bluetooth: hci1: command 0x040f tx timeout [ 75.739393] Bluetooth: hci6: command 0x040f tx timeout [ 77.721943] Bluetooth: hci0: command 0x0419 tx timeout [ 77.722672] Bluetooth: hci4: command 0x0419 tx timeout [ 77.724830] Bluetooth: hci5: command 0x0419 tx timeout [ 77.725570] Bluetooth: hci3: command 0x0419 tx timeout [ 77.726663] Bluetooth: hci2: command 0x0419 tx timeout [ 77.785926] Bluetooth: hci6: command 0x0419 tx timeout [ 77.786634] Bluetooth: hci1: command 0x0419 tx timeout [ 77.787301] Bluetooth: hci7: command 0x0419 tx timeout [ 86.172210] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 86.173134] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 86.175700] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 86.228880] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 86.229800] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 86.232769] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 04:26:47 executing program 7: syz_open_dev$loop(&(0x7f0000000340), 0x28, 0x903) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000240)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x4000}, {&(0x7f00000002c0)="8d527ae46a77cc846ea2f60f6d3bb40e620a0fad2284a8034d0a3e8324d21f9fa1b1325ee5c5bf1f871bcfcfcd81237ea7a6f1224b8459ffb088c8caad7e18a20de3", 0x42, 0x14bb}, {&(0x7f0000000140)="85d6563cdf0f2687655261a81147753e0d2781dfbf9b7d44b22f4ee5473c7f7bdd28e66265651c5a0273c69d55dae698f450aa6eeefabc8d7c9d39073d467d86c1b1ebc01aad856ff8405cfd505b1a2c2aefb77c691368a5dffbb8b9ccba7d14690a6c9e7e7d9e3d0a291454147f6ec4b2a4bd319b7ea71da70031e12bb1be5f6b0ed274d019dc5981b43f621d409d0f9b734a824d04f4277c71e9e9da3e8c4b096623eb25e8114516e7", 0xaa, 0x1}], 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="c3b35131f1f35229bf0f23a668b5a1358d6b376e9601f3394d11eac17b2f68a26f3ebf2797a1214dbda1a3dbea9257fd0fbb5c8c04ba773956ac98a565594553cc128f7d9d6769b24156649d82cd0643905eefb72e09f14eea731d681ea10b4d4ea75e163501856ac4dedb208723fcbbc7ded1a655e2688cd4bf2a53e0e936d261f59303487655c96444c7f2f20ca09f6d01aa2e10835f3bc1855de6b524974f277cdf5c00b9ebf68511c72a9e4c8797bb7f2ecdd186a775f0d3514b597b8d61a65c42a82ba573b37552ac2fb6f90528d81da2fff5c19104"]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) accept4(r0, &(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x80, 0x180000) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) [ 86.617783] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 86.619484] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 86.622447] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 86.694955] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 86.695923] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 86.707029] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 86.709184] FAT-fs (loop7): Unrecognized mount option "óQ1ñóR)¿#¦hµ¡5k7n–ó9MêÁ{/h¢o>¿'—¡!M½¡£Ûê’Wý»\Œºw9V¬˜¥eYESÌ}gi²AVd‚ÍC^ï·. ñNêsh¡ MN§^5…jÄÞÛ ‡#ü»ÇÞѦUâhŒÔ¿*Sàé6Òaõ“HvUÉdDÇòò  Ÿmª.ƒ_;Á…]æµ$—O'|ß\" or missing value [ 86.724941] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 86.725814] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 86.727286] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 86.728649] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 86.729526] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 86.730669] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 87.039540] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 87.040434] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 87.051604] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 04:26:48 executing program 7: syz_open_dev$loop(&(0x7f0000000340), 0x28, 0x903) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000240)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x4000}, {&(0x7f00000002c0)="8d527ae46a77cc846ea2f60f6d3bb40e620a0fad2284a8034d0a3e8324d21f9fa1b1325ee5c5bf1f871bcfcfcd81237ea7a6f1224b8459ffb088c8caad7e18a20de3", 0x42, 0x14bb}, {&(0x7f0000000140)="85d6563cdf0f2687655261a81147753e0d2781dfbf9b7d44b22f4ee5473c7f7bdd28e66265651c5a0273c69d55dae698f450aa6eeefabc8d7c9d39073d467d86c1b1ebc01aad856ff8405cfd505b1a2c2aefb77c691368a5dffbb8b9ccba7d14690a6c9e7e7d9e3d0a291454147f6ec4b2a4bd319b7ea71da70031e12bb1be5f6b0ed274d019dc5981b43f621d409d0f9b734a824d04f4277c71e9e9da3e8c4b096623eb25e8114516e7", 0xaa, 0x1}], 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="c3b35131f1f35229bf0f23a668b5a1358d6b376e9601f3394d11eac17b2f68a26f3ebf2797a1214dbda1a3dbea9257fd0fbb5c8c04ba773956ac98a565594553cc128f7d9d6769b24156649d82cd0643905eefb72e09f14eea731d681ea10b4d4ea75e163501856ac4dedb208723fcbbc7ded1a655e2688cd4bf2a53e0e936d261f59303487655c96444c7f2f20ca09f6d01aa2e10835f3bc1855de6b524974f277cdf5c00b9ebf68511c72a9e4c8797bb7f2ecdd186a775f0d3514b597b8d61a65c42a82ba573b37552ac2fb6f90528d81da2fff5c19104"]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) accept4(r0, &(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x80, 0x180000) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) [ 87.102432] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 87.103571] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 87.106957] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 87.150539] FAT-fs (loop7): Unrecognized mount option "óQ1ñóR)¿#¦hµ¡5k7n–ó9MêÁ{/h¢o>¿'—¡!M½¡£Ûê’Wý»\Œºw9V¬˜¥eYESÌ}gi²AVd‚ÍC^ï·. ñNêsh¡ MN§^5…jÄÞÛ ‡#ü»ÇÞѦUâhŒÔ¿*Sàé6Òaõ“HvUÉdDÇòò  Ÿmª.ƒ_;Á…]æµ$—O'|ß\" or missing value [ 87.291058] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 87.292109] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 87.295156] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 87.318097] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 87.319062] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 87.321604] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 87.344607] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 87.345591] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 87.350384] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 04:26:48 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) syz_open_dev$sg(0x0, 0x2, 0xa00000) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000", 0x2c}, {&(0x7f0000000240), 0x0, 0x80000001}, {&(0x7f0000000040)="3973e3a05521d565b954b3fa2a4818789d0f7e417f05a2b796d8b1811c6ecccfbaf98f6d0c07de2ccff8f422b3e36a50a1a00b9eec09ec77ff0c93ebc97b47ac5d9fa4a549c5020182fd48ce795256c9c2c62773120280a083394f3fc926f0ee5cc57cb680fe9beb42398eb45a4729c1f98cdb2f1ea81f1db75f42", 0x7b, 0x2000000000000000}], 0x0, 0x0) 04:26:48 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getresgid(&(0x7f0000000000), &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) r4 = getegid() setgroups(0x2, &(0x7f0000000040)=[0x0, r4]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) setresgid(r4, r3, r5) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, r2}, 0xc) r6 = syz_open_dev$vcsa(&(0x7f0000000200), 0xa60, 0x101500) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000240), &(0x7f0000000280)=0x8) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000040)=0xace, 0x4) dup3(r0, r1, 0x0) [ 87.466983] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 87.468711] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 87.477358] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 87.489062] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 87.491455] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 04:26:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ftruncate(r2, 0x5) ioctl$TIOCGPTPEER(r1, 0x5441, 0x3) r4 = memfd_create(&(0x7f0000000340)='\x00', 0x0) ftruncate(r4, 0x2001000) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000009, 0x2011, r4, 0x0) pwritev2(r4, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) ftruncate(r4, 0x84) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) [ 87.561050] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 87.599708] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 87.600657] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 87.603429] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 04:26:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101802, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x200f5ef, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001340)={0x0, @tipc, @ipx={0x4, 0x0, 0x0, "9451bd5afbf6"}, @nl=@proc}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) syncfs(0xffffffffffffffff) r6 = socket$inet6(0xa, 0x80000, 0x100) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e24, 0x100, @local, 0x1}, 0x1c) writev(r5, &(0x7f00000001c0)=[{&(0x7f0000000280)="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", 0xe9d}, {0x0}, {0x0}, {&(0x7f00000013c0)="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", 0x151}], 0x4) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x3, r1}) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r7, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0xa}}) sendfile(r7, r4, &(0x7f0000000180)=0xac, 0x8) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140), &(0x7f0000001540)=ANY=[@ANYBLOB="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"], 0xb5, 0x1) 04:26:48 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000012c00)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x6}, [{0x2, 0x2, r1}, {0x2, 0x2, r2}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x1, r3}, {0x2, 0x8, 0xee01}, {0x2, 0x1, 0xee00}, {}, {0x2, 0x7}], {0x4, 0x5}, [{0x8, 0x3}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x74, 0x0) chroot(&(0x7f0000000180)='./file0\x00') umount2(&(0x7f00000003c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) 04:26:48 executing program 7: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0xa}}) fallocate(r1, 0x6, 0x9, 0x1) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x200f5ef, 0x0) fallocate(r2, 0x10, 0x0, 0x7fff) [ 87.693009] audit: type=1400 audit(1629779208.737:7): avc: denied { open } for pid=3924 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 87.695926] audit: type=1400 audit(1629779208.737:8): avc: denied { kernel } for pid=3924 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 87.757581] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 88.206638] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 88.207571] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 88.210282] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 88.291326] syz-executor.7 (3932) used greatest stack depth: 24320 bytes left [ 88.295460] syz-executor.6 (3923) used greatest stack depth: 23808 bytes left [ 88.313679] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 88.315032] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 88.317478] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 98.521061] kmemleak: 41 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 104.409568] kmemleak: 16 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:27:12 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r0, 0x0) r1 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x580b, 0x0, 0x3, 0x200000, 0x0, r0}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000540)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, {0xffff}}, 0x8a1) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x7, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x76d3, 0x0, 0x0, 0x0, 0x0) 04:27:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101802, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x200f5ef, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001340)={0x0, @tipc, @ipx={0x4, 0x0, 0x0, "9451bd5afbf6"}, @nl=@proc}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) syncfs(0xffffffffffffffff) r6 = socket$inet6(0xa, 0x80000, 0x100) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e24, 0x100, @local, 0x1}, 0x1c) writev(r5, &(0x7f00000001c0)=[{&(0x7f0000000280)="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", 0xe9d}, {0x0}, {0x0}, {&(0x7f00000013c0)="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", 0x151}], 0x4) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x3, r1}) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r7, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0xa}}) sendfile(r7, r4, &(0x7f0000000180)=0xac, 0x8) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140), &(0x7f0000001540)=ANY=[@ANYBLOB="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"], 0xb5, 0x1) 04:27:12 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "afb6a5", 0x14, 0x2b, 0x0, @remote, @local, {[], {{0x1, 0x2, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 04:27:12 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x4, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000400)) chdir(&(0x7f0000000040)='./file0\x00') r1 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) dup2(r0, r1) 04:27:12 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000012c00)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x6}, [{0x2, 0x2, r1}, {0x2, 0x2, r2}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x1, r3}, {0x2, 0x8, 0xee01}, {0x2, 0x1, 0xee00}, {}, {0x2, 0x7}], {0x4, 0x5}, [{0x8, 0x3}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x74, 0x0) chroot(&(0x7f0000000180)='./file0\x00') umount2(&(0x7f00000003c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) 04:27:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r1, r0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) 04:27:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x258, 0xe, 0x9, 0x101, 0x70bd2a, 0x25dfdbff, {0x2, 0x0, 0x1}, [@typed={0x4, 0x87}, @generic="231fd5c37e19b1726bdcac786efeaf62f80213333de0b490fe34197e2578d8603a637662396fce55d27d0cc82161f11b6c4f3897b26817c875163884471f3423d2786281a1872594102345904860eb4904731c29e647a45db084924ea4bdf50c8609de67d2ac95b1eaed311e849cf03d19dfff3f3d93c8", @typed={0x4, 0x32}, @nested={0xea, 0x8a, 0x0, 0x1, [@generic="73b21f10f909fdf3fd6a9ad1e5d3c5276711e2ad9f1ea18712d612a657666da878e68a22a53e1418eb239401dc6dc0036f5f5a295f1d9472b1965a342185f20589d2aeb49a2b4646b031a72216214984962b56a79ca5b8c16f6bdf59f877c91eed7d975f0d6de62e113b77c9a0f139fe456ab6b9d3086ce1949b1fb318d02bec533789b06b0992937b40114c6683c4b4ef92f261432efdbbd82a81863db5e1f0d33cc32c17b0d7c39429ef9bda74a7a3235e8bcd9279b36f7e4a081556caa61fce916e2627c828ed02393685f884dae34820c3dfb36d22db34aff3a051e18d29113d429a7035"]}, @nested={0xd8, 0x15, 0x0, 0x1, [@typed={0x8, 0x28, 0x0, 0x0, @pid}, @typed={0x4, 0x56}, @generic="a390d88b06511cf6217764878e17b0cf1458d0c3dc73e3a9610f38606374a05ca9a073e0e42fd8a358", @typed={0x14, 0x69, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x20}}, @typed={0x8, 0x92, 0x0, 0x0, @u32=0x8000}, @generic="f38c8f8abf7f4e85b4715c9ef47892399840a3683bb7982734a876dfee4e22aa6807ff28b98bf41552b1e8b1d6fad498e8f7abc09a61492298d5fd6337ac007b5e6c6d90dd8f24aa71c49d917ba5bf7f36f59297be0469504960feaab4f09942ca3fa454ed3fd83b93c9aeb2a484a8e6d3e65c5401bf67fe200f4d2e19182a41c78d87"]}]}, 0x258}, 0x1, 0x0, 0x0, 0x8028804}, 0x4044000) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x14, 0x1e, 0xc21, 0x0, 0x0, {0x1f, 0x2}}, 0x14}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x401, 0x4) 04:27:12 executing program 7: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0xa}}) fallocate(r1, 0x6, 0x9, 0x1) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x200f5ef, 0x0) fallocate(r2, 0x10, 0x0, 0x7fff) [ 111.290314] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2318 sclass=netlink_route_socket pid=4000 comm=syz-executor.3 [ 111.324995] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2318 sclass=netlink_route_socket pid=4000 comm=syz-executor.3 04:27:12 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x3, 0x0, &(0x7f0000000140)=0x0) timer_delete(r0) clock_gettime(0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000200), 0x0) [ 111.473159] syz-executor.2 (4011) used greatest stack depth: 23600 bytes left 04:27:12 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "afb6a5", 0x14, 0x2b, 0x0, @remote, @local, {[], {{0x1, 0x2, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 111.515713] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:27:12 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xb4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff7fe, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:27:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r1, r0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) 04:27:12 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000208200004fffffffffffe", 0x17}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000300)=ANY=[]) r1 = fcntl$dupfd(r0, 0x0, r0) openat(r1, &(0x7f0000000040)='./file0\x00', 0x50f980, 0x114) 04:27:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f80000200040000300000000000000010000000000000002", 0x2d}, {&(0x7f0000000140)="f8ffff1000000a0ff8ffff0f", 0xc, 0x4000}, {&(0x7f0000000280)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020100089eb70325132510000eb70325103000000000041660069006c00650031000f00100000ffffffffffffffffffff0000ffffffff46494c4531202020202020200089eb70325132510000eb70325105000a5b", 0x9e, 0x4800}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x109100, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000180)='vfat\x00', &(0x7f00000001c0)='./file2\x00', 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r3, 0x5609, &(0x7f0000000080)) copy_file_range(r1, &(0x7f0000000340)=0x4, r1, &(0x7f0000000380), 0x1, 0x0) [ 111.630102] FAT-fs (loop5): bogus number of directory entries (65535) [ 111.631188] FAT-fs (loop5): Can't find a valid FAT filesystem [ 111.694556] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 111.699519] FAT-fs (loop5): bogus number of directory entries (65535) [ 111.700488] FAT-fs (loop5): Can't find a valid FAT filesystem [ 111.711739] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 580) [ 111.712917] FAT-fs (loop2): Filesystem has been set read-only [ 111.737104] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 580) [ 111.766640] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 111.848518] syz-executor.6 (4007) used greatest stack depth: 23448 bytes left [ 121.894793] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:27:30 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r0, 0x0) r1 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x580b, 0x0, 0x3, 0x200000, 0x0, r0}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000540)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, {0xffff}}, 0x8a1) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x7, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x76d3, 0x0, 0x0, 0x0, 0x0) 04:27:30 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0xa}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'macvlan0\x00', {0x2, 0x0, @broadcast}}) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2c, 0x14, 0x1, 0x0, 0x0, {0xa}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x14, 0x2, 0x0, 0x0, @ipv6=@private1}]}]}, 0x2c}}, 0x0) 04:27:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f80000200040000300000000000000010000000000000002", 0x2d}, {&(0x7f0000000140)="f8ffff1000000a0ff8ffff0f", 0xc, 0x4000}, {&(0x7f0000000280)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020100089eb70325132510000eb70325103000000000041660069006c00650031000f00100000ffffffffffffffffffff0000ffffffff46494c4531202020202020200089eb70325132510000eb70325105000a5b", 0x9e, 0x4800}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x109100, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000180)='vfat\x00', &(0x7f00000001c0)='./file2\x00', 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r3, 0x5609, &(0x7f0000000080)) copy_file_range(r1, &(0x7f0000000340)=0x4, r1, &(0x7f0000000380), 0x1, 0x0) 04:27:30 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x200040, 0x1ec) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000080)={0x0, 0x10000, 0x800, 0x0, 0x0, 0xfffffffe}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/asound/seq/clients\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000400)=[{&(0x7f00000001c0)=""/12, 0xc}], 0x1, 0x0, 0x0) 04:27:30 executing program 1: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000002a40)=0x0) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000580)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @local}}, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r5, 0x0) io_uring_enter(r5, 0x1524, 0x775b, 0x2, &(0x7f0000000140)={[0x7ff]}, 0x8) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000240)={'syz_tun\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="08000000fcffffff3f00000000000000000000005ed3298f681e8a00"/44]}) ioctl$sock_inet_SIOCSARP(r4, 0x8955, &(0x7f0000000000)={{0x2, 0x4e24, @empty}, {0x6, @broadcast}, 0x40, {0x2, 0x4e21, @remote}, 'hsr0\x00'}) io_uring_enter(r0, 0x76d2, 0x0, 0x0, 0x0, 0x0) 04:27:30 executing program 4: ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000003c0)) io_setup(0x5, &(0x7f0000000080)=0x0) io_submit(r0, 0x1, &(0x7f00000008c0)=[&(0x7f0000000200)={0x0, 0x0, 0x5, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000140)="ee", 0x1, 0x800000}]) io_destroy(r0) io_setup(0x800, &(0x7f0000000500)=0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r2, 0x0) r3 = memfd_create(&(0x7f0000000640)='\\\x9e&#&{\x00', 0x5) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000780), 0xa02800, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000880), 0x5, 0x8001) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000980), 0x980, 0x0) io_submit(r1, 0x4, &(0x7f0000000a00)=[&(0x7f0000000600)={0x0, 0x0, 0x0, 0x7, 0x275, 0xffffffffffffffff, &(0x7f0000000540)="032b522c5a99aa882e5b2dd07c56b95478dad52cbeb4f9d9ed00f864c0f03d1b1a3ce29468477615bd7f4a29695e2ad6314a44e9610c3c2f3d4f8bd363d23ef3497d0b3bfb00fb75bf5130f09d7c5ca4fb6cb0a7d7466146db034e80efd0a03887f21cf7211a70005790747e289286270834d0cf20b5619b91dc841a0b6d3b3c1544ab5b7c582356", 0x88, 0x1, 0x0, 0x3, r2}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x2, 0x7fff, r3, &(0x7f0000000680)="54c83ce82ae2e925dd1c6113e7adac54b30117b04cd087a78fa084267da3d0f067861f084c96f35ab6e41c7ab3665d7e16d7509a410fa3b7316702b323be0cbec1614e5a636766d5e56e530fbe644e75f72d9abe9e0a8d9ecdc9315ad5ef2767dd52bc30e776a054299a63b35198b7e9c6590e0631c37bbb92d04b2404e0fb10a236fb1bfe98254ae772b4c72d76a9a568bc1bac7bb4216f39b8693b67be21f7c03fbe71820d9b0e88d1d27b4a91ab911d2a01d6498a844eb08dee9ec3bb454e9005", 0xc2, 0x2, 0x0, 0x1, r4}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x1, 0xf70, 0xffffffffffffffff, &(0x7f0000000800)="668460136c5160dbb388245d57e9be4c5c2fcee2c457537017a67fad89e38daf04d363cafa3aacc51d4626edb6f54632571df2f0418e6f1203", 0x39, 0x4}, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x7, 0x8, r5, &(0x7f0000000900)="e5bc6138ba50179000897b650b6f3c9360e9cffc9eb4bc3eb3b2a8c521a673c2c322971cc82ca7b7878b97a49cea994dea29f28aedbe847883895a9ff3f064dce5be0397dbbf2b4ae5a59ad9b9184de994abbf6f4e2d47a15ae303f7dd24b7d12b5b366a9a34c4578cc004e01f4617755ad1dc2b2e114d9b561858e37c45ee94", 0x80, 0x888e, 0x0, 0x2, r6}]) syz_emit_ethernet(0x364, &(0x7f0000000000)={@empty, @remote, @void, {@mpls_uc={0x8847, {[{0xfcd40, 0x0, 0x1}, {0x2}, {0x4, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0x101, 0x0, 0x1}], @ipv6=@gre_packet={0xd, 0x6, "c1709b", 0x31a, 0x2f, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast1, {[@hopopts={0x3b, 0x11, '\x00', [@ra={0x5, 0x2, 0x6694}, @enc_lim={0x4, 0x1, 0x7}, @enc_lim, @generic={0x0, 0x5f, "ea0fd5f2898a97f378e3ddf9b71f74775c837444626a2f4b11b63ed42f7cfa75fd648865ed70dcf9c5ca3d8f400230d869bab308abdaa26d5551b2645b9d85bb8a3d0a928b365f44b9af696c8a47b966434e0294805803a0773f70a6fa14db"}, @hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @ra={0x5, 0x2, 0x5}, @padn={0x1, 0x2, [0x0, 0x0]}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}, @srh={0x2f, 0xe, 0x4, 0x7, 0x9, 0x50, 0x5, [@dev={0xfe, 0x80, '\x00', 0x3f}, @initdev={0xfe, 0x88, '\x00', 0x80, 0x0}, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private0={0xfc, 0x0, '\x00', 0x1}]}, @dstopts={0x0, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0x8}]}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x880b, 0xfa, 0x0, [0x7f], "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"}, {0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x800, [0x7, 0x2]}, {0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x86dd, [0x1f, 0xff28], "2f3f8e7f6aae22f03032051eda06153f55148b67ab70d5b9958da88f0876a5d9ab4d2bfbd762c8597ae756147d0503d290466f36897b0b7071696b1ad9b18820f972a91e391ba97b5c146d4cd06e"}, {0x8, 0x88be, 0x2, {{0x8, 0x1, 0x8, 0x1, 0x1, 0x2, 0x0, 0x7f}, 0x1, {0x80007f}}}, {0x8, 0x22eb, 0x2, {{0xa, 0x2, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1}, 0x2, {0x7, 0xffc1, 0x0, 0xc, 0x1, 0x1, 0x3}}}, {0x8, 0x6558, 0x4, "677d94d422a4c72676cbac31b34e6c0a3c314e996d2c1279ab063eac5516df046c31d9004a1e2ee0f7cff8f63e20f82b38ece0a34041ed775dfd531aef604a728d64044b19ec36f1fb6aecdffe13360cb1a2fd10bb49bfa59730706ff2db28f282b3d5e2"}}}}}}}}, 0x0) syz_emit_ethernet(0x113, &(0x7f0000000380)={@multicast, @remote, @void, {@ipx={0x8137, {0xffff, 0x105, 0x3f, 0x1, {@broadcast, @broadcast, 0x8}, {@current, @random="062c321efe52", 0x7}, "8d8776ed283440cd32fbba30e76de4a6ebf036343e0fdbccdac0d0fc3352ec5d2386880b3f5563ae1e0c2d7e325ededda2643bc3d3332d642d8f8e9bfdfcc140da020b32cfc31a4105caebdd106a96450c35f29dfda1cb4b96827bdba74c0b6d98fcf6c94851dbf9802afd99521b3fb560ebf576d043406108d8a7358cbc5a3a3d5d5f10feb97e8c92293908761de251e843bf3bc553785544e64c3905e7808a04b0bdd73820a5a32a96397ea496b90b0210f9a396e6dd1ec926f392dbb5bbde384648ad6d12c732a6a9c391afafb57a46f44a4e294d3f485de57e19adc4f87d7bce1ad1a4ae56"}}}}, &(0x7f00000004c0)={0x1, 0x4, [0x2d1, 0xa7c, 0x183, 0x9c7]}) 04:27:30 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400028001000270000004f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8fffffff0ff", 0x26, 0x1e0}, {&(0x7f0000010300)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202010007deb70325132510000eb70325103", 0x5b, 0x600}, {&(0x7f0000010500)="2e2020202020202020202010007deb70325132510000eb7032510300000000002e2e20202020202020202010", 0x2c, 0x11400}], 0x0, &(0x7f0000010d00)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="0a00009437000000"]}) connect(r1, &(0x7f0000000300)=@nfc={0x27, 0x0, 0x1, 0x1}, 0x80) openat(r0, &(0x7f0000000080)='./file0\x00', 0x600002, 0x2f) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat(r0, &(0x7f0000000280)='./file0\x00', 0x8100, 0x1e0) openat(r3, &(0x7f00000002c0)='./file0\x00', 0x4001, 0x12) fchmod(r2, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="28000000f703000129bd7000fcdbdf250700060000000000000066696c65302e2f66696c65300000"], 0x28}, 0x1, 0x0, 0x0, 0x24040040}, 0x40081) 04:27:30 executing program 7: socketpair(0x1, 0x80000, 0x7fffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm, @sack_perm, @mss={0x2, 0x3}, @window={0x3, 0x7, 0x7}, @window={0x3, 0x8}], 0x5) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000100)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='reno\x00', 0x5) syz_genetlink_get_family_id$SEG6(&(0x7f0000000180), r1) socketpair(0x23, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, 0x0, &(0x7f0000000240)) r5 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x408000, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_io_uring_setup(0x14aa, &(0x7f0000000340)={0x0, 0x1618, 0x1}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000003c0), &(0x7f0000000400)=0x0) syz_io_uring_submit(0x0, r6, &(0x7f0000000440)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, r2}, 0x1) statx(r5, &(0x7f0000000540)='./file0\x00', 0x800, 0x0, 0x0) fstat(r5, &(0x7f0000000680)) syz_mount_image$ext4(&(0x7f0000000480)='ext2\x00', &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, &(0x7f0000000500), 0x1000, &(0x7f0000000700)=ANY=[@ANYBLOB='grpjquota=./file0,bsdgrkupd,resuid=', @ANYRESHEX=0x0, @ANYBLOB=',dioread_nolock,commit=0x0000000000000002,block_validity,dont_appraise,euid>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r7 = dup2(0xffffffffffffffff, r3) ioctl$BTRFS_IOC_SCRUB_CANCEL(r7, 0x941c, 0x0) 04:27:30 executing program 6: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(r1, &(0x7f00000017c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/sctp\x00') ioctl$sock_SIOCGIFINDEX(r4, 0x8914, &(0x7f0000000140)={'macsec0\x00'}) [ 129.192460] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 129.256238] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 580) [ 129.258168] FAT-fs (loop2): Filesystem has been set read-only 04:27:30 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) r0 = syz_io_uring_setup(0x970, &(0x7f0000000200), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000001c0)) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r1, 0x0) ioctl$TCSETSW2(r1, 0x402c542c, &(0x7f0000000040)={0x200, 0x39, 0x0, 0x0, 0x0, "4a3dbf407fec076bddea7d2ca392f36e0b1f66", 0x4, 0x766}) r2 = syz_open_procfs(0x0, &(0x7f00000005c0)='fdinfo/3\x00') io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000000)=[r2], 0x1) 04:27:30 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = socket$netlink(0x10, 0x3, 0xb) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x3f, 0x0, &(0x7f0000000480), 0x82400, &(0x7f00000004c0)=ANY=[@ANYBLOB='norock,norock,gid=', @ANYRESHEX=0xee00, @ANYBLOB=',map=normal,norock,sbsector=0x000\x00\x00000000,utf8,cruft,f\x00f8,cruft,context=staff_u,uid<\x00\x00\x00\x00\x00', @ANYRESDEC=0xee01, @ANYBLOB=',dont_hash,obj_role=.u#/,mask=MAY_WRITE,measure,seclabel,\x00']) r4 = openat(r3, &(0x7f00000005c0)='./file1\x00', 0x20000, 0x40) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r4) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r2, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f00000006c0)={0x1c, 0x0, 0x300, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x2004c880}, 0x404c882) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(r0, 0x40049409, r6) sendmsg$NL80211_CMD_SET_PMK(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)={0xbc, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x4}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_PMK={0x14, 0xfe, "7a71b34339daac0bd6c65ca33f3c78bd"}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_PMK={0x14, 0xfe, "8116318664cdae6aec6b71baba6f6dfb"}, @NL80211_ATTR_PMKR0_NAME={0x14, 0x102, "7967270bf70abf4d1505000000a80f88"}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_PMK={0x14}, @NL80211_ATTR_PMK={0x14, 0xfe, "cf0600000000000000f05fd28e7ce85e"}]}, 0xbc}}, 0x8000) fallocate(0xffffffffffffffff, 0x12, 0x10001, 0x84eb) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400, 0x101) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 04:27:30 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400028001000270000004f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8fffffff0ff", 0x26, 0x1e0}, {&(0x7f0000010300)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202010007deb70325132510000eb70325103", 0x5b, 0x600}, {&(0x7f0000010500)="2e2020202020202020202010007deb70325132510000eb7032510300000000002e2e20202020202020202010", 0x2c, 0x11400}], 0x0, &(0x7f0000010d00)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="0a00009437000000"]}) connect(r1, &(0x7f0000000300)=@nfc={0x27, 0x0, 0x1, 0x1}, 0x80) openat(r0, &(0x7f0000000080)='./file0\x00', 0x600002, 0x2f) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat(r0, &(0x7f0000000280)='./file0\x00', 0x8100, 0x1e0) openat(r3, &(0x7f00000002c0)='./file0\x00', 0x4001, 0x12) fchmod(r2, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="28000000f703000129bd7000fcdbdf250700060000000000000066696c65302e2f66696c65300000"], 0x28}, 0x1, 0x0, 0x0, 0x24040040}, 0x40081) 04:27:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000001b40)=[{&(0x7f0000010000)="200000004000000003000000320000000f000000000000000200000002000000008000000080000020000000dbf4655ffff4655f0100ffff53ef01000100006566f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)) unlink(&(0x7f0000000080)='./file0\x00') [ 129.378081] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 580) 04:27:30 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001700), 0xffffffffffffffff) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="21030000000000000000040000002000018008000100", @ANYRES32=r4, @ANYBLOB="14006136655f310000"], 0x34}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001700), 0xffffffffffffffff) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)={0x34, r6, 0x321, 0x0, 0x0, {0x4}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}]}]}, 0x34}}, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001700), 0xffffffffffffffff) r11 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="2003000000000000000004000000204d4c8008e101009106896b4b5c22a8e3f15b11eac86988e642dca2f3af77150f3d6c5074a5842ddd1d9b879aedf2424d044c2beb13f7855045e62dc7ab4d7142", @ANYRES32=r12, @ANYBLOB="140002006272696467655f736c6176655f310000e2a7573b6c6bb6cf0109a045f1c67ebbdd87bd2023e1588f47c28042e618684f7f4ed06db674b0b046f0107f722fa7dad32f0afdc9f983c643c396b2882e90b104815d1483a04ec22a26cc009fe341d695420e7dab70c10d8d"], 0x34}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000dc0)={0x518, 0x0, 0x1, 0x70bd2d, 0x25dfdbfe, {}, [{{0x8}, {0xbc, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}]}}, {{0x8}, {0x148, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0x228, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xcaf3}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x100}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8}}, {0x8, 0x6, r12}}}]}}]}, 0x518}, 0x1, 0x0, 0x0, 0x801}, 0x0) r13 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r13, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r14}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_TX_RATES={0x4}]}, 0x2c}}, 0x0) [ 129.503096] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 141.442606] kmemleak: 17 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:27:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0xa}}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000180)={0x0, 0x9, 0x5}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pwrite64(r0, &(0x7f0000000580)="e073de28a7c7f1c89371143574e8a1e614f036e36ebfb2f86d62a57dc65b63a44a7ce73d990b6d0aa6ccf2eafe9f3c30fbb8088d25e61368950c976032ee46ff6ed10e5cfde2b63873388efee6e35f2ec26f96c9325437eb026efdcbd3b44621dc8835f1faed7ccddc7806837d6ffc09dda0078aae9078399d5cfea35c644ffc", 0x80, 0xfa) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_DEV(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x2, 0x70bd26, 0x25dfdbff, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r2}]}, 0x34}}, 0x4000000) fork() 04:27:49 executing program 5: creat(0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000001880)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x8, 0x0, "e838101e7b9a5d8333d402046e4fa3b469a144c0b255d40b8055ea3505456429ede9750f780504d16fc00cceb8fd57bd1027e9afae1129eb68c6f3e15b9cc5cb95055ee1aa7012dd8385f3c6094b7df4"}, 0xd8) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00') r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xbf, 0xc001) getsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000001980)=""/4096, &(0x7f0000000100)=0x1000) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000080)={0x9, 0x5, 0xa1de, 0x4, 0xb6, 0x8, 0x81}, 0xc) 04:27:49 executing program 7: prctl$PR_SET_THP_DISABLE(0x29, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x0) syz_emit_ethernet(0x129, &(0x7f0000000000)={@random="4a0245671b62", @multicast, @val={@val={0x9100, 0x6, 0x0, 0x1}, {0x8100, 0x4, 0x0, 0x1}}, {@ipx={0x8137, {0xffff, 0x113, 0x0, 0x4, {@random=0x800, @broadcast, 0x1}, {@broadcast, @current, 0x8}, "1783f2a836b70524ea97bbdb231b54a216761841371079ee9ea9e3f24e1d9a152c8c9ad6ef4abcd63966c6fcc41ae30e4e4c79f7c6d5683151c99975fba0b008fcfb58e1c78c1dd1a04b356868866eb77eb1fd6ea5e7c1c8d6dbf340d80331bec0c2e65cb83256f5a262c8e962bf8486a8a1b3b0008097de3fcd6cb4507b585c12bfcb9e23726d1294e63663ab5c0f665ff4ac865e5e2e981c5b88d3d927267e0590bd58c4d69b81dda7929e3cdee67d1899795510d0a1d80aaf114a69feda23dc1891c22910810145a31faec359b8056a39b3529781ffa3e65cac0d14a39b28e9af7f0781f0ca60c631cb4cdd0290a47a56201efc"}}}}, &(0x7f0000000140)={0x1, 0x3, [0x235, 0xe0a, 0x5a9, 0xa65]}) prctl$PR_SET_THP_DISABLE(0x29, 0x0) 04:27:49 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = socket$netlink(0x10, 0x3, 0xb) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x3f, 0x0, &(0x7f0000000480), 0x82400, &(0x7f00000004c0)=ANY=[@ANYBLOB='norock,norock,gid=', @ANYRESHEX=0xee00, @ANYBLOB=',map=normal,norock,sbsector=0x000\x00\x00000000,utf8,cruft,f\x00f8,cruft,context=staff_u,uid<\x00\x00\x00\x00\x00', @ANYRESDEC=0xee01, @ANYBLOB=',dont_hash,obj_role=.u#/,mask=MAY_WRITE,measure,seclabel,\x00']) r4 = openat(r3, &(0x7f00000005c0)='./file1\x00', 0x20000, 0x40) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r4) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r2, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f00000006c0)={0x1c, 0x0, 0x300, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x2004c880}, 0x404c882) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(r0, 0x40049409, r6) sendmsg$NL80211_CMD_SET_PMK(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)={0xbc, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x4}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_PMK={0x14, 0xfe, "7a71b34339daac0bd6c65ca33f3c78bd"}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_PMK={0x14, 0xfe, "8116318664cdae6aec6b71baba6f6dfb"}, @NL80211_ATTR_PMKR0_NAME={0x14, 0x102, "7967270bf70abf4d1505000000a80f88"}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_PMK={0x14}, @NL80211_ATTR_PMK={0x14, 0xfe, "cf0600000000000000f05fd28e7ce85e"}]}, 0xbc}}, 0x8000) fallocate(0xffffffffffffffff, 0x12, 0x10001, 0x84eb) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400, 0x101) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 04:27:49 executing program 6: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40012180}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r4, 0x0) io_uring_enter(r4, 0x288e, 0xf85, 0x1, &(0x7f0000000000)={[0x81]}, 0x8) sendmsg$AUDIT_LIST_RULES(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x10}, 0x10}}, 0x0) 04:27:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000380)="f5ee42fa4d5c9d790751ff420d47fb02e60cd599be79e906219f388f29ff8c89120c84c770ef05ea4aaf986997c43fd50dd140daf9e7b70a3b4a6eb9f29a57bfa8a60bac8a41e45026eb4d68f7adaeb254b252ddeb9d5579cab8e9b26fcb338e07745172fd7ba036a4e8f6847e66aa2ebd6ebaf1b54470cbf73f121f904f0523271386fd07d7472da972e53e8a0caaa9bc973a00056aaa11501143d0", 0x9c, 0x2}, {&(0x7f00000000c0)="dd4c207e35dbb65d5c0953df4721ab8ec227145e9bbadbd9fb0003fd4f36", 0x1e}, {&(0x7f0000000200)="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", 0xfd, 0x100000000}], 0x20, &(0x7f0000000000)={[{@usrquota}, {@max_batch_time={'max_batch_time', 0x3d, 0x10000}}], [{@smackfsdef={'smackfsdef', 0x3d, '}*['}}, {@appraise}, {@euid_gt={'euid>', 0xee00}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 04:27:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) r0 = syz_io_uring_setup(0x970, &(0x7f0000000200), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000001c0)) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r1, 0x0) ioctl$TCSETSW2(r1, 0x402c542c, &(0x7f0000000040)={0x200, 0x39, 0x0, 0x0, 0x0, "4a3dbf407fec076bddea7d2ca392f36e0b1f66", 0x4, 0x766}) r2 = syz_open_procfs(0x0, &(0x7f00000005c0)='fdinfo/3\x00') io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000000)=[r2], 0x1) 04:27:49 executing program 3: select(0xfefdffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2710}) mq_open(&(0x7f0000000000)='\\\v-[h\x00', 0x800, 0x122, &(0x7f0000000040)={0x3, 0xfffffffffffffff8, 0x80000001, 0xd1f}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0xa}}) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "c009b39830e4109622d7a29d0bd42e6d365c8384f665a2104b6faaa5427626b93311e77f0de4211e1217bc355a5246327eb7ba126bf7e4adb45535a4d9757c77f555e42c9254e9f9089be590271f821f5f6b632da2dabf1d6e618629da57a34a33f5e913338e628f32d84f60dbb9f94b70f1828e7d652bb2443c02901738d15cd72d14288f0d47dfe96e49988d0402f96628f97be361723e018daf71ab695fa4726664c00ec9aa53b8c092760da4cd088f03fad6504eceb8949dc35abc6c9f51916777bc38aa3669fb220546dbd1024eb87da205b46ec35180a8fcb898160855b5044023da75f2b1f285c1462a8afa95492a14be3f42052ff535612d226506a0", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {0x0}, {}, {}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {}, {r2}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0}, {}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {0x0}, {0x0}, {}, {}, {}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0}, {}, {}, {0x0}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, r3}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}], 0x0, "46dacd8396fe92"}) r104 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r104, 0xc020f509, &(0x7f0000000000)={r104, 0x3, 0x87, 0x100000000}) r106 = mq_open(&(0x7f0000005c00)='-@\x00', 0x42, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) mq_timedsend(r106, &(0x7f0000001200), 0x0, 0x3, &(0x7f00000012c0)) ioctl$BTRFS_IOC_INO_LOOKUP(r106, 0xd0009412, &(0x7f0000000100)={r108, 0x1000}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r105, 0xc0709411, &(0x7f00000000c0)={{r108, 0x80000001, 0x4, 0x6, 0x6, 0x6, 0x7f, 0x5, 0x7f, 0x7013, 0x9, 0x400, 0x2, 0x7}, 0x18, [0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000004b480)={0x3, [{0x0, 0x0}, {}, {}, {0x0}, {}, {}, {}, {0x0}, {}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0}, {0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}], 0x9, "0cf7f31a3da148"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f000004c480)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r106, 0xd000943d, &(0x7f0000055480)={0x6, [{}, {}, {}, {}, {0x0, r95}, {0x0, r30}, {r83}, {}, {}, {r215}, {r4}, {}, {}, {0x0, r148}, {r206, r193}, {r145}, {}, {r134, r151}, {r79, r138}, {r86}, {}, {0x0, r101}, {}, {0x0, r186}, {r111}, {0x0, r190}, {r76}, {}, {}, {r120, r204}, {r213, r186}, {0x0, r180}, {r68}, {r146, r51}, {}, {r136, r164}, {r40}, {0x0, r199}, {}, {r200}, {0x0, r100}, {0x0, r65}, {r13}, {}, {0x0, r141}, {r173}, {0x0, r210}, {}, {0x0, r176}, {}, {}, {0x0, r183}, {0x0, r12}, {0x0, r33}, {r67}, {r83}, {r166}, {r131, r191}, {}, {r21}, {0x0, r41}, {}, {}, {}, {r54}, {}, {0x0, r159}, {r197}, {r115, r149}, {0x0, r37}, {r122}, {}, {0x0, r16}, {0x0, r61}, {0x0, r50}, {}, {0x0, r27}, {r9}, {0x0, r43}, {r35}, {0x0, r171}, {}, {0x0, r57}, {r123, r198}, {r28}, {}, {r23, r116}, {0x0, r158}, {r168, r156}, {r126, r102}, {}, {r170, r16}, {r207}, {r157, r178}, {}, {0x0, r137}, {}, {0x0, r72}, {r34}, {0x0, r155}, {r152}, {r120, r18}, {0x0, r194}, {r48}, {r94}, {r22, r72}, {0x0, r58}, {0x0, r184}, {r83, r139}, {r201}, {r29, r151}, {r15, r63}, {r144}, {0x0, r163}, {r196}, {r153}, {}, {}, {}, {0x0, r17}, {}, {0x0, r160}, {0x0, r150}, {}, {r185, r25}, {r88}, {r201}, {0x0, r27}, {r24, r44}, {0x0, r154}, {r66}, {}, {}, {}, {}, {0x0, r183}, {r205, r92}, {}, {r56, r188}, {}, {}, {0x0, r117}, {r133}, {r11}, {r174}, {r211}, {r119}, {}, {r49, r161}, {}, {r99, r84}, {r195, r89}, {r182}, {0x0, r70}, {0x0, r60}, {}, {r74}, {}, {r85}, {r135, r162}, {r202}, {}, {r75}, {}, {r87}, {}, {}, {r53}, {r107, r26}, {}, {0x0, r169}, {r172}, {r36, r97}, {}, {r54}, {0x0, r98}, {}, {0x0, r103}, {r177}, {0x0, r208}, {r167}, {r165}, {r96, r127}, {0x0, r148}, {}, {0x0, r212}, {r69, r142}, {r31}, {}, {0x0, r175}, {r109}, {r62}, {r112}, {}, {}, {0x0, r10}, {r113, r114}, {}, {r140}, {r143}, {r132, r130}, {0x0, r38}, {}, {0x0, r214}, {0x0, r125}, {0x0, r45}, {}, {r64, r121}, {r189}, {0x0, r5}, {}, {}, {}, {}, {}, {r93}, {0x0, r8}, {r80, r32}, {r209, r71}, {}, {r77, r103}, {r179, r14}, {0x0, r147}, {r55}, {}, {0x0, r82}, {r73}, {r59}, {}, {r6}, {}, {}, {r39}, {0x0, r7}, {r118}, {0x0, r43}, {r49, r90}, {0x0, r91}, {r20, r187}, {0x0, r124}, {r128, r110}, {r19}, {}, {}, {}, {r203, r47}, {0x0, r181}, {r46, r81}, {r78}, {}, {r42}, {}, {}, {r52, r129}, {r133}], 0x9, "d5155521dcd0eb"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004d480)={0xffffffffa0faf43c, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {r108}, {r192, r216}], 0x4, "541395223c0b7a"}) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000000100)={r108, 0x81}) [ 148.107826] audit: type=1400 audit(1629779269.151:9): avc: denied { write } for pid=4145 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 04:27:49 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000280)={0x5, 0x80, 0xfb, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x800, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0xd}, 0xa000, 0x2, 0x3, 0x5, 0x1, 0x5, 0x2, 0x0, 0xfffffffe, 0x0, 0x4}, r1, 0x6, r1, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, &(0x7f0000000300)={{r0}, 0x0, 0xc, @unused=[0x3, 0x8, 0x10001, 0x8000], @subvolid=0x5}) umount2(&(0x7f0000000140)='./file0\x00', 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x4) creat(&(0x7f0000000180)='./file0\x00', 0x101) connect(r1, &(0x7f0000001300)=@ipx={0x4, 0x3a1, 0x3, "25a636af12c7"}, 0x80) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000000c0)={0x0, 0xfffefffffffffffd}) 04:27:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="51640000000072b0"], &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5305) r1 = geteuid() syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x4, 0x8, &(0x7f00000014c0)=[{&(0x7f0000000140)="ccd515565f1e51c5e6391ae1611b87b72cedf3a94b2c727418", 0x19, 0x1}, {&(0x7f0000000180)="f8080f05af2e402ae3bbedff632a70062085645730543ca020b31105ff86024caee27e7e22f2ebdd63f1660ee361ed610fa3421dfa70184cc9a4431e342da8a18bb4c52db01e5e1f341fbe31b50f75e54a45bcbad80b9114331a6ff6357f52f7e837c42c62da2b23be60bd7043f74a1c1dd172707659b6801f16f464a2ac1fc095f4b01649e3a52ef70db7feefeb0810c0699c95743481b3add133fb9b05596273c3e45b402b0de9c56410d46f6670c0f9be6e2739a6ce11d4c3f3c84b318b", 0xbf, 0x8}, {&(0x7f0000000240)="21353b3d82014b5f93fe87df2bef45a03a573d08b7582791438171dc97a905924da395892d726ce3e60f4ce860b2", 0x2e, 0xa81}, {&(0x7f0000000280)="fcf4d83113f3599f9e68b45c711806af215de13e286181da7ec5c081faca80cce8052b44e67e8f7e4b08f2e88eef9da79ca87b1b3a130ba08a78e5aab99daa7a884b92d7a5b0cbb054125e9f205be905461104a63bda9aa4fcd31afbee38d0eeb38d38c84781b2af41722e50309b9eda2e877d6418bf0720ad2c93059369df9d1ec80b48517b62a8287ff528a6db129f2829ed9b36c75afff67ee0e895639b8d8f554e1792fb3092b8b377972b8a7fb0a3eacfacc1c46e8a874849557c35a6d768b3142bd2ab5398c170614f616ea6622d", 0xd1, 0x5}, {&(0x7f0000000380)="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", 0x1000, 0x6}, {&(0x7f0000001380)="9e52d83dc447ad7bb1aef6bb616cc924dcb967", 0x13, 0x20}, {&(0x7f00000013c0)="14a5683b932d9cdf49f5dbddda9fdfdb113efaf82dca68fbd8297077ac90fd5c1308d06f5700df", 0x27, 0x3}, {&(0x7f0000001400)="61950cfce3f830e5b75e6931025ec32b88bd2dd33586de72759ba798d38472705fe50d1ecdc9a96630fcc8c0de3eb9a5d7cc21bb5aa02a12d0bef921625f3fcb23792a4f1fbeb62872ff3c32f803f08dd93de406f4c1c12826b0b00d3a8b4702319faeee4e221ec78cfbe1c2b18566d386fb160b9fe7b09fa68b5825402f2818b13098df5a1fd51f47aeb4fb553d8074d91318d58ddd7908af8f129f09f704899430e80054229d", 0xa7, 0x7f4}], 0x4, &(0x7f0000001580)={[{@map_off}, {@check_strict}], [{@func={'func', 0x3d, 'BPRM_CHECK'}}, {@euid_lt={'euid<', r1}}, {@fsname={'fsname', 0x3d, '$'}}]}) [ 148.294231] FAT-fs (loop7): bogus logical sector size 0 [ 148.294913] FAT-fs (loop7): Can't find a valid FAT filesystem [ 148.348619] FAT-fs (loop7): bogus logical sector size 0 [ 148.349317] FAT-fs (loop7): Can't find a valid FAT filesystem [ 159.222647] kmemleak: 29 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:28:05 executing program 6: creat(0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000001880)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x8, 0x0, "e838101e7b9a5d8333d402046e4fa3b469a144c0b255d40b8055ea3505456429ede9750f780504d16fc00cceb8fd57bd1027e9afae1129eb68c6f3e15b9cc5cb95055ee1aa7012dd8385f3c6094b7df4"}, 0xd8) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00') r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xbf, 0xc001) getsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000001980)=""/4096, &(0x7f0000000100)=0x1000) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000080)={0x9, 0x5, 0xa1de, 0x4, 0xb6, 0x8, 0x81}, 0xc) 04:28:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) getsockopt$inet6_int(r0, 0x29, 0x10, &(0x7f0000000000), &(0x7f00000000c0)=0x4) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 04:28:05 executing program 5: creat(0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000001880)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x8, 0x0, "e838101e7b9a5d8333d402046e4fa3b469a144c0b255d40b8055ea3505456429ede9750f780504d16fc00cceb8fd57bd1027e9afae1129eb68c6f3e15b9cc5cb95055ee1aa7012dd8385f3c6094b7df4"}, 0xd8) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0xcd00, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00') r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xbf, 0xc001) getsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000001980)=""/4096, &(0x7f0000000100)=0x1000) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000080)={0x9, 0x5, 0xa1de, 0x4, 0xb6, 0x8, 0x81}, 0xc) 04:28:05 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000280)={0x5, 0x80, 0xfb, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x800, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0xd}, 0xa000, 0x2, 0x3, 0x5, 0x1, 0x5, 0x2, 0x0, 0xfffffffe, 0x0, 0x4}, r1, 0x6, r1, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, &(0x7f0000000300)={{r0}, 0x0, 0xc, @unused=[0x3, 0x8, 0x10001, 0x8000], @subvolid=0x5}) umount2(&(0x7f0000000140)='./file0\x00', 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x4) creat(&(0x7f0000000180)='./file0\x00', 0x101) connect(r1, &(0x7f0000001300)=@ipx={0x4, 0x3a1, 0x3, "25a636af12c7"}, 0x80) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000000c0)={0x0, 0xfffefffffffffffd}) 04:28:05 executing program 3: select(0xfefdffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2710}) mq_open(&(0x7f0000000000)='\\\v-[h\x00', 0x800, 0x122, &(0x7f0000000040)={0x3, 0xfffffffffffffff8, 0x80000001, 0xd1f}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0xa}}) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {0x0}, {}, {}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {}, {r2}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0}, {}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {0x0}, {0x0}, {}, {}, {}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0}, {}, {}, {0x0}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, r3}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}], 0x0, "46dacd8396fe92"}) r104 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r104, 0xc020f509, &(0x7f0000000000)={r104, 0x3, 0x87, 0x100000000}) r106 = mq_open(&(0x7f0000005c00)='-@\x00', 0x42, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) mq_timedsend(r106, &(0x7f0000001200), 0x0, 0x3, &(0x7f00000012c0)) ioctl$BTRFS_IOC_INO_LOOKUP(r106, 0xd0009412, &(0x7f0000000100)={r108, 0x1000}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r105, 0xc0709411, &(0x7f00000000c0)={{r108, 0x80000001, 0x4, 0x6, 0x6, 0x6, 0x7f, 0x5, 0x7f, 0x7013, 0x9, 0x400, 0x2, 0x7}, 0x18, [0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000004b480)={0x3, [{0x0, 0x0}, {}, {}, {0x0}, {}, {}, {}, {0x0}, {}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0}, {0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}], 0x9, "0cf7f31a3da148"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f000004c480)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r106, 0xd000943d, &(0x7f0000055480)={0x6, [{}, {}, {}, {}, {0x0, r95}, {0x0, r30}, {r83}, {}, {}, {r215}, {r4}, {}, {}, {0x0, r148}, {r206, r193}, {r145}, {}, {r134, r151}, {r79, r138}, {r86}, {}, {0x0, r101}, {}, {0x0, r186}, {r111}, {0x0, r190}, {r76}, {}, {}, {r120, r204}, {r213, r186}, {0x0, r180}, {r68}, {r146, r51}, {}, {r136, r164}, {r40}, {0x0, r199}, {}, {r200}, {0x0, r100}, {0x0, r65}, {r13}, {}, {0x0, r141}, {r173}, {0x0, r210}, {}, {0x0, r176}, {}, {}, {0x0, r183}, {0x0, r12}, {0x0, r33}, {r67}, {r83}, {r166}, {r131, r191}, {}, {r21}, {0x0, r41}, {}, {}, {}, {r54}, {}, {0x0, r159}, {r197}, {r115, r149}, {0x0, r37}, {r122}, {}, {0x0, r16}, {0x0, r61}, {0x0, r50}, {}, {0x0, r27}, {r9}, {0x0, r43}, {r35}, {0x0, r171}, {}, {0x0, r57}, {r123, r198}, {r28}, {}, {r23, r116}, {0x0, r158}, {r168, r156}, {r126, r102}, {}, {r170, r16}, {r207}, {r157, r178}, {}, {0x0, r137}, {}, {0x0, r72}, {r34}, {0x0, r155}, {r152}, {r120, r18}, {0x0, r194}, {r48}, {r94}, {r22, r72}, {0x0, r58}, {0x0, r184}, {r83, r139}, {r201}, {r29, r151}, {r15, r63}, {r144}, {0x0, r163}, {r196}, {r153}, {}, {}, {}, {0x0, r17}, {}, {0x0, r160}, {0x0, r150}, {}, {r185, r25}, {r88}, {r201}, {0x0, r27}, {r24, r44}, {0x0, r154}, {r66}, {}, {}, {}, {}, {0x0, r183}, {r205, r92}, {}, {r56, r188}, {}, {}, {0x0, r117}, {r133}, {r11}, {r174}, {r211}, {r119}, {}, {r49, r161}, {}, {r99, r84}, {r195, r89}, {r182}, {0x0, r70}, {0x0, r60}, {}, {r74}, {}, {r85}, {r135, r162}, {r202}, {}, {r75}, {}, {r87}, {}, {}, {r53}, {r107, r26}, {}, {0x0, r169}, {r172}, {r36, r97}, {}, {r54}, {0x0, r98}, {}, {0x0, r103}, {r177}, {0x0, r208}, {r167}, {r165}, {r96, r127}, {0x0, r148}, {}, {0x0, r212}, {r69, r142}, {r31}, {}, {0x0, r175}, {r109}, {r62}, {r112}, {}, {}, {0x0, r10}, {r113, r114}, {}, {r140}, {r143}, {r132, r130}, {0x0, r38}, {}, {0x0, r214}, {0x0, r125}, {0x0, r45}, {}, {r64, r121}, {r189}, {0x0, r5}, {}, {}, {}, {}, {}, {r93}, {0x0, r8}, {r80, r32}, {r209, r71}, {}, {r77, r103}, {r179, r14}, {0x0, r147}, {r55}, {}, {0x0, r82}, {r73}, {r59}, {}, {r6}, {}, {}, {r39}, {0x0, r7}, {r118}, {0x0, r43}, {r49, r90}, {0x0, r91}, {r20, r187}, {0x0, r124}, {r128, r110}, {r19}, {}, {}, {}, {r203, r47}, {0x0, r181}, {r46, r81}, {r78}, {}, {r42}, {}, {}, {r52, r129}, {r133}], 0x9, "d5155521dcd0eb"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004d480)={0xffffffffa0faf43c, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {r108}, {r192, r216}], 0x4, "541395223c0b7a"}) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000000100)={r108, 0x81}) 04:28:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="28000000300021000000007f001e00000000000000f9ffff49914c6c592a8814f5f66c4e77d2c3f7ce66d3f3e1a43de5877909e125abcf77cd78b27b552b0d412fe9f2a9735d83e881a4e95409406d599d6535c7ee510cdcda4e4492b62f52351defc1f0a636b47f10af7255eb13e26aec935afa0b907231ef30b1ce2d9d33f453d8"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/158, 0x9e}, {&(0x7f00000002c0)=""/221, 0xdd}], 0x2, &(0x7f00000003c0)=""/155, 0x9b}}, {{&(0x7f0000000200)=@nl=@unspec, 0x80, &(0x7f0000000500)=[{&(0x7f0000000480)=""/74, 0x4a}], 0x1, &(0x7f0000000540)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000001540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f00000017c0)=[{&(0x7f00000015c0)=""/50, 0x32}, {&(0x7f0000001600)=""/173, 0xad}, {&(0x7f00000016c0)=""/253, 0xfd}], 0x3}, 0xffffffff}], 0x3, 0x1, 0x0) 04:28:06 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000280)={0x5, 0x80, 0xfb, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x800, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0xd}, 0xa000, 0x2, 0x3, 0x5, 0x1, 0x5, 0x2, 0x0, 0xfffffffe, 0x0, 0x4}, r1, 0x6, r1, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, &(0x7f0000000300)={{r0}, 0x0, 0xc, @unused=[0x3, 0x8, 0x10001, 0x8000], @subvolid=0x5}) umount2(&(0x7f0000000140)='./file0\x00', 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x4) creat(&(0x7f0000000180)='./file0\x00', 0x101) connect(r1, &(0x7f0000001300)=@ipx={0x4, 0x3a1, 0x3, "25a636af12c7"}, 0x80) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000000c0)={0x0, 0xfffefffffffffffd}) 04:28:06 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3ff}, 0x0, 0x8, r0, 0x0) r2 = timerfd_create(0x9, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x1, 0x81, 0xc7, 0x99, 0x0, 0x4, 0x800, 0xe, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x2, 0x10001}, 0x400, 0xc24, 0x497, 0x6, 0xc0000000000000, 0x0, 0x9, 0x0, 0x2, 0x0, 0x400}, 0x0, 0x4, r1, 0x1) timerfd_settime(r2, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) read(r2, &(0x7f0000001080)=""/4090, 0xffa) [ 164.997581] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 165.005574] FAT-fs (loop0): bogus logical sector size 0 [ 165.006303] FAT-fs (loop0): Can't find a valid FAT filesystem [ 165.022045] FAT-fs (loop7): bogus logical sector size 0 [ 165.022735] FAT-fs (loop7): Can't find a valid FAT filesystem [ 165.027269] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 04:28:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) getsockopt$inet6_int(r0, 0x29, 0x10, &(0x7f0000000000), &(0x7f00000000c0)=0x4) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 04:28:06 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r5, 0x4) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r5, 0x0) syz_io_uring_submit(r6, 0x0, 0x0, 0x0) r7 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000040)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x4, 0x0, 0x7}, 0xf6a) r10 = socket$inet6_udp(0xa, 0x2, 0x0) syz_io_uring_submit(r8, r9, &(0x7f0000001900)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r10, 0x0, &(0x7f00000018c0)={0x0, 0x0, &(0x7f00000017c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000001880)=""/37, 0x25}}, 0x0) syz_io_uring_submit(r6, r9, &(0x7f0000000600)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f00000005c0)={&(0x7f0000000000)=@sco={0x1f, @none}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000740)="1888190f623052e233", 0x9}, {&(0x7f0000000280)="e8d7e6eec474295eff92a34de941289d4ae1f855c9b15c5a2f4b06717524e5d5c0ba8616fbbdfa2dfd39a3767d5bee8f6563068d71913b7c48a97f8e01a2d8fae000f51d1e8aaac8d0afe45ebea4373bc98f7f09e63f1fa62623bc", 0x5b}, {&(0x7f0000000300)="618310a01366614ad562ed47b1ee3e171e164f691686a43516747074e28590d58dd6881ceeb88f01073aca067a7359ec00600d1a1b9f397b24619180", 0x3c}], 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB="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", @ANYRESHEX=r6], 0x228}, 0x0, 0x800, 0x1}, 0x6) r11 = socket$inet6_udplite(0xa, 0x2, 0x88) r12 = dup2(r11, r3) r13 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_setup(0x7d2d, &(0x7f0000000640)={0x0, 0xdfb8, 0x2, 0x0, 0x144, 0x0, r7}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f00000006c0), &(0x7f0000000700)) r14 = dup2(r13, r12) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd=r14, 0x0, &(0x7f0000000240)=""/61, 0x3d, 0xa}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) 04:28:06 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000280)={0x5, 0x80, 0xfb, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x800, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0xd}, 0xa000, 0x2, 0x3, 0x5, 0x1, 0x5, 0x2, 0x0, 0xfffffffe, 0x0, 0x4}, r1, 0x6, r1, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, &(0x7f0000000300)={{r0}, 0x0, 0xc, @unused=[0x3, 0x8, 0x10001, 0x8000], @subvolid=0x5}) umount2(&(0x7f0000000140)='./file0\x00', 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x4) creat(&(0x7f0000000180)='./file0\x00', 0x101) connect(r1, &(0x7f0000001300)=@ipx={0x4, 0x3a1, 0x3, "25a636af12c7"}, 0x80) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000000c0)={0x0, 0xfffefffffffffffd}) 04:28:06 executing program 4: ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={@dev={0xfe, 0x80, '\x00', 0x2d}, 0x44}) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x53fd) r2 = creat(&(0x7f00000002c0)='./file2\x00', 0xb) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x33, 0x80, 0x9, 0x9, 0x0, 0x5, 0x20010, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x400, 0x4, @perf_config_ext={0xffffffffffff0000, 0x800}, 0x108, 0x10001, 0x603, 0x7, 0x0, 0x9, 0x1, 0x0, 0x400, 0x0, 0x5}, r1, 0x2, r2, 0x45d9cde71275227) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='configfs\x00', 0x0, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') mount$bind(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x100080, 0x0) open_tree(r3, &(0x7f00000000c0)='./file0\x00', 0x800) 04:28:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0xa}}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0xa}}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2244d0, &(0x7f0000000140)=ANY=[@ANYRESOCT, @ANYBLOB="130b06797cd0a9f212304e0f6034e2dc2515eba0ca645645024a4817ffc53927525d12732718a65e054e537a6c3996e87b13038dc8f85a120a5eb7e69ab643b8078de1ee044dd6797800cbeaa44d0a3f029fc37d8273056f7e39a870e376626bba22efc897035955a59ff2a574a5257e62a343d5d89158c60c566a71a9", @ANYRES32, @ANYRES64=0x0, @ANYRESHEX, @ANYRESDEC=0x0, @ANYRES64, @ANYRES16=r0, @ANYRESHEX=r1, @ANYRES64=r0]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}}, 0x0, 0x0, 0x2c, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) 04:28:06 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r0, &(0x7f0000002180)={0x0, 0x0, &(0x7f0000002140)={0x0}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r2, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001480)={0x28, r4, 0x807, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_DEV(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000004}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, 0x0, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x380000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}]}, 0x5c}, 0x1, 0x0, 0x0, 0x400c105}, 0x20000010) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="601c6d6b646f73668553b300080820000400008000f80000200040000300000000000000010000000000000002da93acd4", 0x31}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB='\x00']) chmod(&(0x7f0000000040)='./file0\x00', 0x80) 04:28:06 executing program 1: ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x40000) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x30, 0x2c]}}}}]}) [ 165.362871] FAT-fs (loop2): bread failed, FSINFO block (sector = 212) 04:28:06 executing program 7: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x0) flock(r0, 0x6) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) dup2(r1, r0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x20000, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) [ 165.412612] FAT-fs (loop0): bogus logical sector size 0 [ 165.413581] FAT-fs (loop0): Can't find a valid FAT filesystem [ 177.687288] kmemleak: 36 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:28:26 executing program 4: write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000040)={0x23, 0x37, 0x2, {0x0, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x0, 0x5, 'ext4\x00'}}, 0x23) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x17, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000d5f4655fd6f4655f0100ffff53ef010001000000d5f4655f000000000000000001000000000000000b0000000001000028020000028401001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37373731383437373000"/192, 0xc0, 0x400}, {&(0x7f0000010100)="0000000000000000000000002446d29025514b1c8845339908ad0491010000000c00000000000000d5f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000002e00000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0000000000000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000010500)="ffff3f00000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d5f4655fd5f4655fd5f4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011600)="ed41000000080000d5f4655fd5f4655fd5f4655f00000000000004000400000000000000050000000800"/64, 0x40, 0x2100}, {&(0x7f0000011700)="20000000500753ed500753ed00000000d5f4655f00"/32, 0x20, 0x2180}, {&(0x7f0000011800)="c041000000380000d5f4655fd5f4655fd5f4655f00000000000002001c0000000000000000000000090000000a0000000b0000000c0000000d0000000e0000000f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000d5f4655f000000000000000000000000000002ea00"/192, 0xc0, 0x2a00}, {&(0x7f0000011900)="ed4100003c000000d5f4655fd5f4655fd5f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c6531000000000000000000000000000000000000000000000000000000e978bfbe00000000000000000000000000000000000000000000000020000000500753ed500753ed500753edd5f4655f500753ed0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x2b00}, {&(0x7f0000011a00)="ed8100001a040000d5f4655fd5f4655fd5f4655f0000000000000100040000000000000001000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fd4e152d00000000000000000000000000000000000000000000000020000000500753ed500753ed500753edd5f4655f500753ed0000000000000000", 0xa0, 0x2c00}, {&(0x7f0000011b00)="ffa1000026000000d5f4655fd5f4655fd5f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3737373138343737302f66696c65302f66696c653000000000000000000000000000000000000000000000e528a92800000000000000000000000000000000000000000000000020000000500753ed500753ed500753edd5f4655f500753ed0000000000000000", 0xa0, 0x2d00}, {&(0x7f0000011c00)="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", 0x1a0, 0x2e00}, {&(0x7f0000011e00)="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", 0x100, 0x3000}, {&(0x7f0000011f00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x4000}, {&(0x7f0000012000)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8070000", 0x20, 0x4800}, {&(0x7f0000012100)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x5000}, {&(0x7f0000012200)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x5800}, {&(0x7f0000012300)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x6000}, {&(0x7f0000012400)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x6800}, {&(0x7f0000012500)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x7000}, {&(0x7f0000012600)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x7800}, {&(0x7f0000012700)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x8000}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="9bd19863f03a653cf47172445ef02a6b4c3406e24405530e508c58b13d04b0b6c26b6e98d779a9e84afea74c1d1f8ce31180be151caa1af00181871782686a8b5502336e36710bf50428253afd07480c23702b2288f1bed2e523202ef472360aefb9b74fca50ba975083f48c622ec448a192f6c8fad72f716e01a36511714d337a1ec46418c20064523c54263d48ce9d2c3b2380a4f1e7c6f551e411ad7f250066d876e895737834db64cca03cc458fe3019e58218cd481817fb9ecea9be7ff63f534efbf9c1f0cb0e02ccf62c9f"]) 04:28:26 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000280)={0x5, 0x80, 0xfb, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x800, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0xd}, 0xa000, 0x2, 0x3, 0x5, 0x1, 0x5, 0x2, 0x0, 0xfffffffe, 0x0, 0x4}, r1, 0x6, r1, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, &(0x7f0000000300)={{r0}, 0x0, 0xc, @unused=[0x3, 0x8, 0x10001, 0x8000], @subvolid=0x5}) umount2(&(0x7f0000000140)='./file0\x00', 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x4) creat(&(0x7f0000000180)='./file0\x00', 0x101) connect(r1, &(0x7f0000001300)=@ipx={0x4, 0x3a1, 0x3, "25a636af12c7"}, 0x80) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000000c0)={0x0, 0xfffefffffffffffd}) 04:28:26 executing program 5: syz_open_procfs(0x0, &(0x7f0000000300)='oom_score\x00') r0 = syz_io_uring_setup(0x1432, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f00000001c0)='3', 0x1}, 0x0) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$BTRFS_IOC_INO_PATHS(r4, 0xc0389423, &(0x7f0000000200)={0x1, 0x40, [0x5, 0x3, 0x80000000], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_io_uring_setup(0x5bd3, &(0x7f0000000080), &(0x7f0000ffa000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000001c0), &(0x7f0000000000)=0x0) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x1) r6 = dup3(r3, r0, 0x80000) io_uring_enter(r6, 0xfffffff8, 0x242a, 0x2, &(0x7f0000000240)={[0x80]}, 0x8) syz_io_uring_submit(r1, r5, &(0x7f00000002c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 04:28:26 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000300)={[{@fat=@time_offset={'time_offset', 0x3d, 0x37e}}]}) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r0, 0x0) openat(r0, &(0x7f00000000c0)='./file1\x00', 0x646882, 0x1e0) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) 04:28:26 executing program 3: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x173) r0 = syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fgetxattr(r1, &(0x7f0000000080)=@known='user.incfs.metadata\x00', &(0x7f0000000100)=""/105, 0x69) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000180)={r0, 0x1, 0x1, 0x100000001}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x0, 0x800000}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000280)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x40082102, &(0x7f00000001c0)=r4) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) preadv2(r5, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/93, 0x5d}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f00000005c0)=""/28, 0x1c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/65, 0x41}, {&(0x7f0000000700)=""/97, 0x61}], 0x6, 0x800, 0x3, 0x0) uselib(&(0x7f0000000300)='./file1/file0\x00') 04:28:26 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) r3 = socket$inet(0x2, 0x1, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000001, 0x40010, r0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000500)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0, 0x12001}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r5, 0x0, r4, 0x0, 0x200f5ef, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 04:28:26 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) fchmod(0xffffffffffffffff, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) write$binfmt_script(r1, &(0x7f0000000100)={'#! ', './file0', [{0x20, '\x00'}], 0xa, "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"}, 0x109) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 04:28:26 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) io_uring_setup(0x7688, &(0x7f0000000280)) faccessat2(0xffffffffffffffff, 0x0, 0xa0, 0x0) syz_mount_image$msdos(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0xcd4, 0x1, &(0x7f0000000800)=[{&(0x7f0000000640)}], 0x242440, &(0x7f0000000880)={[{@nodots}, {@fat=@umask={'umask', 0x3d, 0x7}}, {@dots}, {@nodots}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, '[%\xfd'}}, {@euid_gt={'euid>', 0xee01}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@pcr={'pcr', 0x3d, 0x31}}]}) socket$inet(0x2, 0x800, 0x1ff) syz_mount_image$iso9660(&(0x7f0000001980), &(0x7f00000019c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002a00)=[{&(0x7f0000001a00)="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", 0x1000, 0x3f}], 0x2, &(0x7f0000002b40)={[{@map_normal}, {@map_acorn}, {@uid}, {@dmode={'dmode', 0x3d, 0x4}}, {@uid}], [{@context={'context', 0x3d, 'staff_u'}}, {@permit_directio}]}) mkdir(0x0, 0x25) lsetxattr$trusted_overlay_nlink(&(0x7f0000003180)='./file0/file0\x00', &(0x7f00000031c0), 0x0, 0x0, 0x1) [ 185.268652] FAT-fs (loop0): bogus logical sector size 0 [ 185.269375] FAT-fs (loop0): Can't find a valid FAT filesystem [ 185.301288] EXT4-fs (loop4): Unrecognized mount option "›Ñ˜cð:e<ôqrD^ð*kL4âDSPŒX±=°¶Âkn˜×y©èJþ§LŒã€¾ªð‡‚hj‹U3n6q õ(%:ýH #p+"ˆñ¾Òå# .ôr6 [ 185.301288] ï¹·OÊPº—PƒôŒb.ÄH¡’öÈú×/qn£eqM3zÄdÂ" or missing value [ 185.301464] EXT4-fs warning (device sda): verify_group_input:160: Cannot read last block (8912895) 04:28:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x2c, 0x2c, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private1}]}]}, 0x2c}}, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x7ff, 0x40200) sendmsg$NL80211_CMD_GET_MPATH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x8, 0x70bd25, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x22004004) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x0, 0xfffffffa, 0x3ff, 0x3, 0x4bc}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0xa}}) ioctl$FICLONE(r2, 0x40049409, r0) [ 185.381861] EXT4-fs warning (device sda): verify_group_input:160: Cannot read last block (8912895) 04:28:26 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000280)={0x5, 0x80, 0xfb, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x800, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0xd}, 0xa000, 0x2, 0x3, 0x5, 0x1, 0x5, 0x2, 0x0, 0xfffffffe, 0x0, 0x4}, r1, 0x6, r1, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, &(0x7f0000000300)={{r0}, 0x0, 0xc, @unused=[0x3, 0x8, 0x10001, 0x8000], @subvolid=0x5}) umount2(&(0x7f0000000140)='./file0\x00', 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x4) creat(&(0x7f0000000180)='./file0\x00', 0x101) connect(r1, &(0x7f0000001300)=@ipx={0x4, 0x3a1, 0x3, "25a636af12c7"}, 0x80) 04:28:26 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000140)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x103100, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@empty}}, &(0x7f0000000180)=0xe8) quotactl(0x4200000000, 0x0, r2, 0x0) 04:28:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r2, 0x0) execveat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)=')\x00', &(0x7f00000001c0)='\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)='-\x00', &(0x7f0000000400)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='\x00', &(0x7f0000000580)='),/o+#*,$\x00', &(0x7f00000005c0)='\x00'], 0x800) r3 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000880)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0x200, &(0x7f0000000840)=[r0, r0, r1, 0xffffffffffffffff], 0x4}, 0x9) close(r3) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f0000000000)={0x8020}) close(r4) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) execveat(r1, &(0x7f0000000640)='./file0\x00', &(0x7f0000000700)=[&(0x7f0000000680)='),/o+#*,$\x00', &(0x7f00000006c0)='/dev/vcsu\x00'], &(0x7f00000007c0)=[&(0x7f0000000740)='-\x00', &(0x7f0000000780)='+\x00'], 0x1000) 04:28:26 executing program 5: syz_open_procfs(0x0, &(0x7f0000000300)='oom_score\x00') r0 = syz_io_uring_setup(0x1432, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f00000001c0)='3', 0x1}, 0x0) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$BTRFS_IOC_INO_PATHS(r4, 0xc0389423, &(0x7f0000000200)={0x1, 0x40, [0x5, 0x3, 0x80000000], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_io_uring_setup(0x5bd3, &(0x7f0000000080), &(0x7f0000ffa000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000001c0), &(0x7f0000000000)=0x0) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x1) r6 = dup3(r3, r0, 0x80000) io_uring_enter(r6, 0xfffffff8, 0x242a, 0x2, &(0x7f0000000240)={[0x80]}, 0x8) syz_io_uring_submit(r1, r5, &(0x7f00000002c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 185.493730] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 185.497669] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 04:28:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000000040)="ed41000000100000e1f4655fe2f4655fe2f4655f0000000000000400080000000000000005000000080000000000000000000000000000000000000000000000df", 0x41, 0x4200}], 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0ae6e069d0ec7d863d2e4d708b51"]) getresuid(&(0x7f00000001c0)=0x0, &(0x7f0000000280), &(0x7f00000002c0)) mount$9p_unix(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x1305002, &(0x7f0000000300)={'trans=unix,', {[], [{@fsmagic}, {@hash}, {@appraise}, {@euid_eq={'euid', 0x3d, r0}}, {@obj_type={'obj_type', 0x3d, '%$,%[]}!!\xd3%%'}}, {@smackfsroot={'smackfsroot', 0x3d, '\xbc'}}, {@obj_role={'obj_role', 0x3d, 'ext4\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@euid_lt}, {@fsname={'fsname', 0x3d, 'ext4\x00'}}]}}) 04:28:26 executing program 4: openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) [ 185.534290] FAT-fs (loop0): bogus logical sector size 0 [ 185.534926] FAT-fs (loop0): Can't find a valid FAT filesystem 04:28:26 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000280)={0x5, 0x80, 0xfb, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x800, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0xd}, 0xa000, 0x2, 0x3, 0x5, 0x1, 0x5, 0x2, 0x0, 0xfffffffe, 0x0, 0x4}, r1, 0x6, r1, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, &(0x7f0000000300)={{r0}, 0x0, 0xc, @unused=[0x3, 0x8, 0x10001, 0x8000], @subvolid=0x5}) umount2(&(0x7f0000000140)='./file0\x00', 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x4) creat(&(0x7f0000000180)='./file0\x00', 0x101) [ 185.561010] EXT4-fs (loop2): Unrecognized mount option " [ 185.561010] æàiÐì}†=.Mp‹Q" or missing value [ 185.580020] EXT4-fs (loop2): Unrecognized mount option " [ 185.580020] æàiÐì}†=.Mp‹Q" or missing value [ 185.627582] FAT-fs (loop0): bogus logical sector size 0 [ 185.628340] FAT-fs (loop0): Can't find a valid FAT filesystem [ 191.833967] Bluetooth: hci0: command 0x0406 tx timeout [ 191.834063] Bluetooth: hci4: command 0x0406 tx timeout [ 191.834712] Bluetooth: hci3: command 0x0406 tx timeout [ 191.840244] Bluetooth: hci5: command 0x0406 tx timeout [ 191.843356] Bluetooth: hci2: command 0x0406 tx timeout [ 191.845014] Bluetooth: hci6: command 0x0406 tx timeout [ 191.846866] Bluetooth: hci1: command 0x0406 tx timeout [ 191.848808] Bluetooth: hci7: command 0x0406 tx timeout [ 196.488201] kmemleak: 33 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:28:44 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000140)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x103100, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@empty}}, &(0x7f0000000180)=0xe8) quotactl(0x4200000000, 0x0, r2, 0x0) 04:28:44 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) r3 = socket$inet(0x2, 0x1, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000001, 0x40010, r0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000500)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0, 0x12001}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r5, 0x0, r4, 0x0, 0x200f5ef, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 04:28:44 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x141041, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@buf={0x6f, &(0x7f0000000040)="636bf6659c2433feaa3873ef9b9be7c1e6ea646de99f24d8c36bb211a5d69eed208075633478bb6b5186d4adde702ea9dcec1eecac5fadf29670a23e2d8c8a44b08f06814ecc52cd276b55d4e5c034c024a40ad5dc3163707eedb331fb8b8b1b8b92292471ac79646846aaf3321c31"}) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000340), r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)={0x34, 0x0, 0x321, 0x0, 0x0, {0x4}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}]}]}, 0x34}}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000800)={0xe4, 0x0, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}]}, 0xe4}}, 0x8800) r4 = syz_io_uring_complete(0x0) accept4(r4, &(0x7f0000000500)=@l2tp={0x2, 0x0, @broadcast}, &(0x7f0000000580)=0x80, 0x800) mknodat$null(r4, &(0x7f0000000600)='./file0\x00', 0xcdcbbbaae31db2e6, 0x103) r5 = syz_open_dev$rtc(&(0x7f0000000400), 0xc30, 0x902) ioctl$RTC_EPOCH_SET(r5, 0x4008700e, 0x6) sendmsg$SMC_PNETID_GET(r4, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, r2, 0x400, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000050}, 0x800) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="00f60000", @ANYRES16=r2, @ANYBLOB="000029bd7000fddbdf2501000000140002006272696467655f736c6176655f3100000900030073797a31000000001400020076657468305f746f5f626f6e64000000"], 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x44040) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = accept4$unix(r0, &(0x7f00000002c0)=@abs, &(0x7f0000000340)=0x6e, 0xa381fb9338cfe439) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r6, 0x80489439, &(0x7f0000000380)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4842, 0x0) io_setup(0x5, &(0x7f0000000080)=0x0) io_submit(r8, 0x2, &(0x7f0000000180)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r7, 0x0, 0xffffffc8}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 04:28:44 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r0, 0x8008330e, &(0x7f0000000000)) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r1, 0x0) io_uring_register$IORING_REGISTER_PROBE(r1, 0x8, &(0x7f0000000080)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}]}, 0x8) unshare(0x42000200) unshare(0x40000400) 04:28:44 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) fchmod(0xffffffffffffffff, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) write$binfmt_script(r1, &(0x7f0000000100)={'#! ', './file0', [{0x20, '\x00'}], 0xa, "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"}, 0x109) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 04:28:44 executing program 4: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) fchmod(0xffffffffffffffff, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) write$binfmt_script(r1, &(0x7f0000000100)={'#! ', './file0', [{0x20, '\x00'}], 0xa, "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"}, 0x109) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 04:28:44 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000280)={0x5, 0x80, 0xfb, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x800, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0xd}, 0xa000, 0x2, 0x3, 0x5, 0x1, 0x5, 0x2, 0x0, 0xfffffffe, 0x0, 0x4}, r1, 0x6, r1, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, &(0x7f0000000300)={{r0}, 0x0, 0xc, @unused=[0x3, 0x8, 0x10001, 0x8000], @subvolid=0x5}) umount2(&(0x7f0000000140)='./file0\x00', 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x4) 04:28:44 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r2, 0x0) execveat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)=')\x00', &(0x7f00000001c0)='\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)='-\x00', &(0x7f0000000400)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='\x00', &(0x7f0000000580)='),/o+#*,$\x00', &(0x7f00000005c0)='\x00'], 0x800) r3 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000880)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0x200, &(0x7f0000000840)=[r0, r0, r1, 0xffffffffffffffff], 0x4}, 0x9) close(r3) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f0000000000)={0x8020}) close(r4) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) execveat(r1, &(0x7f0000000640)='./file0\x00', &(0x7f0000000700)=[&(0x7f0000000680)='),/o+#*,$\x00', &(0x7f00000006c0)='/dev/vcsu\x00'], &(0x7f00000007c0)=[&(0x7f0000000740)='-\x00', &(0x7f0000000780)='+\x00'], 0x1000) [ 203.801860] FAT-fs (loop0): bogus logical sector size 0 [ 203.802772] FAT-fs (loop0): Can't find a valid FAT filesystem [ 203.838710] blktrace: Concurrent blktraces are not allowed on loop14 04:28:44 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000140)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x103100, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@empty}}, &(0x7f0000000180)=0xe8) quotactl(0x4200000000, 0x0, r2, 0x0) 04:28:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r2, 0x0) execveat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)=')\x00', &(0x7f00000001c0)='\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)='-\x00', &(0x7f0000000400)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='\x00', &(0x7f0000000580)='),/o+#*,$\x00', &(0x7f00000005c0)='\x00'], 0x800) r3 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000880)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0x200, &(0x7f0000000840)=[r0, r0, r1, 0xffffffffffffffff], 0x4}, 0x9) close(r3) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f0000000000)={0x8020}) close(r4) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) execveat(r1, &(0x7f0000000640)='./file0\x00', &(0x7f0000000700)=[&(0x7f0000000680)='),/o+#*,$\x00', &(0x7f00000006c0)='/dev/vcsu\x00'], &(0x7f00000007c0)=[&(0x7f0000000740)='-\x00', &(0x7f0000000780)='+\x00'], 0x1000) 04:28:45 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000280)={0x5, 0x80, 0xfb, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x800, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0xd}, 0xa000, 0x2, 0x3, 0x5, 0x1, 0x5, 0x2, 0x0, 0xfffffffe, 0x0, 0x4}, r1, 0x6, r1, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, &(0x7f0000000300)={{r0}, 0x0, 0xc, @unused=[0x3, 0x8, 0x10001, 0x8000], @subvolid=0x5}) umount2(&(0x7f0000000140)='./file0\x00', 0x2) 04:28:45 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) fchmod(0xffffffffffffffff, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) write$binfmt_script(r1, &(0x7f0000000100)={'#! ', './file0', [{0x20, '\x00'}], 0xa, "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"}, 0x109) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 04:28:45 executing program 6: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x6, "7799904a8dbc1565bf6e5e4000000000000300"}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TUNSETQUEUE(r1, 0x400454ca, &(0x7f0000000000)={'geneve0\x00'}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x9, 0x9, 0x5b}]}) close(r0) ioctl$TUNGETIFF(r1, 0x800454dd, &(0x7f0000000040)={'syzkaller1\x00'}) 04:28:45 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000140)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x103100, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@empty}}, &(0x7f0000000180)=0xe8) quotactl(0x4200000000, 0x0, r2, 0x0) 04:28:45 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000000), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), r2) sendmsg$IEEE802154_SCAN_REQ(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x40, r3, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}]}, 0x40}}, 0x81) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r0) [ 204.240084] FAT-fs (loop0): bogus logical sector size 0 [ 204.240944] FAT-fs (loop0): Can't find a valid FAT filesystem 04:28:45 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$incfs(r1, &(0x7f0000000000)='.pending_reads\x00', 0x14400, 0x111) ioctl$BTRFS_IOC_DEV_REPLACE(r2, 0xca289435, &(0x7f0000000940)={0x0, 0x5, @start={0x0, 0x1, "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", "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"}, [0x0, 0x101, 0x7fff, 0x100000001, 0x6, 0xffffffffffffffff, 0x401, 0x5d, 0x69f2ebe7, 0x6, 0x0, 0x4, 0x100, 0x6, 0x4, 0xfffffffffffffff7, 0xd, 0x6, 0x4, 0xb54141a, 0xfffffffffffffff9, 0xa7d, 0x7ff, 0x7fff, 0x5, 0x5, 0x3, 0x54a70d7, 0x9, 0xa4d, 0x100000000, 0x3, 0x6, 0x100000000, 0x5, 0x3, 0x0, 0x6, 0x6, 0x80, 0x4, 0x2, 0x80000000, 0x3, 0x1, 0x8, 0x0, 0xeba, 0xffffffff, 0x9, 0xf09d, 0xfff, 0x0, 0xffff, 0x7fff, 0x8, 0xc11bc79, 0x6, 0x8ae, 0x8, 0x4, 0x6, 0x1, 0x3]}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) [ 214.189814] kmemleak: 29 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:29:02 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x10242, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = mq_open(&(0x7f0000000080)='wfdno', 0x40, 0x4, &(0x7f0000000100)={0x80, 0x3f, 0xf518}) pidfd_getfd(r1, r2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}]}}) 04:29:02 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000280)={0x5, 0x80, 0xfb, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x800, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0xd}, 0xa000, 0x2, 0x3, 0x5, 0x1, 0x5, 0x2, 0x0, 0xfffffffe, 0x0, 0x4}, r1, 0x6, r1, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, &(0x7f0000000300)={{r0}, 0x0, 0xc, @unused=[0x3, 0x8, 0x10001, 0x8000], @subvolid=0x5}) 04:29:02 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r0, 0x8008330e, &(0x7f0000000000)) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r1, 0x0) io_uring_register$IORING_REGISTER_PROBE(r1, 0x8, &(0x7f0000000080)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}]}, 0x8) unshare(0x42000200) unshare(0x40000400) 04:29:02 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000000), &(0x7f00000000c0)=0x4) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0xa}}) fstatfs(r1, &(0x7f0000000140)=""/18) r2 = syz_open_dev$tty1(0xc, 0x4, 0x3) write(r2, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)={{0x107, 0x3f, 0x8, 0x17, 0x3dc, 0xb5, 0x1ce, 0x410c}, "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", ['\x00', '\x00']}, 0x1220) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000540), 0x115000, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) r4 = epoll_create1(0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000100)={0x0, 0x0, r4, 0x6, 0x80000}) 04:29:02 executing program 6: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x48040, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sync_file_range(r0, 0x2, 0x5, 0x4) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknodat$loop(r1, &(0x7f0000000080)='./file0\x00', 0x1000, 0x1) 04:29:02 executing program 4: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000280), 0x480, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x100) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000240)='\x00') ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x40, 0xb95}) 04:29:02 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000000)='./file0/../file0/file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000480)=[{&(0x7f0000000180)="7d9acbb1c0b8c71d374bc4e985f59540b9ba8042a443e476a01c719a8f3b7a54003b969c20d671119f4d6d370cf22bdde9748cc050d9e9ca201699131ab8ca9ff283ec094b4c9828d7ce7e57400d786b82f701310325255fc0718aadb28d4080c82f60e31974b09489d617d87abcf65a9ebd57ff11c028276cb8118d3206c22e4ce39c85e387de5a2103ff746580b6431524c853681855b05fb1de", 0x9b, 0x4}, {&(0x7f0000000300)="a91b60ce97e0d5da14d0bd4a445f0e619130b63078ac83a31c84555bb544f471f0e6a8065ec150a1b010849071ac30d28ada24f83e06d2f616e3b0ae2f7617ef3b50b70cbdec5b84ba3821f4c1871b01b4adbbe7f2b98a812c24fe9d86f69ae6215f26f69b08c662dc7e8d590699ade6fab0e4f4f893e5655cd7ad972024b52028cd3f629f8946619ff2e43dcd1ff8e7e2efca53a41f179be7173096061e4d593b3b50198091", 0xa6, 0x1}, {&(0x7f00000003c0)="f2b01c41b98587ee633a725e800c1c819abb909e3a8e7a553804a1f5634a8bf2b5d645e52a2d74352c99a2b8400383401b7e96bcf6ec9de0505e01d64b58ca0ca9391dbb52ba9dafe278c097326956402b3083ecba4491b0bf21001c61882b8356ddb1528bc5fd2c6b9213aa8d0c87f89bcb062b7623de86d75fcec6af0dcba9d0b91d986c4ec8f6d1e8c48d90faf31a0b", 0x91, 0x8}], 0x90000, &(0x7f0000000500)={[{@test_dummy_encryption}], [{@smackfstransmute}, {@obj_type={'obj_type', 0x3d, '-{'}}, {@context={'context', 0x3d, 'system_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@appraise}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@dont_appraise}, {@uid_lt}, {@euid_lt={'euid<', 0xee01}}]}) mount$bind(&(0x7f0000000240)='./file0/../file0/file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600), 0x1081, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f00000002c0)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000080)={[{@resuid}]}) 04:29:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) pidfd_getfd(r1, 0xffffffffffffffff, 0x0) fallocate(r1, 0x3, 0x0, 0x8000) ftruncate(r1, 0x2) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, {0xd}, &(0x7f0000000940)=""/4096, 0x1000, &(0x7f0000000240)=""/166, &(0x7f0000000180)=[0x0, r3], 0x2}, 0x58) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000300)) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f000005fd80)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000060d80)={{0x0, 0x35738215, 0x7, 0x8, 0x3, 0x1, 0x1, 0x0, 0x5, 0xfffffffc, 0x6, 0x1f, 0x36, 0x1, 0x2}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000061d80)={0x7fffffff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x7f, "ee6639c019c85e"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000062d80)={0x0, 0x0, "de8ab44f2bb43e793bcca5f71e502390248c1a271430ebfe8bf67c9cb278fa0e5facdf63783f15a72e77f9128bc2bd26a9960d3121b1ab2f6958bb7c424c4ce6d01913ab528e714d0ded08eb6f05ae7870c16bb4b3054febf74e80cad465427c10c0d30ebbeb9c876b702bed7b5e4a805074eebb55107c5bc91b312500909923501e3aea6a403d4f811ee6bddb6d011648ba91446b8e65554fd5c2c8461eb8fcd281c987acdecb5388e24780c44d604531c97beb4cecef12959001d81020666284c0e42e643ef545932a04471b2e264d7b563326afc6fad4d8a998da3f8eb98efa3e947fbb6d18d83caaa8705540eadcf56817074d9a9be45e4003c979382806", "6af3ae53b961a1a11df808094fcc0e9f8af76097bb3e5ce020440450c9dcba6efe6c9c3f6bc9b2a7d21820cd36a8aebe267d0b29ce64a93927c1833ba7713ed64ceccdf6ed1d526b11289b72550c2912076ab5fecad4a46a00315d19f3d17eae85d63fcf5d155a66d466db73d12f19fa625343bb6315ae259daa4faaf0906efff23023c65eb62188548021836c879a4423593ab51515d69e626855dcb1bd1239a3df4feb67948164d86aca6ebbd44ac28e35b230a146ac2387691139adbb44812dc1a44849840ab0404729e7dfc892fd5555762c3aaa2c4fb538128536a0653c75c8485086662effeda2016078af705a9a15272d85548b81b607977ee0ca0ea7a784fad7f5d36252e468281e6eb038e55423d52d1e00aee86f6a2ebe54409c4efffe56dfcad1d368817dcd907a288e19f56c3d8cfc6b899e953851e1e7fe07de3cb47bd748a9c6f4ca47dd78f1e55cab79cd3792cde2bfdc068c6ca350dfc0783dbba82e3a97799c885155ed3e7feba6c3b5c13e5b5391f6184d61e9d27d0f7d73a168ebe9db0ec0b060687553879da021a3dc5230b6719dcaa0cc0854869b4697b2ca88c2021ec20e6817ce4d7228c6eda82e3be3b5154b393dad467f7ca8587e7ad13a9c1272999ee5b3928a21a9ffd73d3dff1164b630b0d0e14d38fe027d689693c5ad5890ea2b233928cdf031a9a8042e9da05b29f7460b5bfe32f979f70779e17bb6689c0b460468ddb0aa45f9f493730d6c86d53b6204cf8ba32f94674a93191bc14805f6049d907c39aa73c3fec5f82bb87369aea70f375c8ab9bd0ed4628415c9a614faf3d6222ed64f150f2cd64f5f3589ac8f6e026fe48a9f5ec79f2820f1f36e84ddd40e96bc705f7e4a6f9e52636d97789ae18ca11fcaf8edea1260f52d070efa630f391a9792813c36fb7eca374f92153682339b10e7915dea8cef99c96f822283c6661221147e98a2b04cb1955d666d1ef46b810a9fcc21ae9d2d788c503d1be9b214b07e7699770aabc235354f4a371044ee90a322f9219b30fa049bb633ed0ab0d2544ed4d34226d6a24ba8db84f7f3528000ebe6df2ad589f7ef953121c00261117a17d27dbc072cb9a982c1628b2375573e1698f42b73ba98dcbc92773615838cecae54352ceabcc0c053c5ee98ba2e1722c71c9ee7e98b46167f92e6735751a970b00cfa135823fc900a6a5428cb018b5503f8e4f7bd9327ae453398db91f89721de94c285b3ea75553ef1a257f34703cceafc0cad7e49c67e1d3540fff918af1c1b485812e25650ecf19991ac909c611a0195996078eb775613e11687df7d5fab8cf5433dd7b7c38167ac2f5e280f32096201d5f6d65e587bec2dd703f66f4a59bf898a72e5635e6cd3e0e133333613fd83fc8617ebab14ad1e105d0be770ac63e42bc099433f0d4d345228d1b8aa7cdba8d47019dad8a02b0dabf947065b6a4e4e5e0ea6187eb732d24b466df93f0f58fa947bd63b82fef4469433fc2a0928e9c83742f403b1f798ee2148a7e7e665d924ac57b294804f856eac56d8c4de6740f0b84e488fedbae4b6dbbcddba63aca7a3aa85f21ad10577467206606ecf6a6805ad3edeec5107341bcb09d33e95c723c40d292acf4604901787f7985c91d87f069570cfac4442f236919eeea709500ca7d40566e645db66b698ad8ba067be8ff151aba88c4f3bd68b9c8da6f5e1ed44362c530addffd8b574d5300d3337a6ee79c17f1f6674b1bce983a571e482116a23b877758445598c74e1db45426d51aa8f0538bd126a764cfdb125948d1b0cbd4a7688ab2632d9d6bdb774ab971ebc9ef0266d13ca278a36887418183c72dc74ee1a80bd4346f64482106730200df08dce940c8582fdb7334390cb44411899cc0cc159de25fdb5934e210f5357ba3ab3adf7ef7d8837cbf860f2a4492b44df5226d0e224d186dc5016d89bbe3fcbdec37a20668d1fd47b8738a9fe2ad5c60e8001fad9b298842ec4c792021e57ca817577f93913e68f0757560520b1c673b39f9ca47c595bf35ac1841c05f63f50790118a2e85d8ae2d5e6d00bc1788d2cbdc188d649693cb3fd800a23771f9e8d03cbd8f9b206f5525516a6162d2354360490ea866ffe692df3cff129839f8a949f2db27ccb5accd5324a25058e6ce1a38753402965b0a989c0892d14380412edc799b28eb36062eab44083ec169dbbc9271f9fc51d437122a376635f770e8886cb9cfd788c6520a2b2ca2564449b66330a738955abf73096abd643a19bb3b5ee7b7df7cd5b9d1d324aeae676f2c7fdd496e3871e11ca562962d9a35a3aaaa495932db03477fba289b9af9b5d4694fd4e24d958f5f6a20f1dc8c11c6ca52833feafd6b843efdc64901c1ce60f39ea05bca3a622ceacce9336157504acdde4902db3a458ebed0b4616d7119d40fac05aecf81cab9d94032f8f591c59d76c3048f794c26ec7b435ba44e8184c13f7b5b465b0c7d80123814df9e26c9e9dae89b42db60a265a561c42ab2029608f182aa8dba04702b8e2b19fa73be8e3d2912fd4a03378a5ecd1f100e4604b25bbba2ee6ff31fec5059891603b9f2816b3f949d561b7a1e11fe584b823de8cf908d15c9199f0ee5575ee11ab7a2e27ac00a98608b8de9a78c213be62a6e2a987693529cec1abc6f4807881d0f60907a25b2189e6ba728709f531dbf1e05feb4dbc72761d8109814730f2bb4299cd3cc0028d66a1eedcf26d647a789fc6500c51e8b1e740cdcabc97122114d919246b3ef56291a44070519d124c34055f2e7667a9f608296f80d9743b0fbe922366eeea38fe398c38b0723d112ab3d7aa1792c5570142f6567896bd48794cbae908afaa4e324e7f36db28c112140a1154513872bf4f75fd68cd52afa2b4b10f9d6da4466686587b22dcb8e9ea156d94758d0cf4a44a1f5b9161bc4eee550ea5fd656b6f9cda58bbe9cb0af7780c8ee3b551463f43d74e80d9f1a227511d4fb2abf2cfb57da85cf031c6a36a20cfbae6dec4542d3a6d8b2a8f0b1fc3dd72bc47223010bdbf6e4816965a5d54a7e0db6c84378cf4b8f8dc520eda124c2739a3fd9457c24ac5cafafce81e07fad396125ef563f3a0049df49aac616548195cab0f4b9c94aded9b66d5bc4bc289f2af3f4723040ae231bd60653a23f86faedca35e6838d1d0a2539a9dbd9d300eec36b2474bd3014b30cdfc88b012086833b339d1a06c33ff6b7f3440a62c30d9ac24ddddd706eebfe438380b23dcfef66de1a84127c956e44fa4e0a2b10d253e9caefac7e7af0ae54026e044743e87557dee45fdee91e6e360d49216f054d083032410528d15b27f66528ebe6cb1a30c1bf95a87c522f0e4edcd8c7c37e417fd7d6d60fad2d5535fcea750379078c85b4dd26f6122c7a726be6a422b5e08b00b95cf72a1a86e55cb78ee544748942063ed3940160bad4d3fed02cd3d0aafbb3132abf1c7dc2050cb1c215c94edd7747ce8e4428c8d1c0ff34a8ba5ac7946da285bd8be52f2f524fee3166a2781823f4201748035502ba66504baa31ad8c12deda189ce84be53868d4218701ca73ee46100a7784b15889304d8976fea64a37f6ce3ac530022acbe1cb052bf020a62c442fbc0fdf7014244e42176dd787c74791143a2e6076f9d31ffda58cd50228a82604e5b401e2ed59943e47ab219f4e77b998031c5f01480573de4a2cbe88e871118fd50dff95b3dc000b1b5d2c49a9472b621260bafd9fe94af3362cbf4498993bab12f7dfd68761bb9e6262372144861b371bb66e4ef2ebb4c71ddc6d38c1a579f60a374700713def2a5d1a93e12538c98707b1cf66851ec91173c83a72facd70c4f815d9db9acd6ce7479128d5a9142944ca3cb2051e1494a61d5b535b89909b89a1820e18202b3e46c2b2d0082ded6e722dce0046cdc1f5f5ee00db1f4eb0e5426458762db809e4b583c15593baf39b8f713066eae082898a1cd321b4ccaeb99c88ebb9f9cb759abb716287b4dccebb7f23a0721fc0c2575a182dc189b74e428ede7004e40416dd35275f68bed53996e9700a38cf12f21ca11e002622bfd4faf4db902665c487fc2bd19e27115bf60be3cda2db6ff4afca539eac1f5a0998bdf97c96733792fe3e45414057c026fc83068abf764ac735b5cdfc66b97b19c9edfa1b6b85476d6111b2104f4b7285d9d5ac370f60286b9924444349015efb65fa792ca03e2185836d95fa3b8ba8b47aa547aaf7c30730c0ba475c4b1a30623ec9067bb04ede7f90808b4a301133e68a49e880dbac850d8cd2bd2c1737595a242c42063f3ecb1ba1c0d612c1e1861b01c4100180c64832c4cbb6db4d10330af2b229c39a0938abefc7323477aac6127f2477187e1ae94c1b53dc2223da9fe8d0fed2b726f584ca3712930449db5dac86185b2bc6bbea2c6cfafecc3929dcad1b59916104cb8148533fa6280cb6706ab69325ca1b925121a642f157d1bedd4d9015b7e3ad22ff9442e1e1c16623d691aaacf817ed1d6d0aa2ebe3c2164280784cf168ca9ca253a46b63fd692e0607e2d361e1167a7ccd5cd14f6beecec833e3a769aaaa26a524046b944fa16f92aaa626d80cd9e79dce0ad08693c2a9802441f015b84f7ade4a68ec6f2cb9937c5ec67d65e4bcd9ff41ba34679e67b778e2d95070542fd7ec1dc2eca73fd7bff85c9213bb23f3c595b3e9e4b334ae4d34ec538bc6cc35eb6c6105afac03480422b94724477c5675af274d4085d49d97d32456be08d60916863b048a52268ef23c088d57432ca0c77dc356c02d00a3df692a0e91d88cb3a1f473f401227ec011dcd4c0389adad1c7efbc03d1dd5c7949b1831f24432c1174156dc6cc61c463ef969bac090f395865cce3b1ebacfa1f82efdb14d4398b682cd12173d7e813332ac517ca0f266172f35bc555b10c820d9f50b5dcedd83d813cd0315558fd10fa05e02429ef8b375d8596a9c3cecf32fbb0c9ac33541054a35d1f20cc3915c7e42a69a710c5069077c5c595702eba5b83731e9628a477814042215ca2cbe677ddb329febcbf0cb7639ff047a6f720fa88d91ef3c28c9cd7d421e72b37478aad7029e5f956f8d371b3f8e29d21cfe7085e523484f8003ab32ca5441eb7cdcbd014aecbb9ae90a689a1a5ab83c7e7377e3db65b863cb999595bdf82997527a64fc28565742bd2a1da0d79ea2748cfb80dcbd054d7d782526e64daf08b9bdb1411d4140fd40233ab6baa2c6d51792a9883e84e8f7f7c9adbc6605dfa972ad47ea143ead09c613d3f55422416fd8e6ed6b45c6d07722313a097763e74a4189557348ec40fbb7c70039259139e01e7985a54e2b8e32db44fa77ee470852aecb5b080991f876b46e04c3831b0ba19d3a81ce7ee26aae1f4123dc13d1a196a00e42c2389997af1798a958dfbcd0f8"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000063d80)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {r6, r8}, {0x0, r9}], 0x81, "9b6de08b404b34"}) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r10, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = fork() ptrace$setopts(0x4206, r11, 0x0, 0x0) [ 221.583189] blktrace: Concurrent blktraces are not allowed on loop8 [ 221.584306] FAT-fs (loop0): bogus logical sector size 0 [ 221.585302] FAT-fs (loop0): Can't find a valid FAT filesystem 04:29:02 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000011800)="22001e0000000000001e00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101013400200000000000002064000000000000647809140b2a3a08000000010000011200660069006c0065002e0063006f006c0064002c001f0000000000001f00080000000008007809140b2a3a08020000010000010a00660069006c00650030", 0xa3, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[]) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r1, 0x0) openat(r1, &(0x7f0000000080)='./file0\x00', 0x942, 0x8f2e4a086623d678) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) 04:29:02 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000280)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='bic\x00', 0x4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r3, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f00000000c0)=0x3, 0x4) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000540)={0x1c, r5, 0x1, 0x0, 0x0, {{0x5f}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r5, 0x4, 0x70bd2c, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x3a}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x20040000}, 0x8000) 04:29:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x5, 0x80, 0xfb, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x800, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0xd}, 0xa000, 0x2, 0x3, 0x5, 0x1, 0x5, 0x2, 0x0, 0xfffffffe, 0x0, 0x4}, r0, 0x6, r0, 0x0) 04:29:02 executing program 7: perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) unshare(0x28020600) 04:29:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000010000)="601c6d6b646f7366cef82e00080820000200008000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010100)='RRaA\x00'/32, 0x20, 0x800}, {&(0x7f0000000340)="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", 0x14c, 0x9e0}, {&(0x7f0000010300)="601c6d6b646f7366cef82e00080820000200008000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60, 0x3000}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x10000}], 0x0, &(0x7f0000011000)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 04:29:02 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x29000, 0x0) syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xa0000, &(0x7f0000000140)={[], [{@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x36, 0x34, 0x62, 0x39, 0x31, 0x66, 0x34], 0x2d, [0x3e, 0xfd, 0x38, 0x35], 0x2d, [0x66, 0x35, 0xbe8c85baccd7616c, 0x61], 0x2d, [0x35, 0x30, 0x66, 0x32], 0x2d, [0x38, 0x36, 0x65, 0x64, 0x34, 0x61, 0x62, 0x3c]}}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@subj_user={'subj_user', 0x3d, 'nfs\x00'}}, {@appraise}]}) 04:29:02 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000001200)=""/4081, 0x742) getdents64(r1, &(0x7f00000001c0)=""/88, 0x58) getdents64(r1, &(0x7f0000000240)=""/237, 0xed) openat(r0, &(0x7f0000000000)='./file0\x00', 0x34000, 0x40) [ 221.779674] FAT-fs (loop0): bogus logical sector size 0 [ 221.780402] FAT-fs (loop0): Can't find a valid FAT filesystem 04:29:02 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x14, 0x18, 0x101}, 0x14}, 0x1, 0x0, 0x0, 0x20000041}, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) poll(&(0x7f0000000100)=[{r1, 0x1}], 0x1, 0x7) 04:29:02 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0xd8080, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000300), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000480), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f00000007c0)={0x2e0, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@ETHTOOL_A_EEE_MODES_OURS={0x110, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2ab7}, @ETHTOOL_A_BITSET_VALUE={0xfa, 0x4, "07f4cd9d5ed1e46ab4a048de6cbbed6bafe627cd85825c9eebb7f59c7b63775668fbf873b83109db13c2c400c86122d9c8c2b9ca5fd21e35d9098b68a9b14989fcfbfd9b5f162ce5741651a8810f6cb1b659c3e02289401c268f7022aa2b1704ab24815d7c29d089c2b7a430a9c856cef7e8ba4b67c5770c491e6f1a19e46f441ffa5ac923f4a3e443ffa1333df2392fea98893b361142949785bf85cd9d3e48f44ab15ec05231d71a308eba92774cab05e0fab8177fa2cb8cffdb7f99190dbbccae7a84ee8c97f1174ab4ca40a7267f7ea908723e21ab9f0c61b0ee6737a762e9b8325b37cce29ae1c3e4e85fab8fef8c49808ff84f"}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_EEE_MODES_OURS={0x1bc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x9c, 0x3, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xa08}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '@{@{$J\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '.(3/-\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x81}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x110, 0x3, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '*%^*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, ']\\-\x84,\\{.#\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '#:\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '\':^-#$!:\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/hwrng\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x10001}]}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x7d16aff38ad1dd32}, 0x8004) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000780), 0xffffffffffffffff) 04:29:02 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) ptrace(0x8, r3) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) unshare(0x20000) [ 221.852936] FAT-fs (loop1): Invalid FSINFO signature: 0x41615252, 0x2fa34443 (sector = 1) 04:29:02 executing program 2: mlock2(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0) r0 = syz_io_uring_setup(0x68e4, &(0x7f0000000000), &(0x7f0000dec000/0x4000)=nil, &(0x7f0000c0f000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0xa}}) sendmsg$IPCTNL_MSG_EXP_DELETE(r4, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x100, 0x2, 0x2, 0x201, 0x0, 0x0, {0x3, 0x0, 0x5}, [@CTA_EXPECT_NAT={0xe4, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x64, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private=0xa010101}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private=0xa010102}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @CTA_EXPECT_NAT_TUPLE={0x7c, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x15}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x14, 0x4, @local}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010102}}}]}]}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, 0x100}, 0x1, 0x0, 0x0, 0x2044080}, 0x8000) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0xa}}) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r6, 0x4) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r6, 0x0) syz_io_uring_submit(r7, 0x0, 0x0, 0x0) syz_io_uring_submit(r7, r2, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x2, 0x0, 0x9, 0x2, &(0x7f0000000180)="b304d518e52c14dc9e06cb4554e8cd43dd8200d70651da6dd394fce5e69f3560439788a9596d67c3a779e20d", 0xc65, 0x0, 0x1, {0x0, r5}}, 0x3b53) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, r3, &(0x7f0000000100), 0x0, 0x0, 0x80000, 0x0, {0x0, r5}}, 0xab8) [ 232.599365] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:29:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:29:20 executing program 5: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) ptrace(0x8, r3) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) unshare(0x20000) 04:29:20 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) ptrace(0x8, r3) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) unshare(0x20000) 04:29:20 executing program 7: perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) unshare(0x28020600) 04:29:20 executing program 6: vmsplice(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000480)="8a18f716e9eb09a1c16f26920c615f6e7823b704b24ca336e8bb3e2df0d5c1dd39dfec2cd87b18792e4c92fa30463fe9cd2cc5448a760682cddce149ac64eaaf57aed0ac42accb045da4a3fc1a4ae44943fe630a9b938856cabf3631ee7ad292370967c9cfecd9e5ee1457ffd672d4453c9626dd9311d140ce17e2d1ed92e19ad5c2f2c9082211459236fb63c74bc79f3767aeba85d2cede0ee950df4e5212456fde233dd8b683782163db435b091380a9fbf767269b4c57dcee0ad8f594f56e7ad3d9220fe8f36b883950e3a0a38319e8858ec22a2bea8d0c70d2868191482b4073d79742c855c21c42825fe6c889ebe42b043005c5a01f80", 0xf9}, {&(0x7f0000000140)}, {&(0x7f0000000180)="526521bf88f82c6259f0552b45c21fc540705a9f868585b56a67b4d1ac1e6aabd602dfb2a11f18839a7016ee68cbcd5d936f9005c02042a72103e3a47fa7ff934a88d930b6bec79611d6903b1819303ebef6d17c51575d78393ba7c0c611c8300a994b", 0x63}, {&(0x7f0000000580)="a2f7c1dbea421ee5eebbe18cf81229dd445771e175f61ad5e83c501a03386a4c99971def9641fc0a6c0a35ea3f7ed6afc7078f90a56e35bdc80d98059ca15a6a", 0x40}, {&(0x7f00000005c0)="54de41f3fa0c63b1835f8b340949e8887fa4d7c623f20d06bf1192fb4d1767bbdba4ad38e5dedc478bda9f69b1447777e4be0e65925ee3bdde61956d8805de8800aae79725ef027ae0983ac6297434a2009a2e8d4fd77b7821aece57a2", 0x5d}], 0x5, 0x9) r0 = openat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x4100, 0x20, 0xb}, 0x18) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x19, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000e1f4655fe1f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000008000000018000000c20500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e38373635383433343000"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000a4d0099b099d46eeb5a6d2ef5e9d5ded010040000c00000000000000e0f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500400000000000000000000000000000004700000000000000", 0x20, 0x560}, {&(0x7f0000010300)="02000000030000000400000015000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000e0f4655fe0f4655fe0f4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011500)="ed41000000080000e0f4655fe1f4655fe1f4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x2080}, {&(0x7f0000011600)="8081000000601020e0f4655fe0f4655fe0f4655f00000000000001004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000", 0x60, 0x2300}, {&(0x7f0000011700)="c041000000400000e0f4655fe0f4655fe0f4655f00000000000002004000000000000800000000000af301000400000000000000000000000800000020000000", 0x40, 0x2500}, {&(0x7f0000011800)="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"/768, 0x300, 0x2580}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x8000}, {&(0x7f0000011c00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x10000}, {&(0x7f0000011d00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x10800}, {&(0x7f0000011e00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x11000}, {&(0x7f0000011f00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x11800}, {&(0x7f0000012000)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x12000}, {&(0x7f0000012100)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x12800}, {&(0x7f0000012200)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x13000}, {&(0x7f0000012300)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x13800}, {&(0x7f0000012400)="504d4d00504d4dffe1f4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7032390075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/128, 0x80, 0x20000}, {&(0x7f0000012500)="0c0000000c0001022e000000020000000c0002022e2e00000d0000001000050166696c65300000000e000000d807050766696c653100"/64, 0x40, 0x28000}, {&(0x7f0000012600)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x30000}, {&(0x7f0000012b00)='syzkallers\x00'/32, 0x20, 0x38000}, {&(0x7f0000012c00)="000002ea0100000001000000270f240c000000000000000000000000000000000601f8070000000006000000779b539778617474723100000601f00700000000060000007498539778617474723200"/96, 0x60, 0x40000}, {&(0x7f0000012d00)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xattr2\x00\x00xattr1\x00\x00', 0x20, 0x407e0}, {&(0x7f0000012e00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x50000}], 0x0, &(0x7f0000012f00)) 04:29:20 executing program 2: mlock2(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0) r0 = syz_io_uring_setup(0x68e4, &(0x7f0000000000), &(0x7f0000dec000/0x4000)=nil, &(0x7f0000c0f000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0xa}}) sendmsg$IPCTNL_MSG_EXP_DELETE(r4, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x100, 0x2, 0x2, 0x201, 0x0, 0x0, {0x3, 0x0, 0x5}, [@CTA_EXPECT_NAT={0xe4, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x64, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private=0xa010101}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private=0xa010102}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @CTA_EXPECT_NAT_TUPLE={0x7c, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x15}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x14, 0x4, @local}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010102}}}]}]}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, 0x100}, 0x1, 0x0, 0x0, 0x2044080}, 0x8000) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0xa}}) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r6, 0x4) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r6, 0x0) syz_io_uring_submit(r7, 0x0, 0x0, 0x0) syz_io_uring_submit(r7, r2, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x2, 0x0, 0x9, 0x2, &(0x7f0000000180)="b304d518e52c14dc9e06cb4554e8cd43dd8200d70651da6dd394fce5e69f3560439788a9596d67c3a779e20d", 0xc65, 0x0, 0x1, {0x0, r5}}, 0x3b53) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, r3, &(0x7f0000000100), 0x0, 0x0, 0x80000, 0x0, {0x0, r5}}, 0xab8) 04:29:20 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = getpid() pidfd_open(r1, 0x0) syz_open_procfs(r1, 0x0) 04:29:20 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r1, &(0x7f0000002180)={0x0, 0x0, &(0x7f0000002140)={0x0}}, 0x0) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), r0) sendmsg$NL802154_CMD_SET_CHANNEL(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r2, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@NL802154_ATTR_PAGE={0x5, 0x7, 0x6}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0x18}, @NL802154_ATTR_PAGE={0x5, 0x7, 0xe}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x20000001) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r3) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x1c, r4, 0xb, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}]}, 0x1c}}, 0x0) [ 239.367080] FAT-fs (loop0): bogus logical sector size 0 [ 239.368436] FAT-fs (loop0): Can't find a valid FAT filesystem [ 239.403264] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 04:29:20 executing program 7: sendto(0xffffffffffffffff, &(0x7f00000001c0)="53cf8cc45ef6dd205431791d216b944fedad3923e6b5f873443f28c5b091489b6b2d511a938d3722f89cfa2c2bf99f96ff5e85dd86833e13dd27c24ecec936ca741b5274a415ae9a1376d273182eb03864f5ba27", 0x54, 0x0, &(0x7f0000000240)=@l2tp6={0xa, 0x0, 0xfffffffc, @private2, 0x81, 0x2}, 0x80) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x1f3000, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x102, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000002c0)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x104e032, &(0x7f0000000040)=ANY=[@ANYBLOB='rurnal_ioprio=0x0000000000040000,\x00\x00']) 04:29:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') [ 239.454309] ext4 filesystem being mounted at /syzkaller-testdir959344589/syzkaller.xPrumy/14/file0 supports timestamps until 2038 (0x7fffffff) 04:29:20 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r1, &(0x7f0000002180)={0x0, 0x0, &(0x7f0000002140)={0x0}}, 0x0) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), r0) sendmsg$NL802154_CMD_SET_CHANNEL(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r2, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@NL802154_ATTR_PAGE={0x5, 0x7, 0x6}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0x18}, @NL802154_ATTR_PAGE={0x5, 0x7, 0xe}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x20000001) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r3) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x1c, r4, 0xb, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}]}, 0x1c}}, 0x0) 04:29:20 executing program 6: ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x240000, 0x21) ioctl$VT_RESIZE(r0, 0x5609, 0xfffffffffffffffe) [ 239.661075] EXT4-fs (sda): Unrecognized mount option "rurnal_ioprio=0x0000000000040000" or missing value [ 239.695061] EXT4-fs (sda): Unrecognized mount option "rurnal_ioprio=0x0000000000040000" or missing value [ 250.371705] kmemleak: 11 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:29:38 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) ptrace(0x8, r3) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) unshare(0x20000) 04:29:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) r3 = signalfd4(r0, &(0x7f0000000140)={[0x80]}, 0x8, 0x800) io_uring_enter(r3, 0x4829, 0xb321, 0x1, &(0x7f00000001c0)={[0x2]}, 0x8) r4 = socket$nl_audit(0x10, 0x3, 0x9) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0], 0x0) 04:29:38 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = getpid() pidfd_open(r1, 0x0) syz_open_procfs(r1, 0x0) 04:29:38 executing program 6: r0 = getegid() setgroups(0x2, &(0x7f0000000040)=[0x0, 0x0]) r1 = getegid() setgroups(0x2, &(0x7f0000000040)=[0x0, r1]) setresgid(0x0, r0, r1) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000000)) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r2, 0xf505, 0x0) fchmod(r2, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r2, 0x5) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f00000002c0), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r7, 0x0) ioctl$SCSI_IOCTL_SYNC(r7, 0x4) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0xa}}) sendmsg$NL802154_CMD_SET_CHANNEL(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="1c0000802e3ec77f0a601f0cb3ed13691f798c017dd5da4c07018621806f8977d4473d682551633d2d10ed42c5b9d92eaa5fc71383e752906530805cec2d3df88cd4af4f30e0c1765e616560858ebc8a999d24980cfe126b4173f141424ca6b08a3c2b909df087847db560872aa5be95493fd5eaf06481bf065fb856d83a4383aef413c8a52f0affffffffb812793aff9e1c39c9eac2da492997b19e285432c5babba3596f04a51f64d29386bb6eb8e5dffdfbde4618811cfd71e63eaf3671685834af1d78433cfaf0c6338bf18e84ed4e7252a8d99024800000000000000000000071a63754f70c32c68adb37c63df371d48ff22edc983890235720df5ad23e27dd2292e19a8f05f1fb39e0b7cb88b89fdaa5573356225297b0ca1577456092d8408197d39bc2542054ff5944716ff075b471278997929c60968a5847955c334a4a12c0beee0484bd6c9b4cc9af5549db9ed9", @ANYRES16=r4, @ANYBLOB="1223d7b200000000f97a484ef8ff08fb0ee33283c3e9fa3488623b000063fe17006bc37e786cc18c2cf0ed5ff980842345464b25b9a945215cb1988ee1f14a6ece24dff7083733a2d2000f2b5671004b7f5ac2d874a2c4121a3e7585da8ae5a35b9819eb7523d125e19db7a7083e9ce8c69b788400008000c03a0a7537d0c2a70be7e599cc32b422c1b9cea7ac0b91e267def9a6b4bd13de51371f7e0e8b3412b3aeac4964382157c4ccffbb059111faec1c57c2458b84c81bb44a345b324227b31bc705ace72e67b8b3be64658eb43fe2ff00"/223, @ANYRES32=0x0, @ANYRES64=r3, @ANYRESOCT=r3, @ANYRES32=r6], 0x1c}, 0x1, 0x0, 0x0, 0x4c084}, 0x4044084) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 04:29:38 executing program 1: connect$bt_l2cap(0xffffffffffffffff, &(0x7f00000001c0)={0x1f, 0xfffb, @none, 0x4, 0x2}, 0xe) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x547c76af5c27546f, 0x0) getsockopt$IP_SET_OP_GET_BYNAME(r1, 0x1, 0x53, &(0x7f0000000140)={0x6, 0x7, 'syz0\x00'}, &(0x7f0000000180)=0x28) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x3, 0x6, 0x6, 0x5, 0x4}}) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x0}}, 0x1c) 04:29:38 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') 04:29:38 executing program 7: sendto(0xffffffffffffffff, &(0x7f00000001c0)="53cf8cc45ef6dd205431791d216b944fedad3923e6b5f873443f28c5b091489b6b2d511a938d3722f89cfa2c2bf99f96ff5e85dd86833e13dd27c24ecec936ca741b5274a415ae9a1376d273182eb03864f5ba27", 0x54, 0x0, &(0x7f0000000240)=@l2tp6={0xa, 0x0, 0xfffffffc, @private2, 0x81, 0x2}, 0x80) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x1f3000, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x102, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000002c0)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x104e032, &(0x7f0000000040)=ANY=[@ANYBLOB='rurnal_ioprio=0x0000000000040000,\x00\x00']) 04:29:38 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) symlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00') readlink(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)=""/64, 0x40) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='sysfs\x00', 0x3806000, &(0x7f0000000180)='$\x00') [ 257.455838] EXT4-fs (sda): Unrecognized mount option "rurnal_ioprio=0x0000000000040000" or missing value 04:29:38 executing program 7: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = getpid() pidfd_open(r1, 0x0) syz_open_procfs(r1, 0x0) 04:29:38 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = getpid() pidfd_open(r1, 0x0) syz_open_procfs(r1, 0x0) 04:29:38 executing program 6: ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="9977c475f1e3966c184264a67b1499549b37", 0x12}], 0x1}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'syz_tun\x00'}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r1, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000100)={'geneve1\x00'}) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, &(0x7f0000000080)={&(0x7f0000000740)=""/4096, 0x1000, 0x9, 0x20}) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x1ff) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000000c0), 0x2, 0x0) 04:29:38 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') 04:29:38 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r1, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000080)=""/194) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f0000000040)) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000000)={0x2, {0x4, 0x20, 0x80, 0x6, 0x101}}) 04:29:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x2c, r1, 0x1, 0x0, 0x25dfdbff, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x2c}}, 0x0) 04:29:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r0, 0x0, 0x7) copy_file_range(r3, 0x0, r2, 0x0, 0x200f5ef, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r4, r0, 0x0, 0x7ffffff9) 04:29:38 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x4004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = clone3(&(0x7f00000003c0)={0x280808800, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x6}, &(0x7f0000000d40)=""/4096, 0x1000, &(0x7f0000000440)=""/22, &(0x7f00000002c0)=[r1, r1, r1, r1], 0x4}, 0x58) pidfd_open(r3, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080)=0x49c0, 0x4) sendmmsg$inet(r2, &(0x7f00000000c0)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="3181", 0x2}], 0x1}}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000000d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2020, 0x0) r4 = dup(r2) ioctl$SIOCGSTAMP(r4, 0x80108906, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x1f, 0x2, 0xb4, 0x7f, 0x0, 0xb7, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x400, 0x0, @perf_config_ext={0x9, 0xfffffffffffffff7}, 0x8000, 0x8, 0xffff0001, 0x2, 0xfffffffffffffff9, 0x1, 0x7, 0x0, 0x4100, 0x0, 0x7}, r1, 0x10, r4, 0xa) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r5, r0, 0x0) ioctl$SG_NEXT_CMD_LEN(r5, 0x2283, &(0x7f0000005f40)=0xd6) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r6, 0x6, 0x21, &(0x7f0000005f00)="4c7a60bf37e35c002da4b1a0b9ee681a", 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp\x00') pread64(r7, &(0x7f0000000300)=""/166, 0xa6, 0x0) [ 270.297592] kmemleak: 16 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:29:57 executing program 6: creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105542, 0x12d) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file1\x00') 04:29:57 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:29:57 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0xa}}) pwritev(r2, &(0x7f00000024c0)=[{&(0x7f0000000040)="101513fdce9d584a9aeabbb2e41b7906e3626b53dd63990c20e74dbc1c60d0828d6fcbf7eea81244779a95e0e19b0bcaff368f005d845dd34519fe6df271de40e40cce8fa5eef74b39414aa415da7ccbde7366c56b2a79f281be7c39ab0c7ce7b6e47d51f1ea1cc0bcb2ffd192d86ace0270c95990dd052f047a3d46abba4078df998d8af9db0a5a749be37c97f67fb9d07227fcfccae6d222f8346c64d71a4a8dac", 0xa2}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000000140)="e7b35642c090c1f31a42656c76a1a4bea5df6f6ee3160421c7f39270a9858f9b1ffc0ce2fb683f89bee01c76aa39a249964b1a7f42f457c8d9c56b62c100b69588b9a56a169577a99bd40601d81832d105a7e5bd9d6e7f2a1df313a88f29dc3d35c8428197923c65cdf906547f121ba6700db157b76fa21eff9201c1c19894d9035a9a20e08d942d8fd6adcceb0983c08a1d1de78194d536b96fbf5f6354ff015c06cc52333d7fce75c193639572a0318ed3d832db3ed5fdc527accdab8cf09a3571f54f85ff", 0xc6}, {&(0x7f0000001340)="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", 0x1000}, {&(0x7f0000002340)="63625fc205dab3269525f49f41a952d9718a6a6049de659998ccb2c77a39f1f38ff6a5b9df26e188765415116ec38302684e8954a2edb4dd6e0063fb392422bcbe6e28e0e8cbbf8c5409156fabbb3c713c7dbacb5d41e21ba987cc41f88eb7d3beb6f273b010b0ce0e9bd159386655e813f8da7184cc444c48c181113971649070467824ac777ab92b62178fe91752342af7d4d119e5f6e82139e814d3845b6dc8dfe37e7a42d1cd", 0xa8}, {&(0x7f0000002400)="5c4e00e91a55dcbbfa0cec389fd7a99fe492b6b64ccaac9aa6297682ac813dc62c870a6c741bfe2695e78a72d88471b9dd9873699cce61502b6ab963470ac88536c9ade7050351f362fd5bd6230840d59b3ea1719d590cfe10202c461b365abd2866cd5f1c29a6e5dc100f4a9525d308cfa05f8449b69334a391fa1140d7e2149806e9fddbe037c93a864c807b16376d5cec4f6c136206b8b377543a27a0fa", 0x9f}, {&(0x7f0000000240)="d15e2db77ce5b6996e950ab0e824eafd3e9e06356974a391e65c23777eeb850d5854cbad6da3fadf732f7d93798704", 0x2f}], 0x7, 0x2, 0x3) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 04:29:57 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x4004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = clone3(&(0x7f00000003c0)={0x280808800, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x6}, &(0x7f0000000d40)=""/4096, 0x1000, &(0x7f0000000440)=""/22, &(0x7f00000002c0)=[r1, r1, r1, r1], 0x4}, 0x58) pidfd_open(r3, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080)=0x49c0, 0x4) sendmmsg$inet(r2, &(0x7f00000000c0)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="3181", 0x2}], 0x1}}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000000d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2020, 0x0) r4 = dup(r2) ioctl$SIOCGSTAMP(r4, 0x80108906, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x1f, 0x2, 0xb4, 0x7f, 0x0, 0xb7, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x400, 0x0, @perf_config_ext={0x9, 0xfffffffffffffff7}, 0x8000, 0x8, 0xffff0001, 0x2, 0xfffffffffffffff9, 0x1, 0x7, 0x0, 0x4100, 0x0, 0x7}, r1, 0x10, r4, 0xa) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r5, r0, 0x0) ioctl$SG_NEXT_CMD_LEN(r5, 0x2283, &(0x7f0000005f40)=0xd6) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r6, 0x6, 0x21, &(0x7f0000005f00)="4c7a60bf37e35c002da4b1a0b9ee681a", 0x10) connect$inet(r6, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp\x00') pread64(r7, &(0x7f0000000300)=""/166, 0xa6, 0x0) 04:29:57 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f00000002c0)=0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x9) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:29:57 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = getpid() pidfd_open(r1, 0x0) syz_open_procfs(r1, 0x0) 04:29:57 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) ptrace(0x8, r3) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) unshare(0x20000) 04:29:57 executing program 1: r0 = getpid() pidfd_open(r0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x24, 0xffe}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0x8) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r1, &(0x7f0000001140)=[{&(0x7f0000000040)="a7db7bf1f4803ba2acc13624dc078c2cec179c7b7e9a6b93433d43135f7ee90abb90e88018369f3563b1c67de86be47fbc8f537b49096638641b1a5b99cbc7c3317d2ea9a716831fd5ede95f1707b8b87411e8caa0eaf5e452da496224b19c9bfdc527fcda0bede1b3fb70ec0eec2394446be0895495b53ddddd6fa9c92a58c4aa1ca4e20af67f135432ec32c7e71c0dc33431321e89e2f460d005cf68a024fe24f80294d5b8bbbde7fd676927c1825874afe02f14190c5c6d6e9720674753aa526d0e3314795a58b170dc74d64eaea34d14cff8e822530c3768fae860cfde7d703742f41fcf0b825a2c788028520b67a0eeffcab021f5f66d4bd34302ed6ae4b29e022d15236c11c4ae595a4d1f163fbffb2a38a829686dd19c346550a38c495824d7021b88f10248162f351da570997bf5bf8c4474acbcd822ac4185180b28a2b265d710f03cbb058bd8966d5fba017c71d7f9e7323e0ec4e7afb4f7e82e3c917f149b2e36e92ddefd8f6bcff761fdd99a1442756f67e8279a62b39371ff4ae56bf83babfd55a3797b6c3321551bc2fd3c194b23972950782d96231a5f8990062eae879ba1b8e7957cfdd65198b7f10b15a971893449c99462af6996994bd9855292d496731a8d1040e15500ffec4f0cbe877ad53cf1e6803268c005a936f22e6aabc61408b1806067bd4b69dd0fa6663e86d1b4fd1900dc3fb989ad38ef6b49a344d59e7221d298dc2bdb8ada2dddbb2200bf7f19ab268d18937205d4e2e99c15827638a3b52a6b929164fdbeed37a9463ba5ac8701c0d497026113e9921ca45febbc980b064cf02d2848ff9e9abb618580d5b1d25085e9c725338eb4fa62ddf862cb7922d5ebd0fa0c8cbb83151b532dfb933699ca2d6a2110efeab8011d8ec21a2d7815a4ca99ed174b1e77f0bcd938e642441236babf94d705ffe8184d3f2ce6c061a6b7fe3d618dae2bd318fda1eff94e7190860ac1dede2188ee34b4b63311847c7716fdc4054ebd56b92d904466dbe6694bb0f86a80e9aa7f59c3966bb1a19170554f46186d652fa821b6fa265f9dca4ff7fc1251653726eb8ddc349f69d25c8970bb01fd44a8e14b3090641a29d258eeaace8f4130fd9323de847f4bc9561439da725c96698d6ac1b4782ffe6c0e6b988cb0ec92667bf134db3c5d6fec3b5a75b7095ced4d182bb31e51320ba3299cdd8e027497c4712b356a824d5a63b296f81ee3153343227252a4f4b95e07300bf5e18fa78704605d2f48cd6e3f2b30161b279b13449a572e945a527d134e4f5ea224d27ded452f9c632aa0936e3f10f73281cd3b46972b4464baea94be1725cef3a0b57be6ed168497590faa7cb68b27855bbe6408514aad19eaec0e4ecb7587f3e45f3d9726b9e22e550412fb3ca187e4beef2a73d6b40b009a1bc1d384fcc4299aa5c774af907f8f31b1bd29d5e6386b08de918e4e3c88bea27ee84a49da5c90d3395063acae3e7a960915b7adfe69cb0937dfd02285fd92102d913ed2442c502bc0f38ffe2a9213f7a6a699a93323744a0d105450b1e4cf4382a39bf6bdef588eb7e69ba7d7c563a38a9bd55079c80eff609b50c39ffb0563483d705a2332afa444712ec7b62747358d91cee07d69aeaa0cfb3919685d1b1c8077b47ad0dd9d1de770ab46fb6a182777f6ddff0ae86aa871c2aa168d2e3bfee60118ee15c1c98306b7026bcbb9f85e1cc78c21e39ef0c88b8576f37ad108ac7463d77749c1c14f882985184034661b077ad069f9ed9c98aff82bae71d8591f11dd4be27fe5991a79afbf4adcb3f418e75bedba455e6be098e328015dbb52a72e53ac222358c9f1129f706d70c577f257351b5cce57d3a7d0fd55b26a04f8a8274d7c929467b47c01a25fbacd055656a69942df63b5819f72d960f42ed2b3caf2cd063774831a705c5e768b769d72ac78210c6d52475f1490b42a448822f5f308a5c5a7a86873dd8fa1cb4e57c3d98ae29306c76f5d0d2201dbdabb3177dbc0648bfddd4c16f55f979f61b40b9c39577aef64efd54594a779d4bec371ae896959839a069be8766d1d09871b41c398bd4b4065cb840ddfac9839fa25de1e5ded177bcfbd2cd880806f138ad650a91ad51ab48e088e65e85d62ccc3dd47d48fb8981bc820c89b126f159c3e5a4bd502fab2801d5bd9b2666755bf46ea8e416ddfada672128839ff215c7ed03e86f4156251ab0a3849a8b388551af1bb1b89af6300a60091e3c13b33e567240f94995afcbb228a1d1a7826a4a7757914c5cd9f72177a1e3fa38d4f2666e688f174bd0465871ba2ed70df8bf802ebadb2143540f194c26be6cae31a9864f361d88303b9fe09bf52c3107472abbc5fc4514bead3071b20664bf3bf88ce1590da054d456f8266fe353100c060036febf01399dbe0bbfb15e621df2ed44c8e157b9588d55213052fd314ceaae8d7086ecd27174626e1fabc9b89fe34b2241dc601b04d2653eb7ee65c4d26db828c7ba92df2336cc69a4dce2f5ee52b82d0ce0d13be485ffc07af761ad30832448432c0b3cc8886d3e8fccb6e321da3366d1f582b11a487a08aa73ac755b179018aa6d2714b108ea18ac5292354f90af73cb1db3331f081a4b7ded10ffa7e805aea2c101695e7eeb96cda06050903b4929f5366bf55c7bae687cd0535649d0f6de7098fe8e6acc76532b8343dc64539d09e9873581d778b279726b01e393e9e8aeb96baa6ccdd7babe04c8552e62ac5f1734d1c199156a2417aa15d00c900745ffaa7758508d7010f614f6d35a9b41a31bd61e57767b00c8758dd078338693e426401b9", 0x7c8}], 0x1) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000000)=0x80) sendmsg$IPCTNL_MSG_CT_GET_STATS(r2, &(0x7f0000000980)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x14, 0x5, 0x1, 0x801, 0x0, 0x0, {0x2}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20040000}, 0x8000) 04:29:57 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f00000002c0)=0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x9) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:29:57 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:29:57 executing program 6: socket$inet6(0xa, 0x3, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) 04:29:57 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000600), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) pipe(0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000740)='.\x00', 0x7, 0x0, 0x0, 0x0, 0x0) clone3(0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x84100, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000440)=ANY=[], 0xc) r2 = syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b7000000000000b70000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600), 0x0, 0x8800}, {&(0x7f0000000000)='\"', 0x1, 0xb800}], 0x40000, &(0x7f0000000140)=ANY=[]) r3 = openat(r2, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000780)={0x0, "1f6afbf3ff6546600d3641e964606ac3"}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000001ac0)={r4, 0x9, 0x7}) r5 = clone3(0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) clone3(0x0, 0x0) setxattr$incfs_metadata(&(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000000340)="d8ffdcb88699ddf15c6f895230596b4fe6ab5c9b7f9412e4ba5076199757eeced3abdac4d62aab1cf59e0a29288a56bcbc53ed15b39c418ea175f1fc229ecde18c24ada808ecc463f2fe19d835f31ca42f465a19494c6919f3c1c803c6f3c3cfa655f9c5f26c210e8494c42ca4eaaee3a169699ea85c5edba7d090c84eda0f820db8ec09c23fbd3a34f85426b49fd32d2a38b5b894293e34e9afa4929ad9081bbc5bf9e9d645b3ee232b1a4a84bf09f5772f", 0xb2, 0x3) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000300)=0x0) clone3(&(0x7f0000001780)={0xb000, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), {0x15}, &(0x7f00000004c0)=""/131, 0x83, &(0x7f0000000640)=""/203, &(0x7f0000000580)=[0x0, 0x0, r6], 0x3, {r3}}, 0x58) r7 = getpgid(0x0) rt_tgsigqueueinfo(r7, 0x0, 0x11, 0x0) waitid(0x0, r5, &(0x7f0000000280), 0x8000000c, &(0x7f0000000400)) 04:29:57 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x30, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYRESHEX=r0], 0x0) 04:29:57 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f00000002c0)=0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x9) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:29:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000080)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0xa}}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0xa}}) splice(r1, &(0x7f0000000000)=0x40, r2, &(0x7f00000000c0)=0x4, 0x80000001, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='\n\x00\x00\x00\x00\x00\x00\x00']}) copy_file_range(0xffffffffffffffff, &(0x7f0000000100)=0x1, r3, &(0x7f0000000140)=0xbab, 0x800, 0x0) unshare(0x28020600) r4 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, 0x1, 0x6, 0x401, 0x0, 0x0, {0x3, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0xc0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_ABORT_SCAN(r4, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008001}, 0x0) acct(&(0x7f0000000040)='./file0\x00') unshare(0x48020200) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000180)={0x30, 0x2b, 0x7, 0x1b, 0x7, 0x6, 0x3, 0x4}) 04:29:57 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f00000002c0)=0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x9) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:29:57 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:29:57 executing program 7: r0 = syz_genetlink_get_family_id$gtp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r0, @ANYBLOB="000227bd7001fedbdf2500ddffff0700020001000010"], 0x1c}, 0x1, 0x0, 0x0, 0x801}, 0x404491c) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r1, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r2 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r3, 0x0) statx(r2, &(0x7f0000000040)='./file1\x00', 0x800, 0x80, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f00000005c0)={'ip6tnl0\x00', &(0x7f0000000540)={'ip6tnl0\x00', 0x0, 0x29, 0xf8, 0x6, 0xffffffff, 0x1a, @ipv4={'\x00', '\xff\xff', @remote}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80, 0x40, 0x9, 0x2}}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000940)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000880)={&(0x7f0000000600)={0x278, 0x13, 0x2, 0x70bd29, 0x25dfdbfd, {0x1f, 0x6, 0x3f, 0x3, {0x4e24, 0x4e22, [0x200, 0x72c3, 0x3f, 0xff], [0x8, 0x6b3a, 0xffffffff, 0xf438], r4, [0x3f, 0x8]}, 0x1, 0x5}, [@INET_DIAG_REQ_BYTECODE={0x8f, 0x1, "1841307fa7f8968443121dbab810d9122f3c3ce9bbe5edca5000ee0e3904855d3c6e3b6ff2af876f3cf776d8962e3ec097157a1e24a9a543b9dcc0b2c6d0ba3a082cdad7fe1317f07ead6d49ae8f3e6aced4f97c067297eed6451e4d215945f7afe8bace0bd1a447ac81de0de9d31c9b9229ba15263790ae1026bcc5b558f3608679b0ca12a2def5ca0cf9"}, @INET_DIAG_REQ_BYTECODE={0x83, 0x1, "ca047506cc3eea6d17770f02e5e6ad9b9dca37a66342e22fccd4dca266a252cbf359af88cc1befa43458c6365ac72614ff211d3fa7aa761b6343b457cec59928fe7a2dc84e54b94e2c8f0efb99acb0e32ab86ed37e9671df82d2c6e457b00f0663c4aed1273953bd4820973c9baecaa290407fb9f555820b9f7a9bef01f0cf"}, @INET_DIAG_REQ_BYTECODE={0x97, 0x1, "8218e85df61d3cac30b2e635d4835a575a23eb35e7fec99d7511ee59399e65874f11a742fa8d4044eeaf44843244b5be16d34b409bd0d6be7007c3d481f4eeaa18c1d9d45becbb124741f00899fe925f9253df06d1c5e0db1df52b60f06c493251266ccbc3fdc89ecd879fff497704cbbde06bf45091f10ebec2ff57459f6c9eac8f43c62307992ee8f7f01d982fba38bc69db"}, @INET_DIAG_REQ_BYTECODE={0x7e, 0x1, "e43d8060a813583102e7cb482b199d3157d0f7454e2063489822fc547b2779ced8e542e78d37e8d6f062be93a2da2c0ad72f583bb9873dc5c4186dbf0b61451565b88bd640f9d2bd79989ba512907b642dc0fb3fae8140a53664033ccb873b0100cafed71133994134ab3a7f281174f0eaa9ed88dc89de49cee3"}]}, 0x278}, 0x1, 0x0, 0x0, 0x40}, 0x4) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000000080,\x00']) 04:29:57 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366805d8600080801000240004000f801002000400000000000000000008000"/64, 0x40}, {&(0x7f0000010100)="f8ffff00f0ffffffffffffff00"/32, 0x20, 0x800}, {&(0x7f0000010200)="f8ffff00f0ffffffffffffff00"/32, 0x20, 0x1000}, {&(0x7f0000010300)="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", 0x120, 0x1800}, {&(0x7f0000010500)="2e2020202020202020202010004eea70325132510000ea7032510300000000002e2e20202020202020202010004eea70325132510000ea70325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202020004eea70325132510000ea70325104001a040000", 0x80, 0x6000}, {&(0x7f0000010600)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0xa000}, {&(0x7f0000010b00)='syzkallers\x00'/32, 0x20, 0xe000}, {&(0x7f0000010c00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x16000}], 0x0, &(0x7f0000010d00)=ANY=[@ANYBLOB]) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchmod(r1, 0x0) renameat2(r1, &(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x4) statx(r0, &(0x7f0000000040)='./file0\x00', 0x100, 0x8, &(0x7f00000002c0)) 04:29:57 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f00000002c0)=0x1) read(r0, &(0x7f0000000100)=""/146, 0x92) [ 276.975705] Process accounting resumed [ 277.071816] Process accounting resumed [ 277.087979] 9pnet: p9_fd_create_tcp (4687): problem connecting socket to 127.0.0.1 [ 277.138163] 9pnet: p9_fd_create_tcp (4687): problem connecting socket to 127.0.0.1 [ 288.212461] kmemleak: 16 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:30:16 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) dup3(r2, r1, 0x0) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14}, 0x14) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'filter\x00', 0x0, [0x7fff, 0x7fff, 0x3, 0x24000000, 0x2]}, &(0x7f0000000080)=0x54) 04:30:16 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f00000002c0)=0x1) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:30:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000080)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0xa}}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0xa}}) splice(r1, &(0x7f0000000000)=0x40, r2, &(0x7f00000000c0)=0x4, 0x80000001, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='\n\x00\x00\x00\x00\x00\x00\x00']}) copy_file_range(0xffffffffffffffff, &(0x7f0000000100)=0x1, r3, &(0x7f0000000140)=0xbab, 0x800, 0x0) unshare(0x28020600) r4 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, 0x1, 0x6, 0x401, 0x0, 0x0, {0x3, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0xc0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_ABORT_SCAN(r4, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008001}, 0x0) acct(&(0x7f0000000040)='./file0\x00') unshare(0x48020200) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000180)={0x30, 0x2b, 0x7, 0x1b, 0x7, 0x6, 0x3, 0x4}) 04:30:16 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) ioctl$TCXONC(r1, 0x540a, 0x2) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:30:16 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:30:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0xffce, &(0x7f0000000640)=[{&(0x7f0000000440)="10", 0xffd0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000008c0)="7f", 0x1}], 0x1}}], 0x28, 0x8080) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140)=0x800, 0x4) 04:30:16 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) ptrace(0x8, r3) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:30:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f00000002c0)=0x1) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:30:16 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:30:16 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f00000002c0)=0x1) read(r0, &(0x7f0000000100)=""/146, 0x92) [ 295.738501] Process accounting resumed [ 308.728807] kmemleak: 24 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:30:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f00000002c0)=0x1) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:30:36 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:30:36 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) dup3(r2, r1, 0x0) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14}, 0x14) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'filter\x00', 0x0, [0x7fff, 0x7fff, 0x3, 0x24000000, 0x2]}, &(0x7f0000000080)=0x54) 04:30:36 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) ptrace(0x8, r3) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:30:36 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:30:36 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:30:36 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f00000002c0)=0x1) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:30:36 executing program 6: r0 = fork() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000200)) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(r2, 0x0, 0x4011) syz_io_uring_setup(0x585a, &(0x7f0000000cc0)={0x0, 0x1c5d, 0x0, 0x1, 0x1c3, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000d40), &(0x7f0000000d80)) clone3(&(0x7f0000000240)={0x200c00, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0xc}, &(0x7f00000000c0), 0x0, &(0x7f0000000100)=""/219, &(0x7f0000000200)=[r1], 0x1, {r2}}, 0x58) r3 = fork() fork() r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) ptrace(0x11, r1) io_uring_register$IORING_UNREGISTER_PERSONALITY(r2, 0xa, 0x0, r4) tkill(r3, 0x7) wait4(0x0, 0x0, 0x0, 0x0) waitid(0x1, r3, 0x0, 0x4, 0x0) 04:30:36 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f00000002c0)=0x1) 04:30:36 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:30:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f00000002c0)=0x1) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:30:36 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) ioctl$TCXONC(r1, 0x540a, 0x2) 04:30:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) ioctl$TCXONC(r1, 0x540a, 0x2) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:30:36 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:30:36 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:30:36 executing program 6: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) [ 316.045375] cgroup: fork rejected by pids controller in /syz4 [ 327.436306] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:30:56 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:30:56 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:30:56 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) dup3(r2, r1, 0x0) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14}, 0x14) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'filter\x00', 0x0, [0x7fff, 0x7fff, 0x3, 0x24000000, 0x2]}, &(0x7f0000000080)=0x54) 04:30:56 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:30:56 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:30:56 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) ptrace(0x8, r3) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:30:56 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) dup3(r2, r1, 0x0) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14}, 0x14) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'filter\x00', 0x0, [0x7fff, 0x7fff, 0x3, 0x24000000, 0x2]}, &(0x7f0000000080)=0x54) 04:30:56 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:30:56 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:30:56 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:30:56 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:30:56 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:30:56 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:30:56 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:30:56 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:30:56 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) [ 347.118160] kmemleak: 48 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:31:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:31:15 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) ptrace(0x8, r3) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:31:15 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:31:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:31:15 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:31:15 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() kcmp(r3, 0x0, 0x0, r2, r2) process_vm_readv(0x0, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:31:15 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) dup3(r2, r1, 0x0) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14}, 0x14) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'filter\x00', 0x0, [0x7fff, 0x7fff, 0x3, 0x24000000, 0x2]}, &(0x7f0000000080)=0x54) 04:31:15 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:31:15 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:31:15 executing program 6: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:31:15 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:31:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:31:16 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() kcmp(r3, 0x0, 0x0, r2, r2) process_vm_readv(0x0, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:31:16 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:31:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:31:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) [ 366.550950] kmemleak: 14 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:31:34 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) fchmod(r1, 0x0) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:31:34 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:31:34 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:31:34 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:31:34 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:31:34 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() kcmp(r3, 0x0, 0x0, r2, r2) process_vm_readv(0x0, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:31:34 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:31:34 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) dup3(r2, r1, 0x0) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14}, 0x14) 04:31:34 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:31:34 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:31:34 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:31:34 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:31:34 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:31:34 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:31:34 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:31:34 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() kcmp(0x0, r3, 0x0, r2, r2) process_vm_readv(r3, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) [ 385.052784] kmemleak: 29 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:31:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:31:53 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:31:53 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:31:53 executing program 7: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:31:53 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:31:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f00000000c0)={0x5, 0x100, 0x4, 0xffffffff, 0x10001}) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:31:53 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) dup3(r2, r1, 0x0) 04:31:53 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() kcmp(0x0, r3, 0x0, r2, r2) process_vm_readv(r3, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:31:53 executing program 7: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:31:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:31:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:31:53 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:31:53 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() kcmp(0x0, r3, 0x0, r2, r2) process_vm_readv(r3, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:31:53 executing program 7: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:31:53 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:31:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) [ 403.683465] kmemleak: 19 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:32:12 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:32:12 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:32:12 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) 04:32:12 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = fork() r3 = fork() kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) process_vm_readv(r3, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:32:12 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:32:12 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:32:12 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:32:12 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:32:12 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:32:12 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:32:12 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {0x0, 0x0, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:32:12 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:32:12 executing program 6: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:32:12 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = fork() r3 = fork() kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) process_vm_readv(r3, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:32:12 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:32:12 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:32:12 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {0x0, 0x0, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:32:12 executing program 6: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) [ 423.709269] kmemleak: 14 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:32:31 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = fork() r3 = fork() kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) process_vm_readv(r3, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:32:31 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:32:31 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) 04:32:31 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() process_vm_readv(0x0, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:32:31 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:32:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {0x0, 0x0, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:32:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:32:31 executing program 6: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:32:31 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:32:31 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:32:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500), 0x0, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:32:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:32:31 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() process_vm_readv(0x0, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:32:31 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() pidfd_open(r0, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = fork() r3 = fork() kcmp(r2, r3, 0x0, r1, r1) process_vm_readv(r3, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:32:31 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:32:31 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) [ 430.431709] cgroup: fork rejected by pids controller in /syz1 04:32:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500), 0x0, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:32:32 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:32:32 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:32:32 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() pidfd_open(r0, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = fork() r3 = fork() kcmp(r2, r3, 0x0, r1, r1) process_vm_readv(r3, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:32:32 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() process_vm_readv(0x0, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:32:32 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:32:32 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500), 0x0, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:32:32 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) 04:32:32 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:32:32 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:32:32 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fff", 0x5, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) [ 444.505087] kmemleak: 40 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:32:52 executing program 2: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(0xffffffffffffffff, &(0x7f0000000100)=""/146, 0x92) 04:32:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:32:52 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r2, r1, 0x0) 04:32:52 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:32:52 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() pidfd_open(r0, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = fork() r3 = fork() kcmp(r2, r3, 0x0, r1, r1) process_vm_readv(r3, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:32:52 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:32:52 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fff", 0x5, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:32:52 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) [ 463.673727] kmemleak: 18 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:33:11 executing program 2: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(0xffffffffffffffff, &(0x7f0000000100)=""/146, 0x92) 04:33:11 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r2, r1, 0x0) 04:33:11 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) fork() getpid() dup(0xffffffffffffffff) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = fork() r2 = fork() kcmp(r1, r2, 0x0, r0, r0) process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:33:11 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:33:11 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:33:11 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:33:11 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fff", 0x5, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:33:11 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:33:11 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:33:11 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:33:11 executing program 2: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(0xffffffffffffffff, &(0x7f0000000100)=""/146, 0x92) 04:33:11 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff", 0x7, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) [ 482.780173] kmemleak: 14 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:33:30 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:33:30 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:33:30 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:33:30 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r2, r1, 0x0) 04:33:30 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:33:30 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:33:30 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff", 0x7, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:33:30 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) fork() getpid() dup(0xffffffffffffffff) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = fork() r2 = fork() kcmp(r1, r2, 0x0, r0, r0) process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:33:30 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:33:30 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r2, r1, 0x0) 04:33:30 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:33:30 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:33:30 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 04:33:30 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff", 0x7, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:33:30 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:33:30 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) [ 500.005580] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:33:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:33:47 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:33:47 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:33:47 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 04:33:47 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) fork() getpid() dup(0xffffffffffffffff) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = fork() r2 = fork() kcmp(r1, r2, 0x0, r0, r0) process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:33:47 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:33:47 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:33:47 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0f", 0x8, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:33:47 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:33:47 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:33:48 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 04:33:48 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0f", 0x8, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:33:48 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:33:48 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:33:48 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:33:48 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0f", 0x8, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) [ 521.090857] kmemleak: 26 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:34:08 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:34:08 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:34:08 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:34:08 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(0xffffffffffffffff, &(0x7f0000000100)=""/146, 0x92) 04:34:08 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) 04:34:08 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:34:08 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:34:08 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() pidfd_open(r0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r1 = fork() process_vm_readv(r1, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:34:09 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(0xffffffffffffffff, &(0x7f0000000100)=""/146, 0x92) 04:34:09 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:34:09 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:34:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:34:09 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:34:09 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:34:09 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(0xffffffffffffffff, &(0x7f0000000100)=""/146, 0x92) 04:34:09 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:34:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) [ 541.434350] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:34:29 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:34:29 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:34:29 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) 04:34:29 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:34:29 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) getpid() r0 = pidfd_open(0x0, 0x0) dup(r0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = fork() r3 = fork() kcmp(r2, r3, 0x0, r1, r1) process_vm_readv(r3, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:34:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:34:29 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() pidfd_open(r0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r1 = fork() process_vm_readv(r1, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:34:29 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:34:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:34:29 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:34:29 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:34:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:34:29 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:34:29 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() pidfd_open(r0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r1 = fork() process_vm_readv(r1, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:34:29 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) getpid() r0 = pidfd_open(0x0, 0x0) dup(r0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = fork() r3 = fork() kcmp(r2, r3, 0x0, r1, r1) process_vm_readv(r3, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:34:29 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:34:29 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) [ 560.969269] kmemleak: 33 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:34:49 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:34:49 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) 04:34:49 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:34:49 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:34:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:34:49 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:34:49 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) fork() getpid() dup(0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r0 = fork() process_vm_readv(r0, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:34:49 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) getpid() r0 = pidfd_open(0x0, 0x0) dup(r0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = fork() r3 = fork() kcmp(r2, r3, 0x0, r1, r1) process_vm_readv(r3, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:34:49 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:34:49 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:34:49 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:34:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:34:49 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) [ 579.469265] kmemleak: 22 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:35:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:35:07 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:35:07 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:35:07 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:35:07 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:35:07 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:35:07 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:35:07 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) fork() getpid() dup(0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r0 = fork() process_vm_readv(r0, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:35:07 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf0"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:35:07 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:35:07 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:35:07 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:35:07 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:35:07 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) fork() getpid() dup(0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r0 = fork() process_vm_readv(r0, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:35:07 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d2"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:35:07 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) [ 598.065367] kmemleak: 17 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:35:26 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:35:26 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:35:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:35:26 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d2"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:35:26 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:35:26 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e0061090000002000020000", 0x13}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:35:26 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:35:26 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:35:26 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf0"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:35:26 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d2"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:35:26 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e0061090000002000020000", 0x13}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:35:26 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d2"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:35:26 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:35:26 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:35:26 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:35:26 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e0061090000002000020000", 0x13}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) [ 617.572636] kmemleak: 47 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:35:45 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:35:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:35:45 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:35:45 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d287"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:35:45 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d2"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:35:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1", 0x1c}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:35:45 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:35:45 executing program 3: r0 = open(0x0, 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:35:45 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d2"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:35:45 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:35:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1", 0x1c}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:35:45 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d287"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:35:45 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d287"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:35:45 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:35:45 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d287"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:35:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1", 0x1c}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:35:45 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) getpid() r0 = pidfd_open(0x0, 0x0) dup(r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r1 = fork() process_vm_readv(r1, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) [ 635.927866] kmemleak: 16 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:36:03 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:36:03 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:36:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:36:03 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d287"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:36:03 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:36:03 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) getpid() r0 = pidfd_open(0x0, 0x0) dup(r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r1 = fork() process_vm_readv(r1, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:36:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000", 0x21}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:36:03 executing program 3: r0 = open(0x0, 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:36:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000", 0x21}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:36:03 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d287"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:36:03 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:36:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000", 0x21}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:36:03 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:36:03 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) getpid() r0 = pidfd_open(0x0, 0x0) dup(r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r1 = fork() process_vm_readv(r1, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:36:03 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:36:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7", 0x23}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:36:03 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) [ 654.208373] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:36:23 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:36:23 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:36:23 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7", 0x23}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:36:23 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:36:23 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:36:23 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:36:23 executing program 3: r0 = open(0x0, 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:36:23 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:36:23 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7", 0x23}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:36:23 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:36:23 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:36:23 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4", 0x24}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:36:23 executing program 4: unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:36:23 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:36:23 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:36:23 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) [ 675.971056] kmemleak: 38 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:36:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4", 0x24}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:36:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:36:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:36:44 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d2"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:36:44 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:36:44 executing program 4: unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:36:44 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:36:44 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:36:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4", 0x24}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:36:44 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d2"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:36:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:36:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:36:44 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d2"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:36:44 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d2"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) [ 694.862294] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:37:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:37:10 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:37:10 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:37:10 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d2"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:37:10 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:37:10 executing program 4: unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:37:10 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d2"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:37:10 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:37:10 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d287"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:37:10 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d287"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:37:10 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) read(0xffffffffffffffff, &(0x7f0000000100)=""/146, 0x92) 04:37:10 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:37:10 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d287"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:37:10 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:37:10 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:37:10 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d287"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) [ 722.424023] kmemleak: 17 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:37:31 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:37:31 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d287"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:37:31 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:37:31 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) read(0xffffffffffffffff, &(0x7f0000000100)=""/146, 0x92) 04:37:31 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d287"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:37:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(0x0) creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:37:31 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:37:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:37:31 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:37:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(0x0) creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:37:31 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:37:31 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) read(0xffffffffffffffff, &(0x7f0000000100)=""/146, 0x92) 04:37:31 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:37:31 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:37:31 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:37:31 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:37:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(0x0) creat(&(0x7f0000000040)='./file1\x00', 0x0) [ 743.540409] kmemleak: 17 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:37:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) read(r0, 0x0, 0x0) 04:37:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:37:52 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(0x0, 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:37:52 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:37:52 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:37:52 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, 0x0) 04:37:52 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:37:52 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(0x0, 0x0) 04:37:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:37:52 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, 0x0) 04:37:52 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(0x0, 0x0) 04:37:52 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, 0x0) 04:37:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) read(r0, 0x0, 0x0) 04:37:52 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(0x0, 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:37:52 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:37:52 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:37:52 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, 0x0) [ 762.963471] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:38:11 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) read(r0, 0x0, 0x0) 04:38:11 executing program 1: unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:38:11 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:38:11 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:38:11 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(0x0, 0x0) 04:38:11 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(0x0, 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:38:11 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, 0x0) 04:38:11 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, 0x0) 04:38:11 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:38:11 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:38:11 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, 0x0) 04:38:11 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:38:11 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:38:11 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:38:11 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:38:11 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d287"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:38:11 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:38:11 executing program 1: unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:38:11 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:38:11 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) [ 782.791342] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:38:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:38:31 executing program 1: unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:38:31 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:38:31 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:38:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:38:31 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:38:31 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:38:31 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:38:31 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:38:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:38:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:38:31 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) [ 801.986782] kmemleak: 32 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:38:49 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:38:49 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:38:49 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:38:49 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:38:49 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:38:49 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:38:49 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:38:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:38:49 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:38:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) read(0xffffffffffffffff, &(0x7f0000000100)=""/146, 0x92) 04:38:49 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:38:49 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:38:49 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:38:49 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:38:49 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:38:50 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:38:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) read(0xffffffffffffffff, &(0x7f0000000100)=""/146, 0x92) 04:38:50 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:38:50 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) [ 820.184679] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:39:09 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:39:09 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d15400000000000000000000000000000000018000"/120], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:39:09 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) read(0xffffffffffffffff, &(0x7f0000000100)=""/146, 0x92) 04:39:09 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:39:09 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:39:09 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:39:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:39:09 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:39:09 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) read(r0, 0x0, 0x0) 04:39:09 executing program 6: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:39:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:39:09 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) read(0xffffffffffffffff, &(0x7f0000000100)=""/146, 0x92) 04:39:09 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000), 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:39:09 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:39:09 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) [ 841.313539] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:39:28 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:39:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) read(r0, 0x0, 0x0) 04:39:28 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:39:28 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d15400000000000000000000000000000000018000"/120], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:39:28 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:39:28 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000), 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:39:28 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:39:28 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:39:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) read(r0, 0x0, 0x0) 04:39:28 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:39:28 executing program 6: r0 = open(0x0, 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:39:28 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:39:28 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000), 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:39:28 executing program 5: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) getpid() r0 = pidfd_open(0x0, 0x0) dup(r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r1 = fork() process_vm_readv(r1, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:39:28 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:39:29 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d15400000000000000000000000000000000018000"/120], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) [ 859.151689] kmemleak: 31 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:39:47 executing program 7: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1", 0x1c}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:39:47 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:39:47 executing program 0: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:39:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:39:47 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:39:47 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:39:47 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af6089000000000000"], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:39:47 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:39:47 executing program 0: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:39:47 executing program 6: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:39:47 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) [ 866.374794] FAT-fs (loop7): bogus logical sector size 0 [ 866.375882] FAT-fs (loop7): Can't find a valid FAT filesystem 04:39:47 executing program 0: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:39:47 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d2"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:39:47 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:39:47 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af6089000000000000"], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:39:47 executing program 7: syz_open_dev$tty20(0xc, 0x4, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:39:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) [ 877.408448] kmemleak: 55 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:40:05 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:40:05 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:40:05 executing program 7: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:40:05 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af6089000000000000"], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:40:05 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:40:05 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:40:06 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:40:06 executing program 2: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x9d) read(0xffffffffffffffff, &(0x7f0000000100)=""/146, 0x92) 04:40:06 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:40:06 executing program 2: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x9d) read(0xffffffffffffffff, &(0x7f0000000100)=""/146, 0x92) [ 897.677780] kmemleak: 60 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:40:26 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:40:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:40:26 executing program 7: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) getpid() r0 = pidfd_open(0x0, 0x0) dup(r0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = fork() r3 = fork() kcmp(r2, r3, 0x0, r1, r1) process_vm_readv(r3, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:40:26 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d15400000000000000000000000000000000018000"/120], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:40:26 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af608900"/210], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:40:26 executing program 2: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x9d) read(0xffffffffffffffff, &(0x7f0000000100)=""/146, 0x92) 04:40:26 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:40:26 executing program 6: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:40:26 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:40:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:40:26 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:40:26 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af608900"/210], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:40:26 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:40:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:40:26 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d15400000000000000000000000000000000018000"/120], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:40:26 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) read(r0, &(0x7f0000000100)=""/146, 0x92) [ 917.070245] kmemleak: 39 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:40:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:40:46 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:40:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:40:46 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af608900"/210], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:40:46 executing program 7: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) fork() getpid() dup(0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r0 = fork() process_vm_readv(r0, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:40:46 executing program 6: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:40:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:40:46 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d15400000000000000000000000000000000018000"/120], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:40:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:40:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) [ 925.330530] FAT-fs (loop5): bogus number of reserved sectors [ 925.331419] FAT-fs (loop5): Can't find a valid FAT filesystem 04:40:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:40:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:40:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:40:46 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/225], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:40:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) [ 925.610386] FAT-fs (loop5): bogus number of reserved sectors [ 925.611336] FAT-fs (loop5): Can't find a valid FAT filesystem 04:40:46 executing program 5: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) [ 936.929125] kmemleak: 52 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:41:04 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:41:04 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:41:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:41:04 executing program 7: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() process_vm_readv(0x0, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:41:04 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af6089000000000000"], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:41:04 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/225], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:41:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:41:04 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:41:04 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="b933bbad6b66732e00610900000020000200000004f800002000c1c1626d000000c9e7a4bf", 0x25}, {0x0, 0x0, 0x4000}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) 04:41:04 executing program 5: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:41:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:41:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:41:04 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) [ 943.444687] FAT-fs (loop6): bogus logical sector size 0 [ 943.445329] FAT-fs (loop6): Can't find a valid FAT filesystem 04:41:04 executing program 7: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) dup3(r2, r1, 0x0) 04:41:04 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/225], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:41:04 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) read(r0, &(0x7f0000000100)=""/146, 0x92) [ 954.298506] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:41:21 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:41:21 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/233], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:41:21 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x9d) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:41:21 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) dup3(r2, r1, 0x0) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14}, 0x14) 04:41:21 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) dup3(r2, r1, 0x0) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14}, 0x14) 04:41:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:41:21 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af6089000000000000"], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:41:21 executing program 7: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) dup3(r2, r1, 0x0) 04:41:22 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:41:22 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af6089000000000000"], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:41:22 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/233], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:41:22 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:41:22 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:41:22 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af608900"/210], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:41:22 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/233], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:41:22 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) [ 973.051690] kmemleak: 19 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:41:42 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/237], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:41:42 executing program 7: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) dup3(r2, r1, 0x0) 04:41:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:41:42 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af608900"/210], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:41:42 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) dup3(r2, r1, 0x0) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14}, 0x14) 04:41:42 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 04:41:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x9d) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:41:42 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) dup3(r2, r1, 0x0) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14}, 0x14) 04:41:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:41:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:41:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:41:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:41:42 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/237], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:41:42 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af608900"/210], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:41:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:41:42 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/237], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) [ 993.348608] kmemleak: 61 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:42:01 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) dup3(r2, r1, 0x0) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14}, 0x14) 04:42:01 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:42:01 executing program 7: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) 04:42:01 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x9d) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:42:01 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/225], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:42:01 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/239], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:42:01 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) dup3(r2, r1, 0x0) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14}, 0x14) 04:42:01 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 04:42:01 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:42:01 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:42:02 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/225], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:42:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:42:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:42:02 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/239], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:42:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:42:02 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/225], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) [ 1013.244181] kmemleak: 79 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:42:21 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) dup3(r2, r1, 0x0) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14}, 0x14) 04:42:21 executing program 7: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) 04:42:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:42:21 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x9d) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:42:21 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/239], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:42:21 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/233], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:42:21 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 04:42:21 executing program 6: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/225], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:42:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:42:21 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x0) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:42:21 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/233], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:42:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:42:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d287"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:42:22 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/233], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:42:22 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x0) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:42:22 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713327273ce5f82f648e27b8f96f1b8849cf00042b942b3bd31e0755d8bf42e659828febfc7"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x200, 0x8, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) [ 1032.587446] kmemleak: 29 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:42:41 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x0) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:42:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d287"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:42:41 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) dup3(r2, r1, 0x0) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14}, 0x14) 04:42:41 executing program 7: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) 04:42:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x9d) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:42:41 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/237], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:42:41 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) 04:42:41 executing program 6: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:42:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d287"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:42:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:42:41 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/237], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:42:41 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x0) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:42:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:42:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:42:41 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x0) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:42:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, 0x0) 04:42:41 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/237], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:42:41 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d287"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfffe00, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) [ 1052.241271] kmemleak: 46 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:43:01 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x0) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:43:01 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) dup3(r2, r1, 0x0) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14}, 0x14) 04:43:01 executing program 7: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r2, r1, 0x0) 04:43:01 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, 0x0) 04:43:01 executing program 6: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) ptrace(0x8, r3) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:43:01 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/239], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:43:01 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x9d) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:43:01 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) 04:43:01 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, 0x0) [ 1060.839584] cgroup: fork rejected by pids controller in /syz6 04:43:01 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/239], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:43:01 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x10001, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:43:01 executing program 6: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) ptrace(0x8, r3) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:43:02 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) fork() getpid() r0 = pidfd_open(0x0, 0x0) dup(r0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = fork() r3 = fork() kcmp(r2, r3, 0x0, r1, r1) process_vm_readv(r3, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:43:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x9, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:43:02 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/239], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:43:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "2a0c16f53848150217921545e6f7da8bac332b"}) [ 1072.721760] kmemleak: 25 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:43:20 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) 04:43:20 executing program 6: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) ptrace(0x8, r3) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:43:20 executing program 7: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r2, r1, 0x0) 04:43:20 executing program 0: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x0) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:43:20 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x0) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:43:20 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) read(0xffffffffffffffff, &(0x7f0000000100)=""/146, 0x92) 04:43:20 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) fork() getpid() r0 = pidfd_open(0x0, 0x0) dup(r0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = fork() r3 = fork() kcmp(r2, r3, 0x0, r1, r1) process_vm_readv(r3, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:43:20 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) 04:43:20 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) read(0xffffffffffffffff, &(0x7f0000000100)=""/146, 0x92) 04:43:20 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) read(0xffffffffffffffff, &(0x7f0000000100)=""/146, 0x92) 04:43:20 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) fork() getpid() r0 = pidfd_open(0x0, 0x0) dup(r0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = fork() r3 = fork() kcmp(r2, r3, 0x0, r1, r1) process_vm_readv(r3, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:43:20 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x0) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:43:20 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) read(r0, 0x0, 0x0) [ 1091.005981] kmemleak: 37 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 04:43:39 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) read(r0, 0x0, 0x0) 04:43:39 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() pidfd_open(r0, 0x0) dup(0xffffffffffffffff) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = fork() r3 = fork() kcmp(r2, r3, 0x0, r1, r1) process_vm_readv(r3, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:43:39 executing program 5 (fault-call:4 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:43:39 executing program 0 (fault-call:2 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "2a0c16f53848150217921545e6f7da8bac332b"}) 04:43:39 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x0) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:43:39 executing program 7: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r2, r1, 0x0) 04:43:39 executing program 6: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) ptrace(0x8, r3) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:43:39 executing program 3 (fault-call:3 fault-nth:0): r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) [ 1098.134676] FAULT_INJECTION: forcing a failure. [ 1098.134676] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 1098.136659] CPU: 1 PID: 19347 Comm: syz-executor.0 Not tainted 5.10.60 #1 [ 1098.137590] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1098.139233] Call Trace: [ 1098.139601] dump_stack+0x107/0x163 [ 1098.140121] should_fail.cold+0x5/0xa [ 1098.140647] _copy_from_user+0x2e/0x1b0 [ 1098.141227] set_termios.part.0+0x178/0x4d0 [ 1098.141809] ? tty_termios_hw_change+0x1e0/0x1e0 [ 1098.142478] ? lock_release+0x6b0/0x6b0 [ 1098.143031] ? avc_ss_reset+0x180/0x180 [ 1098.143621] tty_mode_ioctl+0xd67/0xef0 [ 1098.144171] ? __ldsem_down_read_nested+0xe9/0x840 [ 1098.144877] ? __ldsem_down_read_nested+0xfa/0x840 [ 1098.145551] ? set_termios.part.0+0x4d0/0x4d0 [ 1098.146208] ? __ldsem_wake_readers+0x3c0/0x3c0 [ 1098.146850] n_tty_ioctl_helper+0x55/0x3a0 [ 1098.147476] n_tty_ioctl+0x7f/0x370 [ 1098.148002] tty_ioctl+0x819/0x1600 [ 1098.148537] ? n_tty_check_unthrottle+0x460/0x460 [ 1098.149234] ? tty_vhangup+0x30/0x30 [ 1098.149771] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1098.150514] ? do_vfs_ioctl+0x283/0x10c0 [ 1098.151110] ? generic_block_fiemap+0x60/0x60 [ 1098.151756] ? selinux_inode_getsecctx+0x90/0x90 [ 1098.152436] ? wait_for_completion+0x270/0x270 [ 1098.153106] ? __fget_files+0x251/0x410 [ 1098.153653] ? security_file_ioctl+0x56/0xb0 [ 1098.154290] ? tty_vhangup+0x30/0x30 [ 1098.154790] __x64_sys_ioctl+0x196/0x210 [ 1098.155794] do_syscall_64+0x33/0x40 [ 1098.156838] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1098.158288] RIP: 0033:0x466609 [ 1098.159221] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1098.164130] RSP: 002b:00007f8cd00ee188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1098.165945] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1098.167629] RDX: 0000000020000280 RSI: 0000000000005403 RDI: 0000000000000003 [ 1098.169300] RBP: 00007f8cd00ee1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1098.170973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1098.172664] R13: 00007fff527ce1df R14: 00007f8cd00ee300 R15: 0000000000022000 04:43:39 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) read(r0, 0x0, 0x0) [ 1098.190514] FAULT_INJECTION: forcing a failure. [ 1098.190514] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1098.192069] CPU: 0 PID: 19346 Comm: syz-executor.5 Not tainted 5.10.60 #1 [ 1098.192810] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1098.194038] Call Trace: [ 1098.194325] dump_stack+0x107/0x163 [ 1098.194719] should_fail.cold+0x5/0xa [ 1098.195136] _copy_to_iter+0x25b/0x1060 [ 1098.195570] ? lock_chain_count+0x20/0x20 [ 1098.196013] ? _copy_from_iter_flushcache+0xc00/0xc00 [ 1098.196581] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 1098.197123] ? check_stack_object+0x6e/0xa0 [ 1098.197583] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1098.198138] ? __check_object_size+0xae/0x440 [ 1098.198621] tty_read+0x2a9/0x5e0 [ 1098.198997] ? do_SAK+0x70/0x70 [ 1098.199376] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1098.199935] ? find_held_lock+0x2c/0x110 [ 1098.200372] new_sync_read+0x41f/0x6e0 [ 1098.200793] ? __ia32_sys_llseek+0x380/0x380 [ 1098.201265] ? selinux_file_permission+0x112/0x540 [ 1098.201810] vfs_read+0x451/0x580 [ 1098.202182] ksys_read+0x12d/0x250 [ 1098.202601] ? __ia32_sys_pwrite64+0x230/0x230 [ 1098.203095] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1098.203680] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1098.204230] do_syscall_64+0x33/0x40 [ 1098.204656] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1098.205205] RIP: 0033:0x466609 [ 1098.205587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1098.207664] RSP: 002b:00007fd99bd07188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1098.207949] FAULT_INJECTION: forcing a failure. [ 1098.207949] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1098.208608] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1098.208640] RDX: 0000000000000092 RSI: 0000000020000100 RDI: 0000000000000003 [ 1098.208648] RBP: 00007fd99bd071d0 R08: 0000000000000000 R09: 0000000000000000 [ 1098.208665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1098.214788] R13: 00007ffd378c5d9f R14: 00007fd99bd07300 R15: 0000000000022000 [ 1098.215599] CPU: 1 PID: 19352 Comm: syz-executor.3 Not tainted 5.10.60 #1 [ 1098.217471] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1098.220578] Call Trace: [ 1098.221248] dump_stack+0x107/0x163 [ 1098.222243] should_fail.cold+0x5/0xa [ 1098.223134] strncpy_from_user+0x34/0x420 [ 1098.224271] setxattr+0xc9/0x330 [ 1098.225037] ? vfs_setxattr+0x270/0x270 [ 1098.226124] ? find_held_lock+0x2c/0x110 [ 1098.227044] ? lock_acquire+0x197/0x490 [ 1098.228132] ? __x64_sys_fsetxattr+0x175/0x280 [ 1098.229137] ? lock_release+0x6b0/0x6b0 [ 1098.230227] ? rcu_read_lock_any_held+0x69/0x90 [ 1098.231264] __x64_sys_fsetxattr+0x1f4/0x280 [ 1098.232461] do_syscall_64+0x33/0x40 [ 1098.233293] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1098.234682] RIP: 0033:0x466609 [ 1098.235427] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1098.240408] RSP: 002b:00007f0f99556188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1098.242077] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 0000000000466609 [ 1098.244026] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 1098.245958] RBP: 00007f0f995561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1098.247956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1098.249764] R13: 00007ffd4dd1f44f R14: 00007f0f99556300 R15: 0000000000022000 04:43:39 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x0) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:43:39 executing program 5 (fault-call:4 fault-nth:1): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:43:39 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() pidfd_open(r0, 0x0) dup(0xffffffffffffffff) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = fork() r3 = fork() kcmp(r2, r3, 0x0, r1, r1) process_vm_readv(r3, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:43:39 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) read(r0, 0x0, 0x0) [ 1098.509326] FAULT_INJECTION: forcing a failure. [ 1098.509326] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1098.511763] CPU: 1 PID: 19761 Comm: syz-executor.5 Not tainted 5.10.60 #1 [ 1098.513158] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1098.515429] Call Trace: [ 1098.515971] dump_stack+0x107/0x163 [ 1098.516693] should_fail.cold+0x5/0xa [ 1098.517476] _copy_to_iter+0x25b/0x1060 [ 1098.518369] ? lock_chain_count+0x20/0x20 [ 1098.519331] ? _copy_from_iter_flushcache+0xc00/0xc00 [ 1098.520491] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 1098.521648] ? check_stack_object+0x6e/0xa0 [ 1098.522619] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1098.523813] ? __check_object_size+0xae/0x440 [ 1098.524829] tty_read+0x2a9/0x5e0 [ 1098.525639] ? do_SAK+0x70/0x70 [ 1098.526389] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1098.527590] ? find_held_lock+0x2c/0x110 [ 1098.528525] new_sync_read+0x41f/0x6e0 [ 1098.529419] ? __ia32_sys_llseek+0x380/0x380 [ 1098.530429] ? selinux_file_permission+0x112/0x540 [ 1098.531565] vfs_read+0x451/0x580 04:43:39 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x0) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) [ 1098.532363] ksys_read+0x12d/0x250 [ 1098.533374] ? __ia32_sys_pwrite64+0x230/0x230 [ 1098.534420] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1098.535609] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1098.536776] do_syscall_64+0x33/0x40 [ 1098.537623] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1098.538765] RIP: 0033:0x466609 04:43:39 executing program 0 (fault-call:2 fault-nth:1): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "2a0c16f53848150217921545e6f7da8bac332b"}) [ 1098.539527] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1098.543739] RSP: 002b:00007fd99bd07188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1098.545452] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1098.547049] RDX: 0000000000000092 RSI: 0000000020000100 RDI: 0000000000000003 [ 1098.548638] RBP: 00007fd99bd071d0 R08: 0000000000000000 R09: 0000000000000000 [ 1098.550234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1098.551826] R13: 00007ffd378c5d9f R14: 00007fd99bd07300 R15: 0000000000022000 04:43:39 executing program 6: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) ptrace(0x8, r3) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) [ 1098.583761] FAULT_INJECTION: forcing a failure. [ 1098.583761] name failslab, interval 1, probability 0, space 0, times 1 [ 1098.586064] CPU: 0 PID: 19768 Comm: syz-executor.0 Not tainted 5.10.60 #1 [ 1098.586819] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1098.588110] Call Trace: [ 1098.588402] dump_stack+0x107/0x163 [ 1098.588812] should_fail.cold+0x5/0xa [ 1098.589243] ? tty_buffer_alloc+0x23f/0x2a0 [ 1098.589729] should_failslab+0x5/0x10 [ 1098.590152] __kmalloc+0x72/0x3e0 [ 1098.590554] tty_buffer_alloc+0x23f/0x2a0 [ 1098.591014] __tty_buffer_request_room+0x156/0x2a0 [ 1098.591574] tty_insert_flip_string_fixed_flag+0x8d/0x250 [ 1098.592186] pty_write+0x126/0x1f0 [ 1098.592584] tty_put_char+0x129/0x150 [ 1098.593001] ? tty_hung_up_p+0x70/0x70 [ 1098.593422] ? tty_schedule_flip+0xde/0x100 [ 1098.593907] ? pty_write_room+0xbe/0xe0 [ 1098.594416] ? pty_stop+0x1a0/0x1a0 [ 1098.594952] __process_echoes+0x57c/0x9f0 [ 1098.595557] process_echoes+0xf9/0x1c0 [ 1098.596106] n_tty_set_termios+0x740/0xff0 [ 1098.596711] ? n_tty_receive_buf+0x40/0x40 [ 1098.597274] tty_set_termios+0x5f1/0x840 [ 1098.597740] ? tty_wait_until_sent+0x4e0/0x4e0 [ 1098.598247] ? lock_downgrade+0x6d0/0x6d0 [ 1098.598710] set_termios.part.0+0x2c4/0x4d0 [ 1098.599187] ? tty_termios_hw_change+0x1e0/0x1e0 [ 1098.599701] ? lock_release+0x6b0/0x6b0 [ 1098.600138] ? avc_ss_reset+0x180/0x180 [ 1098.600575] tty_mode_ioctl+0xd67/0xef0 [ 1098.601023] ? __ldsem_down_read_nested+0xe9/0x840 [ 1098.601569] ? __ldsem_down_read_nested+0xfa/0x840 [ 1098.602107] ? set_termios.part.0+0x4d0/0x4d0 [ 1098.602610] ? __ldsem_wake_readers+0x3c0/0x3c0 [ 1098.603133] n_tty_ioctl_helper+0x55/0x3a0 [ 1098.603613] n_tty_ioctl+0x7f/0x370 [ 1098.604012] tty_ioctl+0x819/0x1600 [ 1098.604411] ? n_tty_check_unthrottle+0x460/0x460 [ 1098.604963] ? tty_vhangup+0x30/0x30 [ 1098.605372] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1098.605944] ? do_vfs_ioctl+0x283/0x10c0 [ 1098.606390] ? generic_block_fiemap+0x60/0x60 [ 1098.606888] ? selinux_inode_getsecctx+0x90/0x90 [ 1098.607423] ? wait_for_completion+0x270/0x270 [ 1098.607904] ? __fget_files+0x251/0x410 [ 1098.608338] ? security_file_ioctl+0x56/0xb0 [ 1098.608815] ? tty_vhangup+0x30/0x30 [ 1098.609219] __x64_sys_ioctl+0x196/0x210 [ 1098.609678] do_syscall_64+0x33/0x40 [ 1098.610107] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1098.610675] RIP: 0033:0x466609 [ 1098.611037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1098.613051] RSP: 002b:00007f8cd00ee188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1098.613917] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1098.614725] RDX: 0000000020000280 RSI: 0000000000005403 RDI: 0000000000000003 [ 1098.615496] RBP: 00007f8cd00ee1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1098.616251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1098.617032] R13: 00007fff527ce1df R14: 00007f8cd00ee300 R15: 0000000000022000 [ 1098.617829] [ 1098.617833] ====================================================== [ 1098.617836] WARNING: possible circular locking dependency detected [ 1098.617838] 5.10.60 #1 Not tainted [ 1098.617842] ------------------------------------------------------ [ 1098.617844] syz-executor.0/19768 is trying to acquire lock: [ 1098.617847] ffffffff84d0a920 (console_owner){-.-.}-{0:0}, at: console_unlock+0x2e1/0xb30 [ 1098.617856] [ 1098.617858] but task is already holding lock: [ 1098.617860] ffff8880478be958 (&port->lock){-.-.}-{2:2}, at: pty_write+0xf4/0x1f0 [ 1098.617868] [ 1098.617871] which lock already depends on the new lock. [ 1098.617872] [ 1098.617873] [ 1098.617875] the existing dependency chain (in reverse order) is: [ 1098.617877] [ 1098.617878] -> #2 (&port->lock){-.-.}-{2:2}: [ 1098.617886] _raw_spin_lock_irqsave+0x36/0x50 [ 1098.617888] tty_port_tty_get+0x1f/0x100 [ 1098.617891] tty_port_default_wakeup+0x11/0x40 [ 1098.617893] serial8250_tx_chars+0x516/0xac0 [ 1098.617895] serial8250_handle_irq.part.0+0x2d9/0x4d0 [ 1098.617898] serial8250_default_handle_irq+0xb8/0x230 [ 1098.617900] serial8250_interrupt+0xf4/0x1a0 [ 1098.617902] __handle_irq_event_percpu+0x2ef/0x820 [ 1098.617905] handle_irq_event+0x102/0x290 [ 1098.617907] handle_edge_irq+0x249/0xd00 [ 1098.617909] asm_call_irq_on_stack+0x12/0x20 [ 1098.617911] common_interrupt+0xdd/0x190 [ 1098.617914] asm_common_interrupt+0x1e/0x40 [ 1098.617915] default_idle+0xe/0x10 [ 1098.617917] default_idle_call+0x87/0xd0 [ 1098.617919] do_idle+0x3a5/0x510 [ 1098.617921] cpu_startup_entry+0x14/0x20 [ 1098.617924] secondary_startup_64_no_verify+0xc2/0xcb [ 1098.617925] [ 1098.617926] -> #1 (&port_lock_key){-.-.}-{2:2}: [ 1098.617934] _raw_spin_lock_irqsave+0x36/0x50 [ 1098.617936] serial8250_console_write+0x8e2/0xb20 [ 1098.617939] console_unlock+0x823/0xb30 [ 1098.617941] register_console+0x523/0x800 [ 1098.617943] univ8250_console_init+0x3a/0x46 [ 1098.617945] console_init+0x361/0x4fa [ 1098.617947] start_kernel+0x2ed/0x496 [ 1098.617949] secondary_startup_64_no_verify+0xc2/0xcb [ 1098.617951] [ 1098.617952] -> #0 (console_owner){-.-.}-{0:0}: [ 1098.617960] __lock_acquire+0x29fd/0x5b60 [ 1098.617962] lock_acquire+0x197/0x490 [ 1098.617964] console_unlock+0x360/0xb30 [ 1098.617966] vprintk_emit+0x1da/0x4d0 [ 1098.617968] vprintk_func+0x8b/0x140 [ 1098.617969] printk+0xba/0xed [ 1098.617971] should_fail+0x470/0x590 [ 1098.617973] should_failslab+0x5/0x10 [ 1098.617975] __kmalloc+0x72/0x3e0 [ 1098.617978] tty_buffer_alloc+0x23f/0x2a0 [ 1098.617981] __tty_buffer_request_room+0x156/0x2a0 [ 1098.617984] tty_insert_flip_string_fixed_flag+0x8d/0x250 [ 1098.617985] pty_write+0x126/0x1f0 [ 1098.617987] tty_put_char+0x129/0x150 [ 1098.617989] __process_echoes+0x57c/0x9f0 [ 1098.617992] process_echoes+0xf9/0x1c0 [ 1098.617994] n_tty_set_termios+0x740/0xff0 [ 1098.617996] tty_set_termios+0x5f1/0x840 [ 1098.617998] set_termios.part.0+0x2c4/0x4d0 [ 1098.618000] tty_mode_ioctl+0xd67/0xef0 [ 1098.618002] n_tty_ioctl_helper+0x55/0x3a0 [ 1098.618004] n_tty_ioctl+0x7f/0x370 [ 1098.618006] tty_ioctl+0x819/0x1600 [ 1098.618008] __x64_sys_ioctl+0x196/0x210 [ 1098.618010] do_syscall_64+0x33/0x40 [ 1098.618013] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1098.618013] [ 1098.618016] other info that might help us debug this: [ 1098.618017] [ 1098.618018] Chain exists of: [ 1098.618020] console_owner --> &port_lock_key --> &port->lock [ 1098.618029] [ 1098.618031] Possible unsafe locking scenario: [ 1098.618032] [ 1098.618035] CPU0 CPU1 [ 1098.618037] ---- ---- [ 1098.618038] lock(&port->lock); [ 1098.618043] lock(&port_lock_key); [ 1098.618048] lock(&port->lock); [ 1098.618053] lock(console_owner); [ 1098.618056] [ 1098.618058] *** DEADLOCK *** [ 1098.618059] [ 1098.618061] 6 locks held by syz-executor.0/19768: [ 1098.618062] #0: ffff888043f20098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x22/0x80 [ 1098.618072] #1: ffff888043f232e8 (&o_tty->termios_rwsem/1){++++}-{3:3}, at: tty_set_termios+0xec/0x840 [ 1098.618083] #2: ffff888043f23098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref+0x1d/0x80 [ 1098.618093] #3: ffffc90000771378 (&ldata->output_lock){+.+.}-{3:3}, at: process_echoes+0xaf/0x1c0 [ 1098.618103] #4: ffff8880478be958 (&port->lock){-.-.}-{2:2}, at: pty_write+0xf4/0x1f0 [ 1098.618112] #5: ffffffff84deaca0 (console_lock){+.+.}-{0:0}, at: vprintk_func+0x8b/0x140 [ 1098.618121] [ 1098.618123] stack backtrace: [ 1098.618126] CPU: 0 PID: 19768 Comm: syz-executor.0 Not tainted 5.10.60 #1 [ 1098.618130] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1098.618132] Call Trace: [ 1098.618133] dump_stack+0x107/0x163 [ 1098.618135] check_noncircular+0x268/0x310 [ 1098.618137] ? print_circular_bug+0x470/0x470 [ 1098.618139] ? memcpy+0x39/0x60 [ 1098.618141] __lock_acquire+0x29fd/0x5b60 [ 1098.618143] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1098.618145] lock_acquire+0x197/0x490 [ 1098.618147] ? console_unlock+0x2e1/0xb30 [ 1098.618149] ? lock_release+0x6b0/0x6b0 [ 1098.618151] ? lock_downgrade+0x6d0/0x6d0 [ 1098.618153] ? do_raw_spin_lock+0x129/0x270 [ 1098.618155] ? rwlock_bug.part.0+0x90/0x90 [ 1098.618157] console_unlock+0x360/0xb30 [ 1098.618159] ? console_unlock+0x2e1/0xb30 [ 1098.618161] ? devkmsg_read+0x720/0x720 [ 1098.618162] ? lock_release+0x6b0/0x6b0 [ 1098.618164] ? do_raw_spin_unlock+0x4f/0x210 [ 1098.618166] ? vprintk_func+0x8b/0x140 [ 1098.618168] vprintk_emit+0x1da/0x4d0 [ 1098.618170] vprintk_func+0x8b/0x140 [ 1098.618171] printk+0xba/0xed [ 1098.618173] ? record_print_text.cold+0x16/0x16 [ 1098.618175] ? ___ratelimit+0x21c/0x460 [ 1098.618177] should_fail+0x470/0x590 [ 1098.618179] ? tty_buffer_alloc+0x23f/0x2a0 [ 1098.618181] should_failslab+0x5/0x10 [ 1098.618183] __kmalloc+0x72/0x3e0 [ 1098.618185] tty_buffer_alloc+0x23f/0x2a0 [ 1098.618187] __tty_buffer_request_room+0x156/0x2a0 [ 1098.618189] tty_insert_flip_string_fixed_flag+0x8d/0x250 [ 1098.618191] pty_write+0x126/0x1f0 [ 1098.618193] tty_put_char+0x129/0x150 [ 1098.618195] ? tty_hung_up_p+0x70/0x70 [ 1098.618197] ? tty_schedule_flip+0xde/0x100 [ 1098.618198] ? pty_write_room+0xbe/0xe0 [ 1098.618200] ? pty_stop+0x1a0/0x1a0 [ 1098.618202] __process_echoes+0x57c/0x9f0 [ 1098.618204] process_echoes+0xf9/0x1c0 [ 1098.618206] n_tty_set_termios+0x740/0xff0 [ 1098.618208] ? n_tty_receive_buf+0x40/0x40 [ 1098.618210] tty_set_termios+0x5f1/0x840 [ 1098.618212] ? tty_wait_until_sent+0x4e0/0x4e0 [ 1098.618214] ? lock_downgrade+0x6d0/0x6d0 [ 1098.618216] set_termios.part.0+0x2c4/0x4d0 [ 1098.618218] ? tty_termios_hw_change+0x1e0/0x1e0 [ 1098.618220] ? lock_release+0x6b0/0x6b0 [ 1098.618221] ? avc_ss_reset+0x180/0x180 [ 1098.618223] tty_mode_ioctl+0xd67/0xef0 [ 1098.618226] ? __ldsem_down_read_nested+0xe9/0x840 [ 1098.618228] ? __ldsem_down_read_nested+0xfa/0x840 [ 1098.618230] ? set_termios.part.0+0x4d0/0x4d0 [ 1098.618232] ? __ldsem_wake_readers+0x3c0/0x3c0 [ 1098.618234] n_tty_ioctl_helper+0x55/0x3a0 [ 1098.618236] n_tty_ioctl+0x7f/0x370 [ 1098.618238] tty_ioctl+0x819/0x1600 [ 1098.618240] ? n_tty_check_unthrottle+0x460/0x460 [ 1098.618242] ? tty_vhangup+0x30/0x30 [ 1098.618244] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1098.618246] ? do_vfs_ioctl+0x283/0x10c0 [ 1098.618248] ? generic_block_fiemap+0x60/0x60 [ 1098.618250] ? selinux_inode_getsecctx+0x90/0x90 [ 1098.618252] ? wait_for_completion+0x270/0x270 [ 1098.618254] ? __fget_files+0x251/0x410 [ 1098.618256] ? security_file_ioctl+0x56/0xb0 [ 1098.618258] ? tty_vhangup+0x30/0x30 [ 1098.618260] __x64_sys_ioctl+0x196/0x210 [ 1098.618261] do_syscall_64+0x33/0x40 [ 1098.618264] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1098.618265] RIP: 0033:0x466609 [ 1098.618272] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1098.618274] RSP: 002b:00007f8cd00ee188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1098.618279] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1098.618282] RDX: 0000000020000280 RSI: 0000000000005403 RDI: 0000000000000003 [ 1098.618285] RBP: 00007f8cd00ee1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1098.618288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1098.618291] R13: 00007fff527ce1df R14: 00007f8cd00ee300 R15: 0000000000022000 04:43:39 executing program 2 (fault-call:2 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) read(r0, &(0x7f0000000100)=""/146, 0x92) [ 1098.783937] FAULT_INJECTION: forcing a failure. [ 1098.783937] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1098.787044] CPU: 1 PID: 19956 Comm: syz-executor.2 Not tainted 5.10.60 #1 [ 1098.788671] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1098.791184] Call Trace: [ 1098.791767] dump_stack+0x107/0x163 [ 1098.792585] should_fail.cold+0x5/0xa [ 1098.793428] _copy_to_iter+0x25b/0x1060 [ 1098.794282] ? _copy_from_iter_flushcache+0xc00/0xc00 [ 1098.795473] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 1098.796625] ? check_stack_object+0x6e/0xa0 [ 1098.797584] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1098.798937] ? __check_object_size+0xae/0x440 [ 1098.800162] tty_read+0x2a9/0x5e0 [ 1098.801115] ? do_SAK+0x70/0x70 [ 1098.802038] ? rcu_read_lock_sched_held+0xd/0x70 [ 1098.803323] ? lock_acquire+0x3f9/0x490 [ 1098.804179] ? rcu_read_lock_sched_held+0xd/0x70 [ 1098.805188] new_sync_read+0x41f/0x6e0 [ 1098.806019] ? __ia32_sys_llseek+0x380/0x380 04:43:39 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() pidfd_open(r0, 0x0) dup(0xffffffffffffffff) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = fork() r3 = fork() kcmp(r2, r3, 0x0, r1, r1) process_vm_readv(r3, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) [ 1098.807010] ? __fget_files+0x228/0x410 [ 1098.808092] ? selinux_file_permission+0x112/0x540 [ 1098.809192] vfs_read+0x451/0x580 [ 1098.809975] ksys_read+0x12d/0x250 [ 1098.810755] ? __ia32_sys_pwrite64+0x230/0x230 [ 1098.811820] ? fpregs_assert_state_consistent+0xb9/0xe0 [ 1098.813003] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1098.814136] do_syscall_64+0x33/0x40 [ 1098.814954] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1098.816094] RIP: 0033:0x466609 [ 1098.816802] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1098.820644] RSP: 002b:00007f953684a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1098.822347] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1098.823963] RDX: 0000000000000092 RSI: 0000000020000100 RDI: 0000000000000003 [ 1098.825557] RBP: 00007f953684a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1098.827156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1098.828747] R13: 00007ffd2c75709f R14: 00007f953684a300 R15: 0000000000022000 04:43:39 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x0) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r2 = fork() process_vm_readv(r2, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:43:40 executing program 5 (fault-call:4 fault-nth:2): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) read(r0, &(0x7f0000000100)=""/146, 0x92) 04:43:40 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) fork() getpid() r0 = pidfd_open(0x0, 0x0) dup(r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r1 = fork() process_vm_readv(r1, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:43:40 executing program 3 (fault-call:3 fault-nth:1): r0 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:43:40 executing program 7: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000001f00)=[{&(0x7f00000003c0)="3b8dfecea9ff0bb92bbce86116115fec710eb5e6f748332ef011e208fcfe5fcccb41ecc3ba7bbbf19b3e44", 0x2b}], 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400), 0x0) dup3(r2, r1, 0x0) 04:43:40 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:43:40 executing program 0 (fault-call:2 fault-nth:2): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000000000000000000000000000762d8c4850e640c7905da90f82ecc0db5c85dbf959bbe535b7ba4c7206990f4af851947c951eb764d017e787a1e4d1cf38aedafd53e6931931aedc9b9e80bca84c08603327abed19a92f5d5c899e83f73fe5870ea4c7d28713"], 0x9d) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "2a0c16f53848150217921545e6f7da8bac332b"}) [ 1099.085437] FAULT_INJECTION: forcing a failure. [ 1099.085437] name failslab, interval 1, probability 0, space 0, times 0 [ 1099.087376] CPU: 1 PID: 20296 Comm: syz-executor.0 Not tainted 5.10.60 #1 [ 1099.088492] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1099.090374] Call Trace: [ 1099.090820] dump_stack+0x107/0x163 [ 1099.091440] should_fail.cold+0x5/0xa [ 1099.092088] ? create_object.isra.0+0x3a/0xa10 [ 1099.092872] should_failslab+0x5/0x10 [ 1099.093503] kmem_cache_alloc+0x5b/0x350 [ 1099.094179] create_object.isra.0+0x3a/0xa10 04:43:40 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) fork() getpid() r0 = pidfd_open(0x0, 0x0) dup(r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r1 = fork() process_vm_readv(r1, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) [ 1099.094904] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1099.095939] __kmalloc+0x170/0x3e0 [ 1099.096517] tty_buffer_alloc+0x23f/0x2a0 [ 1099.097190] __tty_buffer_request_room+0x156/0x2a0 [ 1099.097988] tty_insert_flip_string_fixed_flag+0x8d/0x250 [ 1099.098884] pty_write+0x126/0x1f0 [ 1099.099468] tty_put_char+0x129/0x150 [ 1099.100083] ? tty_hung_up_p+0x70/0x70 [ 1099.100713] ? tty_schedule_flip+0xde/0x100 [ 1099.101409] ? pty_write_room+0xbe/0xe0 [ 1099.102192] ? pty_stop+0x1a0/0x1a0 [ 1099.102957] __process_echoes+0x57c/0x9f0 [ 1099.103856] process_echoes+0xf9/0x1c0 [ 1099.104657] n_tty_set_termios+0x740/0xff0 [ 1099.105425] ? n_tty_receive_buf+0x40/0x40 [ 1099.106175] tty_set_termios+0x5f1/0x840 [ 1099.106855] ? tty_wait_until_sent+0x4e0/0x4e0 [ 1099.107631] ? lock_downgrade+0x6d0/0x6d0 [ 1099.108367] set_termios.part.0+0x2c4/0x4d0 [ 1099.109067] ? tty_termios_hw_change+0x1e0/0x1e0 [ 1099.109830] ? lock_release+0x6b0/0x6b0 [ 1099.110473] ? lock_acquire+0x3f9/0x490 [ 1099.111131] ? avc_ss_reset+0x180/0x180 [ 1099.111775] tty_mode_ioctl+0xd67/0xef0 [ 1099.112417] ? __ldsem_down_read_nested+0xe9/0x840 [ 1099.113216] ? __ldsem_down_read_nested+0xfa/0x840 [ 1099.114017] ? set_termios.part.0+0x4d0/0x4d0 [ 1099.114744] ? lock_acquire+0x3f9/0x490 [ 1099.115410] ? __ldsem_wake_readers+0x3c0/0x3c0 [ 1099.116167] ? _kstrtoull+0x299/0x550 [ 1099.116783] n_tty_ioctl_helper+0x55/0x3a0 [ 1099.117474] n_tty_ioctl+0x7f/0x370 [ 1099.118064] tty_ioctl+0x819/0x1600 [ 1099.118650] ? n_tty_check_unthrottle+0x460/0x460 [ 1099.119435] ? tty_vhangup+0x30/0x30 [ 1099.120040] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1099.120875] ? do_vfs_ioctl+0x283/0x10c0 [ 1099.121532] ? lock_release+0x4db/0x6b0 [ 1099.122172] ? generic_block_fiemap+0x60/0x60 [ 1099.122898] ? selinux_inode_getsecctx+0x90/0x90 [ 1099.123709] ? wait_for_completion+0x270/0x270 [ 1099.124471] ? __fget_files+0x251/0x410 [ 1099.125130] ? security_file_ioctl+0x56/0xb0 [ 1099.125842] ? tty_vhangup+0x30/0x30 [ 1099.126472] __x64_sys_ioctl+0x196/0x210 [ 1099.127168] do_syscall_64+0x33/0x40 [ 1099.127823] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1099.128690] RIP: 0033:0x466609 [ 1099.129224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1099.132288] RSP: 002b:00007f8cd00ee188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1099.133528] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1099.134686] RDX: 0000000020000280 RSI: 0000000000005403 RDI: 0000000000000003 [ 1099.135847] RBP: 00007f8cd00ee1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1099.136999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1099.138157] R13: 00007fff527ce1df R14: 00007f8cd00ee300 R15: 0000000000022000 04:43:40 executing program 2 (fault-call:2 fault-nth:1): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0x9d) read(r0, &(0x7f0000000100)=""/146, 0x92) [ 1099.186731] FAULT_INJECTION: forcing a failure. [ 1099.186731] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1099.188714] CPU: 1 PID: 20343 Comm: syz-executor.2 Not tainted 5.10.60 #1 [ 1099.189798] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1099.191605] Call Trace: [ 1099.192025] dump_stack+0x107/0x163 [ 1099.192597] should_fail.cold+0x5/0xa [ 1099.193205] _copy_to_iter+0x25b/0x1060 [ 1099.193833] ? _copy_from_iter_flushcache+0xc00/0xc00 [ 1099.194646] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 1099.195467] ? check_stack_object+0x6e/0xa0 [ 1099.196150] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1099.196970] ? __check_object_size+0xae/0x440 [ 1099.197723] tty_read+0x2a9/0x5e0 [ 1099.198307] ? do_SAK+0x70/0x70 [ 1099.198858] ? rcu_read_lock_sched_held+0xd/0x70 [ 1099.199673] ? lock_acquire+0x3f9/0x490 [ 1099.200341] ? rcu_read_lock_sched_held+0xd/0x70 [ 1099.201134] new_sync_read+0x41f/0x6e0 [ 1099.201783] ? __ia32_sys_llseek+0x380/0x380 [ 1099.202532] ? __fget_files+0x228/0x410 [ 1099.203218] ? selinux_file_permission+0x112/0x540 [ 1099.204088] vfs_read+0x451/0x580 [ 1099.204823] ksys_read+0x12d/0x250 [ 1099.205585] ? __ia32_sys_pwrite64+0x230/0x230 [ 1099.206564] ? fpregs_assert_state_consistent+0xb9/0xe0 [ 1099.207617] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1099.208508] do_syscall_64+0x33/0x40 [ 1099.209144] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1099.210026] RIP: 0033:0x466609 [ 1099.210585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1099.213801] RSP: 002b:00007f953684a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1099.215043] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1099.216171] RDX: 0000000000000092 RSI: 0000000020000100 RDI: 0000000000000003 [ 1099.217359] RBP: 00007f953684a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1099.218490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1099.219691] R13: 00007ffd2c75709f R14: 00007f953684a300 R15: 0000000000022000 04:43:40 executing program 1: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) fork() getpid() r0 = pidfd_open(0x0, 0x0) dup(r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fork() r1 = fork() process_vm_readv(r1, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) 04:43:40 executing program 4: io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000000000000000000000f1ff00000000000000000000000000000000000000000000000000000000000000000000eefabd3d10b3d154000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de0000000000000000001b241edae3e16c95af60890000000000000000000000000000000000000000000000000000000000000000000000001800"/240], 0x1c) unshare(0x60040000) fork() unshare(0x50040000) r0 = fork() getpid() r1 = pidfd_open(r0, 0x0) dup(r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r3 = fork() r4 = fork() kcmp(r3, r4, 0x0, r2, r2) process_vm_readv(r4, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/24, 0x18}], 0x4, &(0x7f0000001480)=[{&(0x7f0000001200)=""/140, 0x8c}, {&(0x7f00000012c0)=""/119, 0x77}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f0000001400)=""/128, 0x80}], 0x4, 0x0) [ 1099.538159] FAULT_INJECTION: forcing a failure. [ 1099.538159] name failslab, interval 1, probability 0, space 0, times 0 [ 1099.539625] CPU: 0 PID: 20330 Comm: syz-executor.3 Not tainted 5.10.60 #1 [ 1099.540393] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1099.541690] Call Trace: [ 1099.541999] dump_stack+0x107/0x163 [ 1099.542416] should_fail.cold+0x5/0xa [ 1099.542859] ? jbd2__journal_start+0x18d/0x690 [ 1099.543390] should_failslab+0x5/0x10 [ 1099.543817] kmem_cache_alloc+0x5b/0x350 [ 1099.544284] ? _down_write_nest_lock+0x150/0x150 [ 1099.544807] ? rwsem_down_write_slowpath+0x522/0xc10 [ 1099.545375] jbd2__journal_start+0x18d/0x690 [ 1099.545878] __ext4_journal_start_sb+0x210/0x420 [ 1099.546416] ext4_xattr_set+0x23a/0x340 [ 1099.546870] ? ext4_xattr_set_credits+0x200/0x200 [ 1099.547432] ? inode_has_perm+0x171/0x1d0 [ 1099.547898] ? xattr_resolve_name+0x270/0x3d0 [ 1099.548411] ? ext4_xattr_hurd_get+0xf0/0xf0 [ 1099.548913] __vfs_setxattr+0x10f/0x170 [ 1099.549355] ? xattr_resolve_name+0x3d0/0x3d0 [ 1099.549858] ? security_capable+0x95/0xc0 [ 1099.550326] __vfs_setxattr_noperm+0x11a/0x4c0 [ 1099.550840] __vfs_setxattr_locked+0x1c2/0x250 [ 1099.551373] vfs_setxattr+0xe8/0x270 [ 1099.551787] ? __vfs_setxattr_locked+0x250/0x250 [ 1099.552326] ? strncpy_from_user+0xa5/0x420 [ 1099.552812] setxattr+0x23d/0x330 [ 1099.553198] ? vfs_setxattr+0x270/0x270 [ 1099.553639] ? rcu_read_lock_sched_held+0xd/0x70 [ 1099.554170] ? lock_release+0x4db/0x6b0 [ 1099.554607] ? lock_downgrade+0x6d0/0x6d0 [ 1099.555062] ? __fget_files+0x228/0x410 [ 1099.555518] ? rcu_read_lock_sched_held+0xd/0x70 [ 1099.556042] ? lock_acquire+0x3f9/0x490 [ 1099.556486] ? lock_release+0x6b0/0x6b0 [ 1099.556932] ? wait_for_completion+0x270/0x270 [ 1099.557430] ? __fget_files+0x251/0x410 [ 1099.557877] ? rcu_read_lock_any_held+0x5/0x90 [ 1099.558377] __x64_sys_fsetxattr+0x1f4/0x280 [ 1099.558872] do_syscall_64+0x33/0x40 [ 1099.559304] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1099.559890] RIP: 0033:0x466609 [ 1099.560245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1099.562292] RSP: 002b:00007f0f99556188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1099.563177] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 0000000000466609 [ 1099.563972] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 1099.564771] RBP: 00007f0f995561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1099.565593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1099.566398] R13: 00007ffd4dd1f44f R14: 00007f0f99556300 R15: 0000000000022000 [ 1099.825584] FAULT_INJECTION: forcing a failure. [ 1099.825584] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1099.828398] CPU: 1 PID: 20132 Comm: syz-executor.5 Not tainted 5.10.60 #1 [ 1099.829994] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1099.832636] Call Trace: [ 1099.833250] dump_stack+0x107/0x163 [ 1099.834091] should_fail.cold+0x5/0xa [ 1099.834972] __alloc_pages_nodemask+0x17f/0x670 [ 1099.836073] ? lock_acquire+0x3f9/0x490 [ 1099.836853] ? __alloc_pages_slowpath.constprop.0+0x2090/0x2090 [ 1099.838020] ? release_pages+0x809/0xc20 [ 1099.839010] ? rcu_read_lock_sched_held+0xd/0x70 [ 1099.840223] ? lock_release+0x4db/0x6b0 [ 1099.841229] alloc_pages_current+0x187/0x280 [ 1099.842121] __get_free_pages+0xc/0xa0 [ 1099.842895] ? page_remove_rmap+0xe9/0x7d0 [ 1099.843749] __tlb_remove_page_size+0x24e/0x410 [ 1099.844729] unmap_page_range+0xeb1/0x1e00 [ 1099.845578] ? vm_normal_page+0x2f0/0x2f0 [ 1099.846425] ? lock_release+0x4db/0x6b0 [ 1099.847214] ? lock_downgrade+0x6d0/0x6d0 [ 1099.848021] ? uprobe_munmap+0x1c/0x560 [ 1099.848795] unmap_single_vma+0x198/0x300 [ 1099.849607] unmap_vmas+0x16d/0x2f0 [ 1099.850313] ? zap_vma_ptes+0x100/0x100 [ 1099.851097] ? rcu_read_lock_sched_held+0xd/0x70 [ 1099.852025] exit_mmap+0x27f/0x4e0 [ 1099.852716] ? do_munmap+0x40/0x40 [ 1099.853417] mmput+0xca/0x340 [ 1099.854027] do_exit+0xb36/0x2770 [ 1099.854701] ? security_file_free+0xaa/0xd0 [ 1099.855573] ? rcu_read_lock_sched_held+0xd/0x70 [ 1099.856500] ? rcu_read_lock_sched_held+0xd/0x70 [ 1099.857419] ? mm_update_next_owner+0x7d0/0x7d0 [ 1099.858322] ? rcu_read_lock_sched_held+0xd/0x70 [ 1099.859265] ? lock_release+0x4db/0x6b0 [ 1099.860038] ? call_rcu+0x3b8/0x9d0 [ 1099.860745] ? get_signal+0x399/0x2210 [ 1099.861533] ? lock_downgrade+0x6d0/0x6d0 [ 1099.862355] ? do_raw_spin_lock+0x129/0x270 [ 1099.863234] ? rwlock_bug.part.0+0x90/0x90 [ 1099.864076] do_group_exit+0x125/0x310 [ 1099.864862] get_signal+0x469/0x2210 [ 1099.865599] ? new_sync_read+0x46f/0x6e0 [ 1099.866400] ? __ia32_sys_llseek+0x380/0x380 [ 1099.867280] ? __fget_files+0x228/0x410 [ 1099.868075] arch_do_signal+0x88/0x1b00 [ 1099.868876] ? selinux_file_permission+0x112/0x540 [ 1099.869834] ? task_work_add+0xe1/0x2b0 [ 1099.870605] ? restore_sigcontext+0x620/0x620 [ 1099.871495] ? pidfd_get_pid+0x1b0/0x1b0 [ 1099.872288] ? fput_many+0xf6/0x1a0 [ 1099.872993] ? ksys_read+0x1a5/0x250 [ 1099.873715] ? __ia32_sys_pwrite64+0x230/0x230 [ 1099.874606] exit_to_user_mode_prepare+0xf7/0x160 [ 1099.875576] syscall_exit_to_user_mode+0x38/0x230 [ 1099.876512] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1099.877513] RIP: 0033:0x466609 [ 1099.878132] Code: Unable to access opcode bytes at RIP 0x4665df. [ 1099.879345] RSP: 002b:00007fd99bd07188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1099.880851] RAX: fffffffffffffe00 RBX: 000000000056bf80 RCX: 0000000000466609 [ 1099.882249] RDX: 0000000000000092 RSI: 0000000020000100 RDI: 0000000000000003 [ 1099.883655] RBP: 00007fd99bd071d0 R08: 0000000000000000 R09: 0000000000000000 [ 1099.885052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1099.886441] R13: 00007ffd378c5d9f R14: 00007fd99bd07300 R15: 0000000000022000 VM DIAGNOSIS: 04:43:39 Registers: info registers vcpu 0 RAX=000000000000003a RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff8226b221 RDI=ffffffff876c5000 RBP=ffffffff876c4fc0 RSP=ffff88806ce09c90 R8 =0000000000000001 R9 =0000000000000003 R10=0000000000000000 R11=0000000000000001 R12=000000000000003a R13=000000000000003a R14=ffffffff876c4fc0 R15=dffffc0000000000 RIP=ffffffff8226b278 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f8cd00ee700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f8cd00edf78 CR3=0000000046d54000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffff00 XMM02=ff000000000000000000ff0000000000 XMM03=ffffffffffffffffffffffffffffffff XMM04=ffffffffffffffffffffffffffffffff XMM05=ffffffffffffffffffffffffffffffff XMM06=000000000000000000524f5252450040 XMM07=00000000000000000000000000000000 XMM08=0072656c6c616b7a7973006425207325 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000009 RBX=0000000000000001 RCX=ffffffff815dd14c RDX=ffff888046960000 RSI=ffffffff815dde33 RDI=0000000000000000 RBP=ffffea0000ed8dc0 RSP=ffff88804920f770 R8 =0000000000000000 R9 =ffff888046960007 R10=000000000007ffdf R11=0000000000000001 R12=ffff88804920fa70 R13=ffff888046767208 R14=dffffc0000000000 R15=00007f9537242000 RIP=ffffffff815dde5f RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000003e000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe000003c000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000000970004 CR3=00000000407c4000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffffffffffffffffffffffffffff XMM01=ffffffffffffffffffffffffffffffff XMM02=ffffffffffffffffffffffffffffffff XMM03=ffffffffffffffffffffffffffffffff XMM04=ffffffffffffffffffffffffffffffff XMM05=ffffffffffffffffffffffffffffffff XMM06=000000000000000000524f5252450040 XMM07=000000000000000000e800a800000000 XMM08=2570756c6c25706f6f6c2f7665642f00 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000