Warning: Permanently added '[localhost]:57068' (ECDSA) to the list of known hosts. 2023/11/04 17:01:04 fuzzer started 2023/11/04 17:01:05 dialing manager at localhost:36707 syzkaller login: [ 34.504329] cgroup: Unknown subsys name 'net' [ 34.506524] cgroup: Unknown subsys name 'net_prio' [ 34.508365] cgroup: Unknown subsys name 'devices' [ 34.510599] cgroup: Unknown subsys name 'blkio' [ 34.562946] cgroup: Unknown subsys name 'hugetlb' [ 34.566478] cgroup: Unknown subsys name 'rlimit' 2023/11/04 17:01:17 syscalls: 2215 2023/11/04 17:01:17 code coverage: enabled 2023/11/04 17:01:17 comparison tracing: enabled 2023/11/04 17:01:17 extra coverage: enabled 2023/11/04 17:01:17 setuid sandbox: enabled 2023/11/04 17:01:17 namespace sandbox: enabled 2023/11/04 17:01:17 Android sandbox: enabled 2023/11/04 17:01:17 fault injection: enabled 2023/11/04 17:01:17 leak checking: enabled 2023/11/04 17:01:17 net packet injection: enabled 2023/11/04 17:01:17 net device setup: enabled 2023/11/04 17:01:17 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2023/11/04 17:01:17 devlink PCI setup: PCI device 0000:00:10.0 is not available 2023/11/04 17:01:17 USB emulation: enabled 2023/11/04 17:01:17 hci packet injection: enabled 2023/11/04 17:01:17 wifi device emulation: enabled 2023/11/04 17:01:17 802.15.4 emulation: enabled 2023/11/04 17:01:17 fetching corpus: 0, signal 0/2000 (executing program) 2023/11/04 17:01:17 fetching corpus: 42, signal 41008/44540 (executing program) 2023/11/04 17:01:17 fetching corpus: 92, signal 56110/61185 (executing program) 2023/11/04 17:01:17 fetching corpus: 142, signal 63587/70147 (executing program) 2023/11/04 17:01:17 fetching corpus: 191, signal 69470/77516 (executing program) 2023/11/04 17:01:17 fetching corpus: 240, signal 77934/87314 (executing program) 2023/11/04 17:01:18 fetching corpus: 290, signal 83394/94138 (executing program) 2023/11/04 17:01:18 fetching corpus: 340, signal 90877/102809 (executing program) 2023/11/04 17:01:18 fetching corpus: 390, signal 96184/109345 (executing program) 2023/11/04 17:01:18 fetching corpus: 438, signal 101814/116090 (executing program) 2023/11/04 17:01:18 fetching corpus: 488, signal 105657/121108 (executing program) 2023/11/04 17:01:18 fetching corpus: 538, signal 111680/128163 (executing program) 2023/11/04 17:01:18 fetching corpus: 588, signal 115640/133192 (executing program) 2023/11/04 17:01:19 fetching corpus: 638, signal 120930/139417 (executing program) 2023/11/04 17:01:19 fetching corpus: 688, signal 124275/143728 (executing program) 2023/11/04 17:01:19 fetching corpus: 738, signal 128828/149158 (executing program) 2023/11/04 17:01:19 fetching corpus: 788, signal 131379/152745 (executing program) 2023/11/04 17:01:19 fetching corpus: 838, signal 134472/156754 (executing program) 2023/11/04 17:01:19 fetching corpus: 888, signal 137570/160698 (executing program) 2023/11/04 17:01:19 fetching corpus: 938, signal 140631/164633 (executing program) 2023/11/04 17:01:20 fetching corpus: 988, signal 142961/167857 (executing program) 2023/11/04 17:01:20 fetching corpus: 1038, signal 146485/172113 (executing program) 2023/11/04 17:01:20 fetching corpus: 1088, signal 148626/175150 (executing program) 2023/11/04 17:01:20 fetching corpus: 1138, signal 150624/177994 (executing program) 2023/11/04 17:01:20 fetching corpus: 1188, signal 152946/181157 (executing program) 2023/11/04 17:01:20 fetching corpus: 1238, signal 155304/184233 (executing program) 2023/11/04 17:01:20 fetching corpus: 1288, signal 157257/187017 (executing program) 2023/11/04 17:01:20 fetching corpus: 1338, signal 159100/189679 (executing program) 2023/11/04 17:01:21 fetching corpus: 1388, signal 161222/192527 (executing program) 2023/11/04 17:01:21 fetching corpus: 1438, signal 163102/195156 (executing program) 2023/11/04 17:01:21 fetching corpus: 1488, signal 165202/197949 (executing program) 2023/11/04 17:01:21 fetching corpus: 1538, signal 167745/201107 (executing program) 2023/11/04 17:01:21 fetching corpus: 1588, signal 169553/203645 (executing program) 2023/11/04 17:01:21 fetching corpus: 1638, signal 171436/206160 (executing program) 2023/11/04 17:01:21 fetching corpus: 1688, signal 172981/208460 (executing program) 2023/11/04 17:01:21 fetching corpus: 1738, signal 174520/210711 (executing program) 2023/11/04 17:01:22 fetching corpus: 1788, signal 177171/213798 (executing program) 2023/11/04 17:01:22 fetching corpus: 1838, signal 178728/215979 (executing program) 2023/11/04 17:01:22 fetching corpus: 1888, signal 180048/217958 (executing program) 2023/11/04 17:01:22 fetching corpus: 1938, signal 182686/221002 (executing program) 2023/11/04 17:01:22 fetching corpus: 1987, signal 184221/223194 (executing program) 2023/11/04 17:01:22 fetching corpus: 2037, signal 185838/225390 (executing program) 2023/11/04 17:01:22 fetching corpus: 2087, signal 187203/227330 (executing program) 2023/11/04 17:01:23 fetching corpus: 2137, signal 189274/229829 (executing program) 2023/11/04 17:01:23 fetching corpus: 2187, signal 190652/231774 (executing program) 2023/11/04 17:01:23 fetching corpus: 2237, signal 192505/234054 (executing program) 2023/11/04 17:01:23 fetching corpus: 2286, signal 193200/235473 (executing program) 2023/11/04 17:01:23 fetching corpus: 2336, signal 194508/237349 (executing program) 2023/11/04 17:01:23 fetching corpus: 2386, signal 195343/238818 (executing program) 2023/11/04 17:01:23 fetching corpus: 2436, signal 196640/240625 (executing program) 2023/11/04 17:01:24 fetching corpus: 2486, signal 198542/242832 (executing program) 2023/11/04 17:01:24 fetching corpus: 2536, signal 199780/244580 (executing program) 2023/11/04 17:01:24 fetching corpus: 2586, signal 200931/246237 (executing program) 2023/11/04 17:01:24 fetching corpus: 2636, signal 202103/247922 (executing program) 2023/11/04 17:01:24 fetching corpus: 2686, signal 203374/249658 (executing program) 2023/11/04 17:01:24 fetching corpus: 2736, signal 204710/251377 (executing program) 2023/11/04 17:01:24 fetching corpus: 2786, signal 205589/252811 (executing program) 2023/11/04 17:01:25 fetching corpus: 2836, signal 206599/254309 (executing program) 2023/11/04 17:01:25 fetching corpus: 2886, signal 207581/255787 (executing program) 2023/11/04 17:01:25 fetching corpus: 2936, signal 208669/257349 (executing program) 2023/11/04 17:01:25 fetching corpus: 2986, signal 209772/258860 (executing program) 2023/11/04 17:01:25 fetching corpus: 3036, signal 211092/260527 (executing program) 2023/11/04 17:01:25 fetching corpus: 3086, signal 212118/262004 (executing program) 2023/11/04 17:01:25 fetching corpus: 3135, signal 213615/263714 (executing program) 2023/11/04 17:01:26 fetching corpus: 3185, signal 214653/265135 (executing program) 2023/11/04 17:01:26 fetching corpus: 3235, signal 215506/266449 (executing program) 2023/11/04 17:01:26 fetching corpus: 3285, signal 216131/267615 (executing program) 2023/11/04 17:01:26 fetching corpus: 3334, signal 216881/268854 (executing program) 2023/11/04 17:01:26 fetching corpus: 3384, signal 217613/270056 (executing program) 2023/11/04 17:01:26 fetching corpus: 3434, signal 218520/271336 (executing program) 2023/11/04 17:01:26 fetching corpus: 3484, signal 219422/272620 (executing program) 2023/11/04 17:01:26 fetching corpus: 3534, signal 220292/273884 (executing program) 2023/11/04 17:01:26 fetching corpus: 3584, signal 221150/275096 (executing program) 2023/11/04 17:01:27 fetching corpus: 3632, signal 221927/276273 (executing program) 2023/11/04 17:01:27 fetching corpus: 3680, signal 223379/277835 (executing program) 2023/11/04 17:01:27 fetching corpus: 3728, signal 224238/279047 (executing program) 2023/11/04 17:01:27 fetching corpus: 3775, signal 225610/280534 (executing program) 2023/11/04 17:01:27 fetching corpus: 3825, signal 226464/281707 (executing program) 2023/11/04 17:01:27 fetching corpus: 3875, signal 227496/282978 (executing program) 2023/11/04 17:01:27 fetching corpus: 3925, signal 228473/284199 (executing program) 2023/11/04 17:01:28 fetching corpus: 3975, signal 229563/285464 (executing program) 2023/11/04 17:01:28 fetching corpus: 4025, signal 230253/286535 (executing program) 2023/11/04 17:01:28 fetching corpus: 4074, signal 231184/287715 (executing program) 2023/11/04 17:01:28 fetching corpus: 4124, signal 232262/288988 (executing program) 2023/11/04 17:01:28 fetching corpus: 4174, signal 233238/290151 (executing program) 2023/11/04 17:01:28 fetching corpus: 4223, signal 234351/291392 (executing program) 2023/11/04 17:01:28 fetching corpus: 4273, signal 235246/292468 (executing program) 2023/11/04 17:01:29 fetching corpus: 4323, signal 235862/293395 (executing program) 2023/11/04 17:01:29 fetching corpus: 4373, signal 236644/294410 (executing program) 2023/11/04 17:01:29 fetching corpus: 4421, signal 237597/295537 (executing program) 2023/11/04 17:01:29 fetching corpus: 4470, signal 238865/296791 (executing program) 2023/11/04 17:01:29 fetching corpus: 4519, signal 239543/297757 (executing program) 2023/11/04 17:01:29 fetching corpus: 4569, signal 240489/298880 (executing program) 2023/11/04 17:01:29 fetching corpus: 4618, signal 241216/299881 (executing program) 2023/11/04 17:01:29 fetching corpus: 4667, signal 241879/300805 (executing program) 2023/11/04 17:01:30 fetching corpus: 4717, signal 242714/301832 (executing program) 2023/11/04 17:01:30 fetching corpus: 4766, signal 243441/302768 (executing program) 2023/11/04 17:01:30 fetching corpus: 4816, signal 244030/303634 (executing program) 2023/11/04 17:01:30 fetching corpus: 4866, signal 244612/304484 (executing program) 2023/11/04 17:01:30 fetching corpus: 4916, signal 245370/305389 (executing program) 2023/11/04 17:01:30 fetching corpus: 4966, signal 245840/306177 (executing program) 2023/11/04 17:01:30 fetching corpus: 5016, signal 246490/307049 (executing program) 2023/11/04 17:01:31 fetching corpus: 5066, signal 247036/307827 (executing program) 2023/11/04 17:01:31 fetching corpus: 5115, signal 247860/308784 (executing program) 2023/11/04 17:01:31 fetching corpus: 5165, signal 248488/309596 (executing program) 2023/11/04 17:01:31 fetching corpus: 5215, signal 248901/310371 (executing program) 2023/11/04 17:01:31 fetching corpus: 5265, signal 249596/311215 (executing program) 2023/11/04 17:01:31 fetching corpus: 5314, signal 250507/312132 (executing program) 2023/11/04 17:01:31 fetching corpus: 5364, signal 251169/312957 (executing program) 2023/11/04 17:01:31 fetching corpus: 5414, signal 251819/313813 (executing program) 2023/11/04 17:01:32 fetching corpus: 5461, signal 252558/314647 (executing program) 2023/11/04 17:01:32 fetching corpus: 5511, signal 253142/315397 (executing program) 2023/11/04 17:01:32 fetching corpus: 5561, signal 253700/316143 (executing program) 2023/11/04 17:01:32 fetching corpus: 5610, signal 254594/317023 (executing program) 2023/11/04 17:01:32 fetching corpus: 5660, signal 255346/317790 (executing program) 2023/11/04 17:01:32 fetching corpus: 5710, signal 255885/318550 (executing program) 2023/11/04 17:01:33 fetching corpus: 5759, signal 256507/319246 (executing program) 2023/11/04 17:01:33 fetching corpus: 5809, signal 257413/320074 (executing program) 2023/11/04 17:01:33 fetching corpus: 5858, signal 257899/320738 (executing program) 2023/11/04 17:01:33 fetching corpus: 5908, signal 258440/321410 (executing program) 2023/11/04 17:01:33 fetching corpus: 5958, signal 259112/322123 (executing program) 2023/11/04 17:01:33 fetching corpus: 6007, signal 259639/322809 (executing program) 2023/11/04 17:01:33 fetching corpus: 6057, signal 260331/323516 (executing program) 2023/11/04 17:01:34 fetching corpus: 6106, signal 260846/324191 (executing program) 2023/11/04 17:01:34 fetching corpus: 6156, signal 261268/324792 (executing program) 2023/11/04 17:01:34 fetching corpus: 6205, signal 261800/325446 (executing program) 2023/11/04 17:01:34 fetching corpus: 6255, signal 262204/326086 (executing program) 2023/11/04 17:01:34 fetching corpus: 6305, signal 262676/326730 (executing program) 2023/11/04 17:01:34 fetching corpus: 6355, signal 263325/327398 (executing program) 2023/11/04 17:01:34 fetching corpus: 6403, signal 263684/327950 (executing program) 2023/11/04 17:01:34 fetching corpus: 6453, signal 264170/328578 (executing program) 2023/11/04 17:01:35 fetching corpus: 6502, signal 264694/329214 (executing program) 2023/11/04 17:01:35 fetching corpus: 6552, signal 265329/329887 (executing program) 2023/11/04 17:01:35 fetching corpus: 6602, signal 265812/330484 (executing program) 2023/11/04 17:01:35 fetching corpus: 6652, signal 266315/331086 (executing program) 2023/11/04 17:01:35 fetching corpus: 6702, signal 266801/331657 (executing program) 2023/11/04 17:01:35 fetching corpus: 6752, signal 272386/333353 (executing program) 2023/11/04 17:01:35 fetching corpus: 6802, signal 272817/333892 (executing program) 2023/11/04 17:01:36 fetching corpus: 6852, signal 273295/334434 (executing program) 2023/11/04 17:01:36 fetching corpus: 6902, signal 273711/334943 (executing program) 2023/11/04 17:01:36 fetching corpus: 6952, signal 274429/335522 (executing program) 2023/11/04 17:01:36 fetching corpus: 7002, signal 275106/336088 (executing program) 2023/11/04 17:01:36 fetching corpus: 7052, signal 275623/336619 (executing program) 2023/11/04 17:01:36 fetching corpus: 7101, signal 276196/337164 (executing program) 2023/11/04 17:01:36 fetching corpus: 7150, signal 276571/337663 (executing program) 2023/11/04 17:01:36 fetching corpus: 7200, signal 277317/338249 (executing program) 2023/11/04 17:01:37 fetching corpus: 7250, signal 277808/338768 (executing program) 2023/11/04 17:01:37 fetching corpus: 7298, signal 278270/339286 (executing program) 2023/11/04 17:01:37 fetching corpus: 7344, signal 278708/339769 (executing program) 2023/11/04 17:01:37 fetching corpus: 7394, signal 279161/340276 (executing program) 2023/11/04 17:01:37 fetching corpus: 7444, signal 279787/340762 (executing program) 2023/11/04 17:01:37 fetching corpus: 7494, signal 280156/341257 (executing program) 2023/11/04 17:01:37 fetching corpus: 7544, signal 280508/341678 (executing program) 2023/11/04 17:01:37 fetching corpus: 7593, signal 281160/342159 (executing program) 2023/11/04 17:01:38 fetching corpus: 7642, signal 281661/342612 (executing program) 2023/11/04 17:01:38 fetching corpus: 7692, signal 282111/343056 (executing program) 2023/11/04 17:01:38 fetching corpus: 7742, signal 282448/343510 (executing program) 2023/11/04 17:01:38 fetching corpus: 7790, signal 282866/343930 (executing program) 2023/11/04 17:01:38 fetching corpus: 7840, signal 283287/344353 (executing program) 2023/11/04 17:01:38 fetching corpus: 7890, signal 283637/344759 (executing program) 2023/11/04 17:01:38 fetching corpus: 7940, signal 284054/345206 (executing program) 2023/11/04 17:01:38 fetching corpus: 7990, signal 284457/345595 (executing program) 2023/11/04 17:01:39 fetching corpus: 8039, signal 284825/346031 (executing program) 2023/11/04 17:01:39 fetching corpus: 8089, signal 285330/346457 (executing program) 2023/11/04 17:01:39 fetching corpus: 8138, signal 285676/346858 (executing program) 2023/11/04 17:01:39 fetching corpus: 8188, signal 286108/347264 (executing program) 2023/11/04 17:01:39 fetching corpus: 8238, signal 286526/347631 (executing program) 2023/11/04 17:01:39 fetching corpus: 8288, signal 286935/347999 (executing program) 2023/11/04 17:01:39 fetching corpus: 8338, signal 287581/348429 (executing program) 2023/11/04 17:01:39 fetching corpus: 8388, signal 287974/348825 (executing program) 2023/11/04 17:01:40 fetching corpus: 8436, signal 288503/349174 (executing program) 2023/11/04 17:01:40 fetching corpus: 8485, signal 288948/349543 (executing program) 2023/11/04 17:01:40 fetching corpus: 8535, signal 289333/349926 (executing program) 2023/11/04 17:01:40 fetching corpus: 8585, signal 289705/350282 (executing program) 2023/11/04 17:01:40 fetching corpus: 8634, signal 290130/350622 (executing program) 2023/11/04 17:01:40 fetching corpus: 8683, signal 290562/350777 (executing program) 2023/11/04 17:01:40 fetching corpus: 8733, signal 290921/350786 (executing program) 2023/11/04 17:01:41 fetching corpus: 8781, signal 291399/350786 (executing program) 2023/11/04 17:01:41 fetching corpus: 8831, signal 291744/350786 (executing program) 2023/11/04 17:01:41 fetching corpus: 8880, signal 292234/350786 (executing program) 2023/11/04 17:01:41 fetching corpus: 8930, signal 292635/350786 (executing program) 2023/11/04 17:01:41 fetching corpus: 8980, signal 293013/350786 (executing program) 2023/11/04 17:01:41 fetching corpus: 9030, signal 293350/350786 (executing program) 2023/11/04 17:01:41 fetching corpus: 9080, signal 293656/350786 (executing program) 2023/11/04 17:01:42 fetching corpus: 9129, signal 294167/350797 (executing program) 2023/11/04 17:01:42 fetching corpus: 9179, signal 294491/350797 (executing program) 2023/11/04 17:01:42 fetching corpus: 9229, signal 294983/350797 (executing program) 2023/11/04 17:01:42 fetching corpus: 9279, signal 295323/350797 (executing program) 2023/11/04 17:01:42 fetching corpus: 9328, signal 295695/350797 (executing program) 2023/11/04 17:01:42 fetching corpus: 9377, signal 295987/350797 (executing program) 2023/11/04 17:01:42 fetching corpus: 9427, signal 296318/350799 (executing program) 2023/11/04 17:01:43 fetching corpus: 9477, signal 296728/350799 (executing program) 2023/11/04 17:01:43 fetching corpus: 9525, signal 297138/350799 (executing program) 2023/11/04 17:01:43 fetching corpus: 9574, signal 297487/350799 (executing program) 2023/11/04 17:01:43 fetching corpus: 9624, signal 297923/350801 (executing program) 2023/11/04 17:01:43 fetching corpus: 9674, signal 298362/350801 (executing program) 2023/11/04 17:01:43 fetching corpus: 9724, signal 298798/350801 (executing program) 2023/11/04 17:01:43 fetching corpus: 9773, signal 299157/350817 (executing program) 2023/11/04 17:01:43 fetching corpus: 9822, signal 299379/350817 (executing program) 2023/11/04 17:01:44 fetching corpus: 9872, signal 299809/350817 (executing program) 2023/11/04 17:01:44 fetching corpus: 9922, signal 300169/350817 (executing program) 2023/11/04 17:01:44 fetching corpus: 9971, signal 300815/350817 (executing program) 2023/11/04 17:01:44 fetching corpus: 10020, signal 301230/350817 (executing program) 2023/11/04 17:01:44 fetching corpus: 10070, signal 301566/350817 (executing program) 2023/11/04 17:01:44 fetching corpus: 10120, signal 301920/350817 (executing program) 2023/11/04 17:01:44 fetching corpus: 10170, signal 302358/350817 (executing program) 2023/11/04 17:01:45 fetching corpus: 10220, signal 302739/350820 (executing program) 2023/11/04 17:01:45 fetching corpus: 10268, signal 303105/350820 (executing program) 2023/11/04 17:01:45 fetching corpus: 10318, signal 303440/350820 (executing program) 2023/11/04 17:01:45 fetching corpus: 10368, signal 303731/350820 (executing program) 2023/11/04 17:01:45 fetching corpus: 10418, signal 303998/350820 (executing program) 2023/11/04 17:01:45 fetching corpus: 10468, signal 304345/350820 (executing program) 2023/11/04 17:01:45 fetching corpus: 10516, signal 304719/350823 (executing program) 2023/11/04 17:01:46 fetching corpus: 10564, signal 305079/350823 (executing program) 2023/11/04 17:01:46 fetching corpus: 10614, signal 305678/350823 (executing program) 2023/11/04 17:01:46 fetching corpus: 10664, signal 305985/350825 (executing program) 2023/11/04 17:01:46 fetching corpus: 10713, signal 306352/350825 (executing program) 2023/11/04 17:01:46 fetching corpus: 10763, signal 306709/350858 (executing program) 2023/11/04 17:01:46 fetching corpus: 10813, signal 307080/350860 (executing program) 2023/11/04 17:01:47 fetching corpus: 10863, signal 307505/350860 (executing program) 2023/11/04 17:01:47 fetching corpus: 10912, signal 307728/350860 (executing program) 2023/11/04 17:01:47 fetching corpus: 10962, signal 308090/350860 (executing program) 2023/11/04 17:01:47 fetching corpus: 11012, signal 308453/350860 (executing program) 2023/11/04 17:01:47 fetching corpus: 11061, signal 308800/350860 (executing program) 2023/11/04 17:01:47 fetching corpus: 11111, signal 309065/350860 (executing program) 2023/11/04 17:01:47 fetching corpus: 11160, signal 309402/350860 (executing program) 2023/11/04 17:01:47 fetching corpus: 11209, signal 309660/350860 (executing program) 2023/11/04 17:01:48 fetching corpus: 11258, signal 309991/350860 (executing program) 2023/11/04 17:01:48 fetching corpus: 11308, signal 310316/350860 (executing program) 2023/11/04 17:01:48 fetching corpus: 11358, signal 310643/350860 (executing program) 2023/11/04 17:01:48 fetching corpus: 11408, signal 310963/350861 (executing program) 2023/11/04 17:01:48 fetching corpus: 11458, signal 311399/350883 (executing program) 2023/11/04 17:01:48 fetching corpus: 11507, signal 311746/350889 (executing program) 2023/11/04 17:01:49 fetching corpus: 11555, signal 312031/350889 (executing program) 2023/11/04 17:01:49 fetching corpus: 11604, signal 312333/350912 (executing program) 2023/11/04 17:01:49 fetching corpus: 11653, signal 312543/350915 (executing program) 2023/11/04 17:01:49 fetching corpus: 11703, signal 312780/350915 (executing program) 2023/11/04 17:01:49 fetching corpus: 11753, signal 313068/350915 (executing program) 2023/11/04 17:01:49 fetching corpus: 11802, signal 313352/350915 (executing program) 2023/11/04 17:01:49 fetching corpus: 11852, signal 313636/350915 (executing program) 2023/11/04 17:01:49 fetching corpus: 11901, signal 313945/350915 (executing program) 2023/11/04 17:01:50 fetching corpus: 11950, signal 314258/350917 (executing program) 2023/11/04 17:01:50 fetching corpus: 12000, signal 314543/350917 (executing program) 2023/11/04 17:01:50 fetching corpus: 12049, signal 314844/350917 (executing program) 2023/11/04 17:01:50 fetching corpus: 12097, signal 315092/350917 (executing program) 2023/11/04 17:01:50 fetching corpus: 12147, signal 315454/350917 (executing program) 2023/11/04 17:01:50 fetching corpus: 12196, signal 315804/350917 (executing program) 2023/11/04 17:01:50 fetching corpus: 12243, signal 316010/350925 (executing program) 2023/11/04 17:01:50 fetching corpus: 12293, signal 316213/350925 (executing program) 2023/11/04 17:01:51 fetching corpus: 12340, signal 316586/350932 (executing program) 2023/11/04 17:01:51 fetching corpus: 12390, signal 316942/350932 (executing program) 2023/11/04 17:01:51 fetching corpus: 12436, signal 317262/350937 (executing program) 2023/11/04 17:01:51 fetching corpus: 12483, signal 317552/350949 (executing program) 2023/11/04 17:01:51 fetching corpus: 12532, signal 317888/350949 (executing program) 2023/11/04 17:01:51 fetching corpus: 12579, signal 318159/350958 (executing program) 2023/11/04 17:01:51 fetching corpus: 12628, signal 318529/350963 (executing program) 2023/11/04 17:01:52 fetching corpus: 12676, signal 318791/350980 (executing program) 2023/11/04 17:01:52 fetching corpus: 12725, signal 319049/350980 (executing program) 2023/11/04 17:01:52 fetching corpus: 12774, signal 319317/350980 (executing program) 2023/11/04 17:01:52 fetching corpus: 12824, signal 319537/350985 (executing program) 2023/11/04 17:01:52 fetching corpus: 12871, signal 320240/350985 (executing program) 2023/11/04 17:01:52 fetching corpus: 12921, signal 320491/350985 (executing program) 2023/11/04 17:01:52 fetching corpus: 12970, signal 320704/350985 (executing program) 2023/11/04 17:01:52 fetching corpus: 13017, signal 321053/350989 (executing program) 2023/11/04 17:01:53 fetching corpus: 13067, signal 321454/350989 (executing program) 2023/11/04 17:01:53 fetching corpus: 13115, signal 321751/350989 (executing program) 2023/11/04 17:01:53 fetching corpus: 13164, signal 322228/351015 (executing program) 2023/11/04 17:01:53 fetching corpus: 13213, signal 322424/351018 (executing program) 2023/11/04 17:01:53 fetching corpus: 13262, signal 322767/351018 (executing program) 2023/11/04 17:01:53 fetching corpus: 13310, signal 322996/351018 (executing program) 2023/11/04 17:01:53 fetching corpus: 13358, signal 323302/351018 (executing program) 2023/11/04 17:01:53 fetching corpus: 13407, signal 323643/351044 (executing program) 2023/11/04 17:01:54 fetching corpus: 13457, signal 323954/351044 (executing program) 2023/11/04 17:01:54 fetching corpus: 13507, signal 324316/351044 (executing program) 2023/11/04 17:01:54 fetching corpus: 13557, signal 324580/351045 (executing program) 2023/11/04 17:01:54 fetching corpus: 13605, signal 324830/351045 (executing program) 2023/11/04 17:01:54 fetching corpus: 13655, signal 325131/351045 (executing program) 2023/11/04 17:01:54 fetching corpus: 13704, signal 325478/351045 (executing program) 2023/11/04 17:01:54 fetching corpus: 13752, signal 325788/351045 (executing program) 2023/11/04 17:01:54 fetching corpus: 13801, signal 326079/351047 (executing program) 2023/11/04 17:01:55 fetching corpus: 13850, signal 326326/351047 (executing program) 2023/11/04 17:01:55 fetching corpus: 13900, signal 326536/351047 (executing program) 2023/11/04 17:01:55 fetching corpus: 13947, signal 326793/351070 (executing program) 2023/11/04 17:01:55 fetching corpus: 13996, signal 327018/351070 (executing program) 2023/11/04 17:01:55 fetching corpus: 14046, signal 327419/351072 (executing program) 2023/11/04 17:01:55 fetching corpus: 14095, signal 327645/351072 (executing program) 2023/11/04 17:01:55 fetching corpus: 14145, signal 327950/351085 (executing program) 2023/11/04 17:01:55 fetching corpus: 14194, signal 328324/351085 (executing program) 2023/11/04 17:01:56 fetching corpus: 14244, signal 328673/351085 (executing program) 2023/11/04 17:01:56 fetching corpus: 14293, signal 328893/351085 (executing program) 2023/11/04 17:01:56 fetching corpus: 14342, signal 329107/351121 (executing program) 2023/11/04 17:01:56 fetching corpus: 14391, signal 329350/351121 (executing program) 2023/11/04 17:01:56 fetching corpus: 14441, signal 329533/351121 (executing program) 2023/11/04 17:01:56 fetching corpus: 14490, signal 329812/351121 (executing program) 2023/11/04 17:01:56 fetching corpus: 14537, signal 330091/351121 (executing program) 2023/11/04 17:01:56 fetching corpus: 14587, signal 330304/351121 (executing program) 2023/11/04 17:01:57 fetching corpus: 14637, signal 330536/351121 (executing program) 2023/11/04 17:01:57 fetching corpus: 14686, signal 330785/351121 (executing program) 2023/11/04 17:01:57 fetching corpus: 14734, signal 331063/351121 (executing program) 2023/11/04 17:01:57 fetching corpus: 14782, signal 331399/351125 (executing program) 2023/11/04 17:01:57 fetching corpus: 14832, signal 331688/351125 (executing program) 2023/11/04 17:01:57 fetching corpus: 14881, signal 331985/351125 (executing program) 2023/11/04 17:01:57 fetching corpus: 14929, signal 332204/351135 (executing program) 2023/11/04 17:01:58 fetching corpus: 14979, signal 332574/351135 (executing program) 2023/11/04 17:01:58 fetching corpus: 15029, signal 332864/351135 (executing program) 2023/11/04 17:01:58 fetching corpus: 15077, signal 333119/351152 (executing program) 2023/11/04 17:01:58 fetching corpus: 15126, signal 333342/351152 (executing program) 2023/11/04 17:01:58 fetching corpus: 15175, signal 333581/351152 (executing program) 2023/11/04 17:01:58 fetching corpus: 15223, signal 333811/351152 (executing program) 2023/11/04 17:01:58 fetching corpus: 15273, signal 334099/351165 (executing program) 2023/11/04 17:01:58 fetching corpus: 15322, signal 334326/351166 (executing program) 2023/11/04 17:01:58 fetching corpus: 15371, signal 334619/351166 (executing program) 2023/11/04 17:01:58 fetching corpus: 15419, signal 334821/351168 (executing program) 2023/11/04 17:01:59 fetching corpus: 15467, signal 334979/351168 (executing program) 2023/11/04 17:01:59 fetching corpus: 15517, signal 335161/351168 (executing program) 2023/11/04 17:01:59 fetching corpus: 15567, signal 335485/351176 (executing program) 2023/11/04 17:01:59 fetching corpus: 15617, signal 335752/351176 (executing program) 2023/11/04 17:01:59 fetching corpus: 15667, signal 335969/351176 (executing program) 2023/11/04 17:01:59 fetching corpus: 15716, signal 336256/351176 (executing program) 2023/11/04 17:01:59 fetching corpus: 15766, signal 336487/351176 (executing program) 2023/11/04 17:02:00 fetching corpus: 15816, signal 336688/351176 (executing program) 2023/11/04 17:02:00 fetching corpus: 15864, signal 336929/351176 (executing program) 2023/11/04 17:02:00 fetching corpus: 15913, signal 337147/351176 (executing program) 2023/11/04 17:02:00 fetching corpus: 15962, signal 337353/351176 (executing program) 2023/11/04 17:02:00 fetching corpus: 16012, signal 337673/351176 (executing program) 2023/11/04 17:02:00 fetching corpus: 16061, signal 337936/351178 (executing program) 2023/11/04 17:02:00 fetching corpus: 16109, signal 338169/351203 (executing program) 2023/11/04 17:02:00 fetching corpus: 16158, signal 338431/351203 (executing program) 2023/11/04 17:02:01 fetching corpus: 16207, signal 338608/351207 (executing program) 2023/11/04 17:02:01 fetching corpus: 16254, signal 339517/351211 (executing program) 2023/11/04 17:02:01 fetching corpus: 16304, signal 339698/351211 (executing program) 2023/11/04 17:02:01 fetching corpus: 16353, signal 339939/351211 (executing program) 2023/11/04 17:02:01 fetching corpus: 16400, signal 340214/351211 (executing program) 2023/11/04 17:02:01 fetching corpus: 16449, signal 340476/351234 (executing program) 2023/11/04 17:02:02 fetching corpus: 16498, signal 340690/351239 (executing program) 2023/11/04 17:02:02 fetching corpus: 16546, signal 340885/351241 (executing program) 2023/11/04 17:02:02 fetching corpus: 16595, signal 341085/351241 (executing program) 2023/11/04 17:02:02 fetching corpus: 16645, signal 341364/351241 (executing program) 2023/11/04 17:02:02 fetching corpus: 16694, signal 341599/351257 (executing program) 2023/11/04 17:02:02 fetching corpus: 16743, signal 341803/351257 (executing program) 2023/11/04 17:02:02 fetching corpus: 16793, signal 341970/351257 (executing program) 2023/11/04 17:02:02 fetching corpus: 16841, signal 342240/351257 (executing program) 2023/11/04 17:02:03 fetching corpus: 16889, signal 342448/351259 (executing program) 2023/11/04 17:02:03 fetching corpus: 16938, signal 342682/351259 (executing program) 2023/11/04 17:02:03 fetching corpus: 16988, signal 343000/351259 (executing program) 2023/11/04 17:02:03 fetching corpus: 17038, signal 343201/351259 (executing program) 2023/11/04 17:02:03 fetching corpus: 17086, signal 343398/351259 (executing program) 2023/11/04 17:02:03 fetching corpus: 17136, signal 343607/351259 (executing program) 2023/11/04 17:02:03 fetching corpus: 17185, signal 343928/351259 (executing program) 2023/11/04 17:02:03 fetching corpus: 17234, signal 344140/351275 (executing program) 2023/11/04 17:02:04 fetching corpus: 17283, signal 344354/351281 (executing program) 2023/11/04 17:02:04 fetching corpus: 17333, signal 344509/351281 (executing program) 2023/11/04 17:02:04 fetching corpus: 17382, signal 344733/351290 (executing program) 2023/11/04 17:02:04 fetching corpus: 17432, signal 344921/351307 (executing program) 2023/11/04 17:02:04 fetching corpus: 17482, signal 345168/351307 (executing program) 2023/11/04 17:02:04 fetching corpus: 17532, signal 345362/351307 (executing program) 2023/11/04 17:02:04 fetching corpus: 17579, signal 345577/351324 (executing program) 2023/11/04 17:02:05 fetching corpus: 17629, signal 345770/351324 (executing program) 2023/11/04 17:02:05 fetching corpus: 17679, signal 345971/351324 (executing program) 2023/11/04 17:02:05 fetching corpus: 17729, signal 346243/351324 (executing program) 2023/11/04 17:02:05 fetching corpus: 17778, signal 346496/351324 (executing program) 2023/11/04 17:02:05 fetching corpus: 17825, signal 346698/351324 (executing program) 2023/11/04 17:02:05 fetching corpus: 17873, signal 346875/351324 (executing program) 2023/11/04 17:02:05 fetching corpus: 17923, signal 347067/351324 (executing program) 2023/11/04 17:02:05 fetching corpus: 17972, signal 347335/351324 (executing program) 2023/11/04 17:02:06 fetching corpus: 18022, signal 347479/351324 (executing program) 2023/11/04 17:02:06 fetching corpus: 18072, signal 347630/351324 (executing program) 2023/11/04 17:02:06 fetching corpus: 18122, signal 347794/351324 (executing program) 2023/11/04 17:02:06 fetching corpus: 18166, signal 348088/351324 (executing program) 2023/11/04 17:02:06 fetching corpus: 18166, signal 348088/351324 (executing program) 2023/11/04 17:02:07 starting 8 fuzzer processes 17:02:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)={0x44, r1, 0x201, 0x0, 0x0, {{}, {@void, @val={0x8, 0x3, r2}, @val={0xc}}}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'veth0_vlan\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x6}]}, 0x44}, 0x1, 0x0, 0x0, 0x84}, 0x4084) 17:02:07 executing program 1: r0 = syz_io_uring_setup(0x2a7b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd=r0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) add_key$fscrypt_v1(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffe) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 17:02:07 executing program 2: r0 = creat(&(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@ceph_nfs_confh={0x10, 0x2, {0x9}}, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000100)=0x7, 0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000800)=ANY=[@ANYBLOB="445fc230a9570fe3bf10b53d6308355767b1bc57564c294db2eb", @ANYBLOB="24ca0cc99bee10115912262dcee42228d5674bd33896b4f15ddd9024470f0d8fe4e649b9567d88d23c62233b4ca669ed593b047e87c6ea3e551ec5cbe14122516a86cae3b620ecea26d5288c4fc4cdbac5817c24c7a46a71ec8dbbf5e22f21528c80855909237e071b4cb04f8f607646258a9ce5de31aeaf4ecd2a77115c569ab59b01b90dbee45d5595135eefa36250847a8849faf7941c2a550252600eaf979d491ae28b560f40ad779e402e42defe861207fccc74b8", @ANYRESHEX]) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) io_uring_enter(r0, 0x20ce, 0x382a, 0x0, &(0x7f00000000c0)={[0xcc6f]}, 0x8) ioctl$sock_proto_private(r1, 0x89e7, &(0x7f0000000240)="9b7d372962add7f6274185b8c69c5dbb625070514d64f42032054b19d5b08d6518af5fd01e38439ae195a406dc4fd2a7920b2394b3989c30ea6a1735eead2c3856302fcfae323f5f913e691b656b5abdd0d93cf16b563793078f582ae64fdc6fb818dbe9650a3bd0fe23d72f219cd25d7b3b03e4d2579e013932d6fc17834d07e87a4a3ed76a983aa2e60734535e9afcafc8f63a001f678678b6fd8932d9ec998c0bd30f319b0452fe75f5510f6f4a689ef3f2") r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={'ip6_vti0\x00', {0x2, 0x0, @local}}) sendmmsg$inet(r2, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="14000000000000000000000007000000c4048f01000000001c000000000000000000000008000000", @ANYRES32=r4], 0x38}}], 0x1, 0x0) 17:02:07 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6, @in=@remote}}, {{@in6=@private1}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) add_key$fscrypt_v1(&(0x7f0000000600), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a5480900000000000000dac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) getegid() openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x488000, 0x4e) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5805}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000200)=ANY=[], 0x8) sendmmsg$inet6(r0, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="10", 0xffd0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000008c0)="7f", 0x1}], 0x1}}], 0x28, 0x8080) sendmsg$inet6(r0, &(0x7f0000004380)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) request_key(&(0x7f0000000540)='.request_key_auth\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f00000005c0)='\xf7{]&\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) unshare(0x48020200) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000500)={'sit0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x38, 0x5, 0x10, @private1, @loopback, 0x40, 0x7800, 0x2, 0x4}}) unshare(0x2000100) [ 97.193235] audit: type=1400 audit(1699117327.913:6): avc: denied { execmem } for pid=274 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 17:02:07 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x6359, 0x4) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000), 0x4) 17:02:07 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000001c40)={0x0, 0x6}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000001c40)={0x0, 0x6}, 0x4) dup2(r0, r1) 17:02:07 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xdffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x2, @empty}, 0x1c) 17:02:07 executing program 6: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0105303, &(0x7f0000000040)={{}, 'port1\x00'}) [ 100.398901] Bluetooth: hci0: command 0x0409 tx timeout [ 100.462468] Bluetooth: hci4: command 0x0409 tx timeout [ 100.526439] Bluetooth: hci7: command 0x0409 tx timeout [ 100.526488] Bluetooth: hci3: command 0x0409 tx timeout [ 100.527130] Bluetooth: hci1: command 0x0409 tx timeout [ 100.528375] Bluetooth: hci2: command 0x0409 tx timeout [ 100.590463] Bluetooth: hci6: command 0x0409 tx timeout [ 100.654430] Bluetooth: hci5: command 0x0409 tx timeout [ 102.446443] Bluetooth: hci0: command 0x041b tx timeout [ 102.510440] Bluetooth: hci4: command 0x041b tx timeout [ 102.574456] Bluetooth: hci2: command 0x041b tx timeout [ 102.575140] Bluetooth: hci1: command 0x041b tx timeout [ 102.575900] Bluetooth: hci3: command 0x041b tx timeout [ 102.576522] Bluetooth: hci7: command 0x041b tx timeout [ 102.638433] Bluetooth: hci6: command 0x041b tx timeout [ 102.702446] Bluetooth: hci5: command 0x041b tx timeout [ 104.494461] Bluetooth: hci0: command 0x040f tx timeout [ 104.558473] Bluetooth: hci4: command 0x040f tx timeout [ 104.622454] Bluetooth: hci7: command 0x040f tx timeout [ 104.623154] Bluetooth: hci3: command 0x040f tx timeout [ 104.624122] Bluetooth: hci1: command 0x040f tx timeout [ 104.626045] Bluetooth: hci2: command 0x040f tx timeout [ 104.686437] Bluetooth: hci6: command 0x040f tx timeout [ 104.750444] Bluetooth: hci5: command 0x040f tx timeout [ 106.542443] Bluetooth: hci0: command 0x0419 tx timeout [ 106.606436] Bluetooth: hci4: command 0x0419 tx timeout [ 106.670481] Bluetooth: hci2: command 0x0419 tx timeout [ 106.671182] Bluetooth: hci1: command 0x0419 tx timeout [ 106.672837] Bluetooth: hci3: command 0x0419 tx timeout [ 106.673471] Bluetooth: hci7: command 0x0419 tx timeout [ 106.734484] Bluetooth: hci6: command 0x0419 tx timeout [ 106.798441] Bluetooth: hci5: command 0x0419 tx timeout [ 114.927758] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 114.929535] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 114.932764] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 115.015585] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 115.017573] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 115.018623] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 115.111234] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 115.113128] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 115.115848] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 115.134777] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 115.136473] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 115.139264] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 115.477216] audit: type=1400 audit(1699117346.197:7): avc: denied { open } for pid=3819 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 115.479496] audit: type=1400 audit(1699117346.197:8): avc: denied { kernel } for pid=3819 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 115.491357] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 115.492192] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 115.493878] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 115.499438] hrtimer: interrupt took 22463 ns [ 115.676635] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 115.678153] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 115.680588] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 17:02:26 executing program 2: r0 = creat(&(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@ceph_nfs_confh={0x10, 0x2, {0x9}}, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000100)=0x7, 0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000800)=ANY=[@ANYBLOB="445fc230a9570fe3bf10b53d6308355767b1bc57564c294db2eb", @ANYBLOB="24ca0cc99bee10115912262dcee42228d5674bd33896b4f15ddd9024470f0d8fe4e649b9567d88d23c62233b4ca669ed593b047e87c6ea3e551ec5cbe14122516a86cae3b620ecea26d5288c4fc4cdbac5817c24c7a46a71ec8dbbf5e22f21528c80855909237e071b4cb04f8f607646258a9ce5de31aeaf4ecd2a77115c569ab59b01b90dbee45d5595135eefa36250847a8849faf7941c2a550252600eaf979d491ae28b560f40ad779e402e42defe861207fccc74b8", @ANYRESHEX]) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) io_uring_enter(r0, 0x20ce, 0x382a, 0x0, &(0x7f00000000c0)={[0xcc6f]}, 0x8) ioctl$sock_proto_private(r1, 0x89e7, &(0x7f0000000240)="9b7d372962add7f6274185b8c69c5dbb625070514d64f42032054b19d5b08d6518af5fd01e38439ae195a406dc4fd2a7920b2394b3989c30ea6a1735eead2c3856302fcfae323f5f913e691b656b5abdd0d93cf16b563793078f582ae64fdc6fb818dbe9650a3bd0fe23d72f219cd25d7b3b03e4d2579e013932d6fc17834d07e87a4a3ed76a983aa2e60734535e9afcafc8f63a001f678678b6fd8932d9ec998c0bd30f319b0452fe75f5510f6f4a689ef3f2") r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={'ip6_vti0\x00', {0x2, 0x0, @local}}) sendmmsg$inet(r2, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="14000000000000000000000007000000c4048f01000000001c000000000000000000000008000000", @ANYRES32=r4], 0x38}}], 0x1, 0x0) [ 115.762842] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 115.764054] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 115.765978] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 115.782241] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 115.783838] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 115.784650] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 115.872669] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 115.874168] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 115.876203] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 115.878533] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 115.879737] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 115.881089] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 115.964323] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 115.965654] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 115.967556] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 116.027745] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 116.082326] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 116.083199] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 116.084999] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 116.093578] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 116.095020] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 116.098664] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 116.167588] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 116.168509] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 116.169804] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 116.273698] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 116.274844] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 116.276510] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 116.352538] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 116.353450] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 116.373864] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 17:02:27 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6, @in=@remote}}, {{@in6=@private1}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) add_key$fscrypt_v1(&(0x7f0000000600), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a5480900000000000000dac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) getegid() openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x488000, 0x4e) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5805}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000200)=ANY=[], 0x8) sendmmsg$inet6(r0, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="10", 0xffd0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000008c0)="7f", 0x1}], 0x1}}], 0x28, 0x8080) sendmsg$inet6(r0, &(0x7f0000004380)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) request_key(&(0x7f0000000540)='.request_key_auth\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f00000005c0)='\xf7{]&\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) unshare(0x48020200) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000500)={'sit0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x38, 0x5, 0x10, @private1, @loopback, 0x40, 0x7800, 0x2, 0x4}}) unshare(0x2000100) 17:02:27 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6, @in=@remote}}, {{@in6=@private1}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) add_key$fscrypt_v1(&(0x7f0000000600), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a5480900000000000000dac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) getegid() openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x488000, 0x4e) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5805}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000200)=ANY=[], 0x8) sendmmsg$inet6(r0, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="10", 0xffd0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000008c0)="7f", 0x1}], 0x1}}], 0x28, 0x8080) sendmsg$inet6(r0, &(0x7f0000004380)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) request_key(&(0x7f0000000540)='.request_key_auth\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f00000005c0)='\xf7{]&\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) unshare(0x48020200) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000500)={'sit0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x38, 0x5, 0x10, @private1, @loopback, 0x40, 0x7800, 0x2, 0x4}}) unshare(0x2000100) 17:02:27 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xdffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x2, @empty}, 0x1c) 17:02:27 executing program 6: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf9b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}, 0x45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 17:02:27 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6, @in=@remote}}, {{@in6=@private1}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) add_key$fscrypt_v1(&(0x7f0000000600), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a5480900000000000000dac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) getegid() openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x488000, 0x4e) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5805}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000200)=ANY=[], 0x8) sendmmsg$inet6(r0, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="10", 0xffd0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000008c0)="7f", 0x1}], 0x1}}], 0x28, 0x8080) sendmsg$inet6(r0, &(0x7f0000004380)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) request_key(&(0x7f0000000540)='.request_key_auth\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f00000005c0)='\xf7{]&\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) unshare(0x48020200) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000500)={'sit0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x38, 0x5, 0x10, @private1, @loopback, 0x40, 0x7800, 0x2, 0x4}}) unshare(0x2000100) 17:02:27 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6, @in=@remote}}, {{@in6=@private1}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) add_key$fscrypt_v1(&(0x7f0000000600), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a5480900000000000000dac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) getegid() openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x488000, 0x4e) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5805}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000200)=ANY=[], 0x8) sendmmsg$inet6(r0, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="10", 0xffd0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000008c0)="7f", 0x1}], 0x1}}], 0x28, 0x8080) sendmsg$inet6(r0, &(0x7f0000004380)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) request_key(&(0x7f0000000540)='.request_key_auth\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f00000005c0)='\xf7{]&\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) unshare(0x48020200) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000500)={'sit0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x38, 0x5, 0x10, @private1, @loopback, 0x40, 0x7800, 0x2, 0x4}}) unshare(0x2000100) 17:02:27 executing program 2: r0 = creat(&(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@ceph_nfs_confh={0x10, 0x2, {0x9}}, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000100)=0x7, 0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000800)=ANY=[@ANYBLOB="445fc230a9570fe3bf10b53d6308355767b1bc57564c294db2eb", @ANYBLOB="24ca0cc99bee10115912262dcee42228d5674bd33896b4f15ddd9024470f0d8fe4e649b9567d88d23c62233b4ca669ed593b047e87c6ea3e551ec5cbe14122516a86cae3b620ecea26d5288c4fc4cdbac5817c24c7a46a71ec8dbbf5e22f21528c80855909237e071b4cb04f8f607646258a9ce5de31aeaf4ecd2a77115c569ab59b01b90dbee45d5595135eefa36250847a8849faf7941c2a550252600eaf979d491ae28b560f40ad779e402e42defe861207fccc74b8", @ANYRESHEX]) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) io_uring_enter(r0, 0x20ce, 0x382a, 0x0, &(0x7f00000000c0)={[0xcc6f]}, 0x8) ioctl$sock_proto_private(r1, 0x89e7, &(0x7f0000000240)="9b7d372962add7f6274185b8c69c5dbb625070514d64f42032054b19d5b08d6518af5fd01e38439ae195a406dc4fd2a7920b2394b3989c30ea6a1735eead2c3856302fcfae323f5f913e691b656b5abdd0d93cf16b563793078f582ae64fdc6fb818dbe9650a3bd0fe23d72f219cd25d7b3b03e4d2579e013932d6fc17834d07e87a4a3ed76a983aa2e60734535e9afcafc8f63a001f678678b6fd8932d9ec998c0bd30f319b0452fe75f5510f6f4a689ef3f2") r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={'ip6_vti0\x00', {0x2, 0x0, @local}}) sendmmsg$inet(r2, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="14000000000000000000000007000000c4048f01000000001c000000000000000000000008000000", @ANYRES32=r4], 0x38}}], 0x1, 0x0) 17:02:27 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xdffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x2, @empty}, 0x1c) [ 116.580301] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 116.587154] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 17:02:27 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xdffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x2, @empty}, 0x1c) [ 116.752288] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 17:02:28 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xdffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x2, @empty}, 0x1c) 17:02:28 executing program 2: r0 = creat(&(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@ceph_nfs_confh={0x10, 0x2, {0x9}}, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000100)=0x7, 0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000800)=ANY=[@ANYBLOB="445fc230a9570fe3bf10b53d6308355767b1bc57564c294db2eb", @ANYBLOB="24ca0cc99bee10115912262dcee42228d5674bd33896b4f15ddd9024470f0d8fe4e649b9567d88d23c62233b4ca669ed593b047e87c6ea3e551ec5cbe14122516a86cae3b620ecea26d5288c4fc4cdbac5817c24c7a46a71ec8dbbf5e22f21528c80855909237e071b4cb04f8f607646258a9ce5de31aeaf4ecd2a77115c569ab59b01b90dbee45d5595135eefa36250847a8849faf7941c2a550252600eaf979d491ae28b560f40ad779e402e42defe861207fccc74b8", @ANYRESHEX]) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) io_uring_enter(r0, 0x20ce, 0x382a, 0x0, &(0x7f00000000c0)={[0xcc6f]}, 0x8) ioctl$sock_proto_private(r1, 0x89e7, &(0x7f0000000240)="9b7d372962add7f6274185b8c69c5dbb625070514d64f42032054b19d5b08d6518af5fd01e38439ae195a406dc4fd2a7920b2394b3989c30ea6a1735eead2c3856302fcfae323f5f913e691b656b5abdd0d93cf16b563793078f582ae64fdc6fb818dbe9650a3bd0fe23d72f219cd25d7b3b03e4d2579e013932d6fc17834d07e87a4a3ed76a983aa2e60734535e9afcafc8f63a001f678678b6fd8932d9ec998c0bd30f319b0452fe75f5510f6f4a689ef3f2") r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={'ip6_vti0\x00', {0x2, 0x0, @local}}) sendmmsg$inet(r2, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="14000000000000000000000007000000c4048f01000000001c000000000000000000000008000000", @ANYRES32=r4], 0x38}}], 0x1, 0x0) 17:02:28 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xdffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x2, @empty}, 0x1c) 17:02:28 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6, @in=@remote}}, {{@in6=@private1}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) add_key$fscrypt_v1(&(0x7f0000000600), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a5480900000000000000dac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) getegid() openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x488000, 0x4e) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5805}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000200)=ANY=[], 0x8) sendmmsg$inet6(r0, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="10", 0xffd0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000008c0)="7f", 0x1}], 0x1}}], 0x28, 0x8080) sendmsg$inet6(r0, &(0x7f0000004380)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) request_key(&(0x7f0000000540)='.request_key_auth\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f00000005c0)='\xf7{]&\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) unshare(0x48020200) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000500)={'sit0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x38, 0x5, 0x10, @private1, @loopback, 0x40, 0x7800, 0x2, 0x4}}) unshare(0x2000100) 17:02:28 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6, @in=@remote}}, {{@in6=@private1}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) add_key$fscrypt_v1(&(0x7f0000000600), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a5480900000000000000dac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) getegid() openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x488000, 0x4e) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5805}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000200)=ANY=[], 0x8) sendmmsg$inet6(r0, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="10", 0xffd0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000008c0)="7f", 0x1}], 0x1}}], 0x28, 0x8080) sendmsg$inet6(r0, &(0x7f0000004380)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) request_key(&(0x7f0000000540)='.request_key_auth\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f00000005c0)='\xf7{]&\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) unshare(0x48020200) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000500)={'sit0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x38, 0x5, 0x10, @private1, @loopback, 0x40, 0x7800, 0x2, 0x4}}) unshare(0x2000100) 17:02:28 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6, @in=@remote}}, {{@in6=@private1}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) add_key$fscrypt_v1(&(0x7f0000000600), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a5480900000000000000dac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) getegid() openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x488000, 0x4e) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5805}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000200)=ANY=[], 0x8) sendmmsg$inet6(r0, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="10", 0xffd0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000008c0)="7f", 0x1}], 0x1}}], 0x28, 0x8080) sendmsg$inet6(r0, &(0x7f0000004380)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) request_key(&(0x7f0000000540)='.request_key_auth\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f00000005c0)='\xf7{]&\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) unshare(0x48020200) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000500)={'sit0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x38, 0x5, 0x10, @private1, @loopback, 0x40, 0x7800, 0x2, 0x4}}) unshare(0x2000100) 17:02:28 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6, @in=@remote}}, {{@in6=@private1}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) add_key$fscrypt_v1(&(0x7f0000000600), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a5480900000000000000dac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) getegid() openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x488000, 0x4e) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5805}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000200)=ANY=[], 0x8) sendmmsg$inet6(r0, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="10", 0xffd0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000008c0)="7f", 0x1}], 0x1}}], 0x28, 0x8080) sendmsg$inet6(r0, &(0x7f0000004380)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) request_key(&(0x7f0000000540)='.request_key_auth\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f00000005c0)='\xf7{]&\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) unshare(0x48020200) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000500)={'sit0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x38, 0x5, 0x10, @private1, @loopback, 0x40, 0x7800, 0x2, 0x4}}) unshare(0x2000100) 17:02:28 executing program 6: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf9b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}, 0x45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 17:02:28 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xdffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x2, @empty}, 0x1c) 17:02:28 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='environ\x00') pread64(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:02:28 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)={0x0, 0xfb, 0x2e, 0x4, 0x5, "a9e7e10a341377fa4d84bb199f91bf8f", "5c0a1dd67b6faaf86c56c473b4e45e5eae3b2c62571934bf10"}, 0x2e, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) perf_event_open$cgroup(&(0x7f0000000080)={0x3, 0x80, 0x81, 0x4, 0x0, 0x9, 0x0, 0x7fff, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x0, 0x2}, 0x8020, 0x6, 0x0, 0x1, 0x4, 0x6, 0x2fa, 0x0, 0x4, 0x0, 0xebd3}, r0, 0x4, 0xffffffffffffffff, 0xb0d61127401d9e82) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x0, 0x0) eventfd(0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r1, 0x0, r2, &(0x7f0000000040)=0x7fff, 0xa1, 0x0) 17:02:28 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)={0x0, 0xfb, 0x2e, 0x4, 0x5, "a9e7e10a341377fa4d84bb199f91bf8f", "5c0a1dd67b6faaf86c56c473b4e45e5eae3b2c62571934bf10"}, 0x2e, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) perf_event_open$cgroup(&(0x7f0000000080)={0x3, 0x80, 0x81, 0x4, 0x0, 0x9, 0x0, 0x7fff, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x0, 0x2}, 0x8020, 0x6, 0x0, 0x1, 0x4, 0x6, 0x2fa, 0x0, 0x4, 0x0, 0xebd3}, r0, 0x4, 0xffffffffffffffff, 0xb0d61127401d9e82) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x0, 0x0) eventfd(0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r1, 0x0, r2, &(0x7f0000000040)=0x7fff, 0xa1, 0x0) 17:02:28 executing program 2: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="20002cbd7000ffdddf25120000000c0099001f060000530000000a000600080211000000009c0500740002000000"], 0x34}, 0x1, 0x0, 0x0, 0x24040091}, 0x40000) sendmsg$NL80211_CMD_TESTMODE(0xffffffffffffffff, 0x0, 0x8001) setsockopt(0xffffffffffffffff, 0x80000001, 0x0, &(0x7f0000000000)="d6547e36fc54c90660b7476ebee6fc625172f9fb41501b197b5f3f70983636a6339e1e85d66136c9ab9c4c4ac9f47e62e803b9ef933f94e7743dd3f042e684ce17f03e969718e964ee18366ffdfce76af1d45d6363a4174148eed0ed680f244413688cf5740d20bfec520e6a149e3680f24f23ef267afc48c0982fa7", 0x7c) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000080)={[0x9]}, 0x8) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000280)) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, 0x14, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}]}, 0x1c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000002c0)=ANY=[@ANYRESHEX=r3, @ANYRESDEC=r2, @ANYRES32]) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 118.231947] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 17:02:28 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6, @in=@remote}}, {{@in6=@private1}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) add_key$fscrypt_v1(&(0x7f0000000600), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a5480900000000000000dac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) getegid() openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x488000, 0x4e) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5805}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000200)=ANY=[], 0x8) sendmmsg$inet6(r0, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="10", 0xffd0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000008c0)="7f", 0x1}], 0x1}}], 0x28, 0x8080) sendmsg$inet6(r0, &(0x7f0000004380)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) request_key(&(0x7f0000000540)='.request_key_auth\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f00000005c0)='\xf7{]&\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) unshare(0x48020200) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000500)={'sit0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x38, 0x5, 0x10, @private1, @loopback, 0x40, 0x7800, 0x2, 0x4}}) unshare(0x2000100) 17:02:28 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6, @in=@remote}}, {{@in6=@private1}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) add_key$fscrypt_v1(&(0x7f0000000600), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a5480900000000000000dac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) getegid() openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x488000, 0x4e) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5805}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000200)=ANY=[], 0x8) sendmmsg$inet6(r0, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="10", 0xffd0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000008c0)="7f", 0x1}], 0x1}}], 0x28, 0x8080) sendmsg$inet6(r0, &(0x7f0000004380)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) request_key(&(0x7f0000000540)='.request_key_auth\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f00000005c0)='\xf7{]&\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) unshare(0x48020200) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000500)={'sit0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x38, 0x5, 0x10, @private1, @loopback, 0x40, 0x7800, 0x2, 0x4}}) unshare(0x2000100) 17:02:28 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)={0x0, 0xfb, 0x2e, 0x4, 0x5, "a9e7e10a341377fa4d84bb199f91bf8f", "5c0a1dd67b6faaf86c56c473b4e45e5eae3b2c62571934bf10"}, 0x2e, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) perf_event_open$cgroup(&(0x7f0000000080)={0x3, 0x80, 0x81, 0x4, 0x0, 0x9, 0x0, 0x7fff, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x0, 0x2}, 0x8020, 0x6, 0x0, 0x1, 0x4, 0x6, 0x2fa, 0x0, 0x4, 0x0, 0xebd3}, r0, 0x4, 0xffffffffffffffff, 0xb0d61127401d9e82) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x0, 0x0) eventfd(0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r1, 0x0, r2, &(0x7f0000000040)=0x7fff, 0xa1, 0x0) 17:02:28 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6, @in=@remote}}, {{@in6=@private1}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) add_key$fscrypt_v1(&(0x7f0000000600), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a5480900000000000000dac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) getegid() openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x488000, 0x4e) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5805}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000200)=ANY=[], 0x8) sendmmsg$inet6(r0, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="10", 0xffd0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000008c0)="7f", 0x1}], 0x1}}], 0x28, 0x8080) sendmsg$inet6(r0, &(0x7f0000004380)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) request_key(&(0x7f0000000540)='.request_key_auth\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f00000005c0)='\xf7{]&\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) unshare(0x48020200) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000500)={'sit0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x38, 0x5, 0x10, @private1, @loopback, 0x40, 0x7800, 0x2, 0x4}}) unshare(0x2000100) 17:02:29 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6, @in=@remote}}, {{@in6=@private1}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) add_key$fscrypt_v1(&(0x7f0000000600), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a5480900000000000000dac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) getegid() openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x488000, 0x4e) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5805}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000200)=ANY=[], 0x8) sendmmsg$inet6(r0, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="10", 0xffd0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000008c0)="7f", 0x1}], 0x1}}], 0x28, 0x8080) sendmsg$inet6(r0, &(0x7f0000004380)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) request_key(&(0x7f0000000540)='.request_key_auth\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f00000005c0)='\xf7{]&\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) unshare(0x48020200) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000500)={'sit0\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x38, 0x5, 0x10, @private1, @loopback, 0x40, 0x7800, 0x2, 0x4}}) unshare(0x2000100) 17:02:29 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)={0x0, 0xfb, 0x2e, 0x4, 0x5, "a9e7e10a341377fa4d84bb199f91bf8f", "5c0a1dd67b6faaf86c56c473b4e45e5eae3b2c62571934bf10"}, 0x2e, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) perf_event_open$cgroup(&(0x7f0000000080)={0x3, 0x80, 0x81, 0x4, 0x0, 0x9, 0x0, 0x7fff, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x0, 0x2}, 0x8020, 0x6, 0x0, 0x1, 0x4, 0x6, 0x2fa, 0x0, 0x4, 0x0, 0xebd3}, r0, 0x4, 0xffffffffffffffff, 0xb0d61127401d9e82) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x0, 0x0) eventfd(0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r1, 0x0, r2, &(0x7f0000000040)=0x7fff, 0xa1, 0x0) 17:02:29 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) 17:02:29 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, &(0x7f0000000000)='0', 0x10, 0xfffffffffffffffb) 17:02:29 executing program 6: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf9b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}, 0x45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 17:02:29 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000c80)='/proc/cgroups\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x1) 17:02:29 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000000c0)=0xff) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)=0x12) 17:02:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) 17:02:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x24, 0x19, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x1e, 0x0, 0x0, @u32=0x10001}]}, 0x24}}, 0x0) 17:02:29 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000000c0)=0xff) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)=0x12) 17:02:29 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) close_range(r0, 0xffffffffffffffff, 0x0) [ 119.099823] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 17:02:30 executing program 6: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf9b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}, 0x45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 17:02:30 executing program 4: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {}]}) 17:02:30 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000000c0)=0xff) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)=0x12) 17:02:30 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x8, &(0x7f0000000040), 0x4) 17:02:30 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000040)={@link_local, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @redirect={0xb, 0x0, 0x0, @broadcast, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast, {[@timestamp_prespec={0x44, 0x24, 0x0, 0x3, 0x0, [{@multicast1}, {@remote}, {@empty}, {@broadcast}]}, @rr={0x7, 0x1b, 0x0, [@broadcast, @empty, @rand_addr, @remote, @rand_addr, @broadcast]}]}}}}}}}, 0x0) 17:02:30 executing program 2: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="20002cbd7000ffdddf25120000000c0099001f060000530000000a000600080211000000009c0500740002000000"], 0x34}, 0x1, 0x0, 0x0, 0x24040091}, 0x40000) sendmsg$NL80211_CMD_TESTMODE(0xffffffffffffffff, 0x0, 0x8001) setsockopt(0xffffffffffffffff, 0x80000001, 0x0, &(0x7f0000000000)="d6547e36fc54c90660b7476ebee6fc625172f9fb41501b197b5f3f70983636a6339e1e85d66136c9ab9c4c4ac9f47e62e803b9ef933f94e7743dd3f042e684ce17f03e969718e964ee18366ffdfce76af1d45d6363a4174148eed0ed680f244413688cf5740d20bfec520e6a149e3680f24f23ef267afc48c0982fa7", 0x7c) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000080)={[0x9]}, 0x8) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000280)) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, 0x14, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}]}, 0x1c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000002c0)=ANY=[@ANYRESHEX=r3, @ANYRESDEC=r2, @ANYRES32]) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 17:02:30 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) close_range(r0, 0xffffffffffffffff, 0x0) [ 120.096909] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 17:02:30 executing program 3: mount$9p_unix(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x20004, &(0x7f0000000380)={'trans=unix,', {[{@cache_loose}, {@privport}, {@access_client}, {@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}], [{@obj_type={'obj_type', 0x3d, '&&'}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@seclabel}]}}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000140)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x0, "4fa2f8201eed6e500c32342a227989f18a88ab65bad4c23a441d66f462f1df77bc777d160562da8c50431b2a204f36c6ed27b00215909d75417aa68c9029c5fd", "176764fe8c2ff71a1633d53dafbecd823af97cf5831be9a6fed5449e9f77dd92"}) r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@remote, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f0000000900)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in6=@ipv4={""/10, ""/2, @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@dev}}, &(0x7f0000000a40)=0xe8) fchown(r0, r2, r1) unlinkat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x200) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f00000000c0), &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)={0x250, 0x14, 0x501, 0x70bd27, 0x25dfdbfd, {0x2b, 0x5}, [@INET_DIAG_REQ_BYTECODE={0x35, 0x1, "03e732a577a4af5e6f7744633ccafdbc67a014117e823ecb8812f8775ce750f8bcaee5eb2e5f7b32ac021962431454bffd"}, @INET_DIAG_REQ_BYTECODE={0x51, 0x1, "469cd4bd1c61f708b02af7e86f31f79ec1635bd48744b7d6796c9c9a39ee141f2461c0e2d7ef36600f25c65a8e8ef708fdbdc23b8d20eccb40e644d7c1a748b2832e1c4f9689b6cce9a3d742e1"}, @INET_DIAG_REQ_BYTECODE={0xef, 0x1, "ce3eca012fcf780eacc3ecb19acdb4f67073839e766400e156a508068207404359d85c744eb964c52f6067dfb9090bf36a87877bc36c80bbacd440b80706f098857e5be7e9001ae81390a5fcf49064d13ae8ccf968f93667a62228a80030d6ea1a3b6755c99e2fabf2c91aab939343ce79c6369ef97e9e13d8a65e8eaf8735b345eb3ecb4c74c97ee3f2eb9ea5a90f0858114f48ee9d0232fe1be7d4f84d2f2ecfa7c3a5a8eecdc66599dc07cc436131f4b17b53aea2f3bd4798bb8bab41ec74f06312b416113c1e94fd3b34fdfdf25baacd0c8d077c1b8f564069a7b0dc3588631355eb3622e95175d169"}, @INET_DIAG_REQ_BYTECODE={0x23, 0x1, "2e2c0a0e5bb491e505f4991db3f21cbd78863b4252a5d9fb0832402e539062"}, @INET_DIAG_REQ_BYTECODE={0x36, 0x1, "b6eb460bbe7da9243a79b9e06ce36e8c307bfd50ca7834550583b7476f0f53633539a5fa8744b70f658947a582333ab124ae"}, @INET_DIAG_REQ_BYTECODE={0x61, 0x1, "f87a2bbf105899dd33c8c7e386fb863a2c99a9cd2afaff6ff880080ae6714e9c987273cf068aa55d4ff2eb9129235f83a5140c1595c23ec71537d70926fab28d5797a1031666a91425c4324ed33543d4c47d6154b0499347c3e3a28212"}]}, 0x250}, 0x1, 0x0, 0x0, 0x8000}, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) [ 120.264819] mmap: syz-executor.4 (4086) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 17:02:30 executing program 4: remap_file_pages(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) 17:02:30 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) close_range(r0, 0xffffffffffffffff, 0x0) 17:02:30 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000040)={@link_local, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @redirect={0xb, 0x0, 0x0, @broadcast, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast, {[@timestamp_prespec={0x44, 0x24, 0x0, 0x3, 0x0, [{@multicast1}, {@remote}, {@empty}, {@broadcast}]}, @rr={0x7, 0x1b, 0x0, [@broadcast, @empty, @rand_addr, @remote, @rand_addr, @broadcast]}]}}}}}}}, 0x0) 17:02:33 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000000c0)=0xff) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)=0x12) 17:02:33 executing program 7: clock_settime(0x4, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 17:02:33 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) close_range(r0, 0xffffffffffffffff, 0x0) 17:02:33 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000040)={@link_local, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @redirect={0xb, 0x0, 0x0, @broadcast, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast, {[@timestamp_prespec={0x44, 0x24, 0x0, 0x3, 0x0, [{@multicast1}, {@remote}, {@empty}, {@broadcast}]}, @rr={0x7, 0x1b, 0x0, [@broadcast, @empty, @rand_addr, @remote, @rand_addr, @broadcast]}]}}}}}}}, 0x0) 17:02:33 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2154d4, 0x0) chroot(&(0x7f0000000040)='./file0/file0\x00') mount$9p_unix(0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='./file0\x00') 17:02:33 executing program 3: mount$9p_unix(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x20004, &(0x7f0000000380)={'trans=unix,', {[{@cache_loose}, {@privport}, {@access_client}, {@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}], [{@obj_type={'obj_type', 0x3d, '&&'}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@seclabel}]}}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000140)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x0, "4fa2f8201eed6e500c32342a227989f18a88ab65bad4c23a441d66f462f1df77bc777d160562da8c50431b2a204f36c6ed27b00215909d75417aa68c9029c5fd", "176764fe8c2ff71a1633d53dafbecd823af97cf5831be9a6fed5449e9f77dd92"}) r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@remote, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f0000000900)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in6=@ipv4={""/10, ""/2, @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@dev}}, &(0x7f0000000a40)=0xe8) fchown(r0, r2, r1) unlinkat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x200) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f00000000c0), &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)={0x250, 0x14, 0x501, 0x70bd27, 0x25dfdbfd, {0x2b, 0x5}, [@INET_DIAG_REQ_BYTECODE={0x35, 0x1, "03e732a577a4af5e6f7744633ccafdbc67a014117e823ecb8812f8775ce750f8bcaee5eb2e5f7b32ac021962431454bffd"}, @INET_DIAG_REQ_BYTECODE={0x51, 0x1, "469cd4bd1c61f708b02af7e86f31f79ec1635bd48744b7d6796c9c9a39ee141f2461c0e2d7ef36600f25c65a8e8ef708fdbdc23b8d20eccb40e644d7c1a748b2832e1c4f9689b6cce9a3d742e1"}, @INET_DIAG_REQ_BYTECODE={0xef, 0x1, "ce3eca012fcf780eacc3ecb19acdb4f67073839e766400e156a508068207404359d85c744eb964c52f6067dfb9090bf36a87877bc36c80bbacd440b80706f098857e5be7e9001ae81390a5fcf49064d13ae8ccf968f93667a62228a80030d6ea1a3b6755c99e2fabf2c91aab939343ce79c6369ef97e9e13d8a65e8eaf8735b345eb3ecb4c74c97ee3f2eb9ea5a90f0858114f48ee9d0232fe1be7d4f84d2f2ecfa7c3a5a8eecdc66599dc07cc436131f4b17b53aea2f3bd4798bb8bab41ec74f06312b416113c1e94fd3b34fdfdf25baacd0c8d077c1b8f564069a7b0dc3588631355eb3622e95175d169"}, @INET_DIAG_REQ_BYTECODE={0x23, 0x1, "2e2c0a0e5bb491e505f4991db3f21cbd78863b4252a5d9fb0832402e539062"}, @INET_DIAG_REQ_BYTECODE={0x36, 0x1, "b6eb460bbe7da9243a79b9e06ce36e8c307bfd50ca7834550583b7476f0f53633539a5fa8744b70f658947a582333ab124ae"}, @INET_DIAG_REQ_BYTECODE={0x61, 0x1, "f87a2bbf105899dd33c8c7e386fb863a2c99a9cd2afaff6ff880080ae6714e9c987273cf068aa55d4ff2eb9129235f83a5140c1595c23ec71537d70926fab28d5797a1031666a91425c4324ed33543d4c47d6154b0499347c3e3a28212"}]}, 0x250}, 0x1, 0x0, 0x0, 0x8000}, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) 17:02:33 executing program 2: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="20002cbd7000ffdddf25120000000c0099001f060000530000000a000600080211000000009c0500740002000000"], 0x34}, 0x1, 0x0, 0x0, 0x24040091}, 0x40000) sendmsg$NL80211_CMD_TESTMODE(0xffffffffffffffff, 0x0, 0x8001) setsockopt(0xffffffffffffffff, 0x80000001, 0x0, &(0x7f0000000000)="d6547e36fc54c90660b7476ebee6fc625172f9fb41501b197b5f3f70983636a6339e1e85d66136c9ab9c4c4ac9f47e62e803b9ef933f94e7743dd3f042e684ce17f03e969718e964ee18366ffdfce76af1d45d6363a4174148eed0ed680f244413688cf5740d20bfec520e6a149e3680f24f23ef267afc48c0982fa7", 0x7c) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000080)={[0x9]}, 0x8) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000280)) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, 0x14, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}]}, 0x1c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000002c0)=ANY=[@ANYRESHEX=r3, @ANYRESDEC=r2, @ANYRES32]) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 123.017330] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 123.119093] ====================================================== [ 123.119093] WARNING: the mand mount option is being deprecated and [ 123.119093] will be removed in v5.15! [ 123.119093] ====================================================== 17:02:33 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000040)={@link_local, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @redirect={0xb, 0x0, 0x0, @broadcast, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast, {[@timestamp_prespec={0x44, 0x24, 0x0, 0x3, 0x0, [{@multicast1}, {@remote}, {@empty}, {@broadcast}]}, @rr={0x7, 0x1b, 0x0, [@broadcast, @empty, @rand_addr, @remote, @rand_addr, @broadcast]}]}}}}}}}, 0x0) [ 123.245014] ieee802154 phy0 wpan0: encryption failed: -22 [ 123.911644] EXT4-fs: failed to create workqueue [ 123.912426] EXT4-fs (loop3): mount failed [ 123.955311] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 17:02:34 executing program 7: clock_settime(0x4, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 17:02:34 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) socket$unix(0x1, 0x5, 0x0) socket$unix(0x1, 0x5, 0x0) sendmsg$unix(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 17:02:34 executing program 2: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="20002cbd7000ffdddf25120000000c0099001f060000530000000a000600080211000000009c0500740002000000"], 0x34}, 0x1, 0x0, 0x0, 0x24040091}, 0x40000) sendmsg$NL80211_CMD_TESTMODE(0xffffffffffffffff, 0x0, 0x8001) setsockopt(0xffffffffffffffff, 0x80000001, 0x0, &(0x7f0000000000)="d6547e36fc54c90660b7476ebee6fc625172f9fb41501b197b5f3f70983636a6339e1e85d66136c9ab9c4c4ac9f47e62e803b9ef933f94e7743dd3f042e684ce17f03e969718e964ee18366ffdfce76af1d45d6363a4174148eed0ed680f244413688cf5740d20bfec520e6a149e3680f24f23ef267afc48c0982fa7", 0x7c) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000080)={[0x9]}, 0x8) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000280)) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, 0x14, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}]}, 0x1c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000002c0)=ANY=[@ANYRESHEX=r3, @ANYRESDEC=r2, @ANYRES32]) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 17:02:34 executing program 6: r0 = mq_open(&(0x7f0000000000)='.p\x00{\xa6\xc1\xbb\x91\xf0%\xfd\x8c\xbc\xc26I\xd0\x15m\t(T\xeb\xdc\xd7\x8e\x18\xbf\b\x82\x94\xff\xd8\x14A\xbf\x95k\xbd\x11G\xaf\xad\xef\xf5\xb9\x8a', 0x0, 0x0, 0x0) lseek(r0, 0x0, 0x3) 17:02:34 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000340)='./file1\x00', 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x1) chmod(&(0x7f0000000d00)='./file1\x00', 0x0) 17:02:34 executing program 5: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) r1 = syz_open_dev$sg(&(0x7f0000000140), 0x0, 0x182) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000180)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000100)) dup2(0xffffffffffffffff, r1) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 17:02:34 executing program 3: mount$9p_unix(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x20004, &(0x7f0000000380)={'trans=unix,', {[{@cache_loose}, {@privport}, {@access_client}, {@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}], [{@obj_type={'obj_type', 0x3d, '&&'}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@seclabel}]}}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000140)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x0, "4fa2f8201eed6e500c32342a227989f18a88ab65bad4c23a441d66f462f1df77bc777d160562da8c50431b2a204f36c6ed27b00215909d75417aa68c9029c5fd", "176764fe8c2ff71a1633d53dafbecd823af97cf5831be9a6fed5449e9f77dd92"}) r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@remote, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f0000000900)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in6=@ipv4={""/10, ""/2, @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@dev}}, &(0x7f0000000a40)=0xe8) fchown(r0, r2, r1) unlinkat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x200) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f00000000c0), &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)={0x250, 0x14, 0x501, 0x70bd27, 0x25dfdbfd, {0x2b, 0x5}, [@INET_DIAG_REQ_BYTECODE={0x35, 0x1, "03e732a577a4af5e6f7744633ccafdbc67a014117e823ecb8812f8775ce750f8bcaee5eb2e5f7b32ac021962431454bffd"}, @INET_DIAG_REQ_BYTECODE={0x51, 0x1, "469cd4bd1c61f708b02af7e86f31f79ec1635bd48744b7d6796c9c9a39ee141f2461c0e2d7ef36600f25c65a8e8ef708fdbdc23b8d20eccb40e644d7c1a748b2832e1c4f9689b6cce9a3d742e1"}, @INET_DIAG_REQ_BYTECODE={0xef, 0x1, "ce3eca012fcf780eacc3ecb19acdb4f67073839e766400e156a508068207404359d85c744eb964c52f6067dfb9090bf36a87877bc36c80bbacd440b80706f098857e5be7e9001ae81390a5fcf49064d13ae8ccf968f93667a62228a80030d6ea1a3b6755c99e2fabf2c91aab939343ce79c6369ef97e9e13d8a65e8eaf8735b345eb3ecb4c74c97ee3f2eb9ea5a90f0858114f48ee9d0232fe1be7d4f84d2f2ecfa7c3a5a8eecdc66599dc07cc436131f4b17b53aea2f3bd4798bb8bab41ec74f06312b416113c1e94fd3b34fdfdf25baacd0c8d077c1b8f564069a7b0dc3588631355eb3622e95175d169"}, @INET_DIAG_REQ_BYTECODE={0x23, 0x1, "2e2c0a0e5bb491e505f4991db3f21cbd78863b4252a5d9fb0832402e539062"}, @INET_DIAG_REQ_BYTECODE={0x36, 0x1, "b6eb460bbe7da9243a79b9e06ce36e8c307bfd50ca7834550583b7476f0f53633539a5fa8744b70f658947a582333ab124ae"}, @INET_DIAG_REQ_BYTECODE={0x61, 0x1, "f87a2bbf105899dd33c8c7e386fb863a2c99a9cd2afaff6ff880080ae6714e9c987273cf068aa55d4ff2eb9129235f83a5140c1595c23ec71537d70926fab28d5797a1031666a91425c4324ed33543d4c47d6154b0499347c3e3a28212"}]}, 0x250}, 0x1, 0x0, 0x0, 0x8000}, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) 17:02:34 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) ppoll(&(0x7f00000000c0)=[{r0, 0x14c0}], 0x1, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={[0x10000]}, 0x8) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/meminfo\x00', 0x0, 0x0) pread64(r1, &(0x7f00000010c0)=""/4088, 0xff8, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1e3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000580)=ANY=[]) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_io_uring_setup(0x20, &(0x7f0000000580)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r3 = syz_io_uring_setup(0x20, &(0x7f0000000580)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) io_uring_enter(r3, 0x76d3, 0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000040)) [ 124.018435] ieee802154 phy0 wpan0: encryption failed: -22 17:02:34 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000340)='./file1\x00', 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x1) chmod(&(0x7f0000000d00)='./file1\x00', 0x0) 17:02:34 executing program 6: setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) futex(&(0x7f0000000180), 0x6, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000200), 0x0) futex(&(0x7f0000000000)=0x1, 0x6, 0x0, &(0x7f0000000040)={0x0, 0x3938700}, &(0x7f0000000080)=0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') readv(r0, &(0x7f0000002a80)=[{&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f0000000840)=""/4096, 0x200000}], 0x2) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x41, 0xb0, 0xdb, 0x6, 0x0, 0x1, 0x4480c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x1e8}, 0x90, 0x484, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x3) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x5, 0x100110, 0xffffffffffffffff, 0x0) 17:02:34 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup3(r0, r1, 0x0) 17:02:34 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000340)='./file1\x00', 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x1) chmod(&(0x7f0000000d00)='./file1\x00', 0x0) 17:02:34 executing program 5: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) r1 = syz_open_dev$sg(&(0x7f0000000140), 0x0, 0x182) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000180)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000100)) dup2(0xffffffffffffffff, r1) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 17:02:35 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000340)='./file1\x00', 0x0) mknodat$loop(0xffffffffffffffff, 0x0, 0x0, 0x1) chmod(&(0x7f0000000d00)='./file1\x00', 0x0) [ 124.332475] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 17:02:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x18, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x600, 0x0, 0x0, @pid}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}]}]}, 0x28}}, 0x0) 17:02:35 executing program 4: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4", 0x14) r0 = socket$netlink(0x10, 0x3, 0x6ad76e5c0d830546) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x110) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r2, 0x80047210, &(0x7f0000000140)) r3 = syz_open_dev$rtc(&(0x7f0000000080), 0x9, 0x101001) ioctl$F2FS_IOC_GARBAGE_COLLECT(r3, 0x4004f506, &(0x7f00000000c0)=0x1) unshare(0x48020200) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) unshare(0x58040280) unshare(0x10040200) 17:02:35 executing program 7: clock_settime(0x4, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 17:02:35 executing program 6: setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) futex(&(0x7f0000000180), 0x6, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000200), 0x0) futex(&(0x7f0000000000)=0x1, 0x6, 0x0, &(0x7f0000000040)={0x0, 0x3938700}, &(0x7f0000000080)=0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') readv(r0, &(0x7f0000002a80)=[{&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f0000000840)=""/4096, 0x200000}], 0x2) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x41, 0xb0, 0xdb, 0x6, 0x0, 0x1, 0x4480c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x1e8}, 0x90, 0x484, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x3) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x5, 0x100110, 0xffffffffffffffff, 0x0) [ 124.984759] EXT4-fs: failed to create workqueue [ 124.984782] EXT4-fs (loop3): mount failed [ 125.026731] ieee802154 phy0 wpan0: encryption failed: -22 17:02:36 executing program 7: clock_settime(0x4, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) 17:02:36 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) ppoll(&(0x7f00000000c0)=[{r0, 0x14c0}], 0x1, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={[0x10000]}, 0x8) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/meminfo\x00', 0x0, 0x0) pread64(r1, &(0x7f00000010c0)=""/4088, 0xff8, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1e3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000580)=ANY=[]) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_io_uring_setup(0x20, &(0x7f0000000580)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r3 = syz_io_uring_setup(0x20, &(0x7f0000000580)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) io_uring_enter(r3, 0x76d3, 0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000040)) [ 125.542993] ieee802154 phy0 wpan0: encryption failed: -22 17:02:36 executing program 5: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) r1 = syz_open_dev$sg(&(0x7f0000000140), 0x0, 0x182) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000180)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000100)) dup2(0xffffffffffffffff, r1) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 17:02:36 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) ppoll(&(0x7f00000000c0)=[{r0, 0x14c0}], 0x1, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={[0x10000]}, 0x8) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/meminfo\x00', 0x0, 0x0) pread64(r1, &(0x7f00000010c0)=""/4088, 0xff8, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1e3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000580)=ANY=[]) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_io_uring_setup(0x20, &(0x7f0000000580)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r3 = syz_io_uring_setup(0x20, &(0x7f0000000580)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) io_uring_enter(r3, 0x76d3, 0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000040)) 17:02:36 executing program 3: mount$9p_unix(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x20004, &(0x7f0000000380)={'trans=unix,', {[{@cache_loose}, {@privport}, {@access_client}, {@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}], [{@obj_type={'obj_type', 0x3d, '&&'}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@seclabel}]}}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000140)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x0, "4fa2f8201eed6e500c32342a227989f18a88ab65bad4c23a441d66f462f1df77bc777d160562da8c50431b2a204f36c6ed27b00215909d75417aa68c9029c5fd", "176764fe8c2ff71a1633d53dafbecd823af97cf5831be9a6fed5449e9f77dd92"}) r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@remote, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f0000000900)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in6=@ipv4={""/10, ""/2, @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@dev}}, &(0x7f0000000a40)=0xe8) fchown(r0, r2, r1) unlinkat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x200) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f00000000c0), &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)={0x250, 0x14, 0x501, 0x70bd27, 0x25dfdbfd, {0x2b, 0x5}, [@INET_DIAG_REQ_BYTECODE={0x35, 0x1, "03e732a577a4af5e6f7744633ccafdbc67a014117e823ecb8812f8775ce750f8bcaee5eb2e5f7b32ac021962431454bffd"}, @INET_DIAG_REQ_BYTECODE={0x51, 0x1, "469cd4bd1c61f708b02af7e86f31f79ec1635bd48744b7d6796c9c9a39ee141f2461c0e2d7ef36600f25c65a8e8ef708fdbdc23b8d20eccb40e644d7c1a748b2832e1c4f9689b6cce9a3d742e1"}, @INET_DIAG_REQ_BYTECODE={0xef, 0x1, "ce3eca012fcf780eacc3ecb19acdb4f67073839e766400e156a508068207404359d85c744eb964c52f6067dfb9090bf36a87877bc36c80bbacd440b80706f098857e5be7e9001ae81390a5fcf49064d13ae8ccf968f93667a62228a80030d6ea1a3b6755c99e2fabf2c91aab939343ce79c6369ef97e9e13d8a65e8eaf8735b345eb3ecb4c74c97ee3f2eb9ea5a90f0858114f48ee9d0232fe1be7d4f84d2f2ecfa7c3a5a8eecdc66599dc07cc436131f4b17b53aea2f3bd4798bb8bab41ec74f06312b416113c1e94fd3b34fdfdf25baacd0c8d077c1b8f564069a7b0dc3588631355eb3622e95175d169"}, @INET_DIAG_REQ_BYTECODE={0x23, 0x1, "2e2c0a0e5bb491e505f4991db3f21cbd78863b4252a5d9fb0832402e539062"}, @INET_DIAG_REQ_BYTECODE={0x36, 0x1, "b6eb460bbe7da9243a79b9e06ce36e8c307bfd50ca7834550583b7476f0f53633539a5fa8744b70f658947a582333ab124ae"}, @INET_DIAG_REQ_BYTECODE={0x61, 0x1, "f87a2bbf105899dd33c8c7e386fb863a2c99a9cd2afaff6ff880080ae6714e9c987273cf068aa55d4ff2eb9129235f83a5140c1595c23ec71537d70926fab28d5797a1031666a91425c4324ed33543d4c47d6154b0499347c3e3a28212"}]}, 0x250}, 0x1, 0x0, 0x0, 0x8000}, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) 17:02:36 executing program 6: setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) futex(&(0x7f0000000180), 0x6, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000200), 0x0) futex(&(0x7f0000000000)=0x1, 0x6, 0x0, &(0x7f0000000040)={0x0, 0x3938700}, &(0x7f0000000080)=0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') readv(r0, &(0x7f0000002a80)=[{&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f0000000840)=""/4096, 0x200000}], 0x2) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x41, 0xb0, 0xdb, 0x6, 0x0, 0x1, 0x4480c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x1e8}, 0x90, 0x484, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x3) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x5, 0x100110, 0xffffffffffffffff, 0x0) 17:02:36 executing program 4: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4", 0x14) r0 = socket$netlink(0x10, 0x3, 0x6ad76e5c0d830546) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x110) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r2, 0x80047210, &(0x7f0000000140)) r3 = syz_open_dev$rtc(&(0x7f0000000080), 0x9, 0x101001) ioctl$F2FS_IOC_GARBAGE_COLLECT(r3, 0x4004f506, &(0x7f00000000c0)=0x1) unshare(0x48020200) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) unshare(0x58040280) unshare(0x10040200) [ 125.644390] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 17:02:36 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) ppoll(&(0x7f00000000c0)=[{r0, 0x14c0}], 0x1, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={[0x10000]}, 0x8) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/meminfo\x00', 0x0, 0x0) pread64(r1, &(0x7f00000010c0)=""/4088, 0xff8, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1e3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000580)=ANY=[]) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_io_uring_setup(0x20, &(0x7f0000000580)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r3 = syz_io_uring_setup(0x20, &(0x7f0000000580)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) io_uring_enter(r3, 0x76d3, 0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000040)) 17:02:36 executing program 2: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4", 0x14) r0 = socket$netlink(0x10, 0x3, 0x6ad76e5c0d830546) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x110) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r2, 0x80047210, &(0x7f0000000140)) r3 = syz_open_dev$rtc(&(0x7f0000000080), 0x9, 0x101001) ioctl$F2FS_IOC_GARBAGE_COLLECT(r3, 0x4004f506, &(0x7f00000000c0)=0x1) unshare(0x48020200) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) unshare(0x58040280) unshare(0x10040200) [ 125.744298] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 125.747814] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 17:02:36 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) ppoll(&(0x7f00000000c0)=[{r0, 0x14c0}], 0x1, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={[0x10000]}, 0x8) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/meminfo\x00', 0x0, 0x0) pread64(r1, &(0x7f00000010c0)=""/4088, 0xff8, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1e3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000580)=ANY=[]) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_io_uring_setup(0x20, &(0x7f0000000580)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r3 = syz_io_uring_setup(0x20, &(0x7f0000000580)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) io_uring_enter(r3, 0x76d3, 0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000040)) 17:02:36 executing program 7: setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) futex(&(0x7f0000000180), 0x6, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000200), 0x0) futex(&(0x7f0000000000)=0x1, 0x6, 0x0, &(0x7f0000000040)={0x0, 0x3938700}, &(0x7f0000000080)=0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') readv(r0, &(0x7f0000002a80)=[{&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f0000000840)=""/4096, 0x200000}], 0x2) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x41, 0xb0, 0xdb, 0x6, 0x0, 0x1, 0x4480c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x1e8}, 0x90, 0x484, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x3) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x5, 0x100110, 0xffffffffffffffff, 0x0) 17:02:36 executing program 6: setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) futex(&(0x7f0000000180), 0x6, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000200), 0x0) futex(&(0x7f0000000000)=0x1, 0x6, 0x0, &(0x7f0000000040)={0x0, 0x3938700}, &(0x7f0000000080)=0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') readv(r0, &(0x7f0000002a80)=[{&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f0000000840)=""/4096, 0x200000}], 0x2) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x41, 0xb0, 0xdb, 0x6, 0x0, 0x1, 0x4480c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x1e8}, 0x90, 0x484, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x3) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x5, 0x100110, 0xffffffffffffffff, 0x0) 17:02:36 executing program 5: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) r1 = syz_open_dev$sg(&(0x7f0000000140), 0x0, 0x182) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000180)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000100)) dup2(0xffffffffffffffff, r1) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 17:02:36 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) ppoll(&(0x7f00000000c0)=[{r0, 0x14c0}], 0x1, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={[0x10000]}, 0x8) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/meminfo\x00', 0x0, 0x0) pread64(r1, &(0x7f00000010c0)=""/4088, 0xff8, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1e3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000580)=ANY=[]) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_io_uring_setup(0x20, &(0x7f0000000580)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r3 = syz_io_uring_setup(0x20, &(0x7f0000000580)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) io_uring_enter(r3, 0x76d3, 0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000040)) [ 125.876657] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 126.006759] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 17:02:36 executing program 2: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4", 0x14) r0 = socket$netlink(0x10, 0x3, 0x6ad76e5c0d830546) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x110) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r2, 0x80047210, &(0x7f0000000140)) r3 = syz_open_dev$rtc(&(0x7f0000000080), 0x9, 0x101001) ioctl$F2FS_IOC_GARBAGE_COLLECT(r3, 0x4004f506, &(0x7f00000000c0)=0x1) unshare(0x48020200) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) unshare(0x58040280) unshare(0x10040200) [ 126.090858] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 17:02:36 executing program 7: setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) futex(&(0x7f0000000180), 0x6, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000200), 0x0) futex(&(0x7f0000000000)=0x1, 0x6, 0x0, &(0x7f0000000040)={0x0, 0x3938700}, &(0x7f0000000080)=0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') readv(r0, &(0x7f0000002a80)=[{&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f0000000840)=""/4096, 0x200000}], 0x2) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x41, 0xb0, 0xdb, 0x6, 0x0, 0x1, 0x4480c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x1e8}, 0x90, 0x484, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x3) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x5, 0x100110, 0xffffffffffffffff, 0x0) [ 126.377098] process 'syz-executor.0' launched './file1' with NULL argv: empty string added 17:02:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 17:02:37 executing program 5: socket$packet(0x11, 0x2, 0x300) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) creat(0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="940000005e00c5d524bd700002dcdf2502000200800000807b005700a65444eab1142741b40d6b82b95fa632f55f339f54919096bfd26940a2e3916fb75c84c723d83e8bf9212dba54eab1bcd6abe820551f9d64eb6a0464cc34862b6b27fac918fd602136c66034224fc472ebcf751732c9ce58d024f26e163c00feffffffffffff5360011a82d940cabfa1103bd6b1dc7e9400"], 0x94}}, 0x40000) 17:02:37 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0x104, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in, 0x0, 0x3c}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0x2, 0x3}, [@coaddr={0x14, 0xe, @in=@empty}]}, 0x104}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@empty}, 0x0, @in=@private}}, &(0x7f0000000080)=0xe8) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) 17:02:37 executing program 7: setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) futex(&(0x7f0000000180), 0x6, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000200), 0x0) futex(&(0x7f0000000000)=0x1, 0x6, 0x0, &(0x7f0000000040)={0x0, 0x3938700}, &(0x7f0000000080)=0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') readv(r0, &(0x7f0000002a80)=[{&(0x7f0000000740)=""/216, 0xd8}, {&(0x7f0000000840)=""/4096, 0x200000}], 0x2) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x41, 0xb0, 0xdb, 0x6, 0x0, 0x1, 0x4480c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x1e8}, 0x90, 0x484, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x3) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x5, 0x100110, 0xffffffffffffffff, 0x0) 17:02:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='./file0\x00', &(0x7f0000000480)='./mnt\x00') 17:02:37 executing program 2: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4", 0x14) r0 = socket$netlink(0x10, 0x3, 0x6ad76e5c0d830546) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x110) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r2, 0x80047210, &(0x7f0000000140)) r3 = syz_open_dev$rtc(&(0x7f0000000080), 0x9, 0x101001) ioctl$F2FS_IOC_GARBAGE_COLLECT(r3, 0x4004f506, &(0x7f00000000c0)=0x1) unshare(0x48020200) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) unshare(0x58040280) unshare(0x10040200) 17:02:37 executing program 4: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4", 0x14) r0 = socket$netlink(0x10, 0x3, 0x6ad76e5c0d830546) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x110) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r2, 0x80047210, &(0x7f0000000140)) r3 = syz_open_dev$rtc(&(0x7f0000000080), 0x9, 0x101001) ioctl$F2FS_IOC_GARBAGE_COLLECT(r3, 0x4004f506, &(0x7f00000000c0)=0x1) unshare(0x48020200) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) unshare(0x58040280) unshare(0x10040200) 17:02:37 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) ppoll(&(0x7f00000000c0)=[{r0, 0x14c0}], 0x1, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={[0x10000]}, 0x8) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/meminfo\x00', 0x0, 0x0) pread64(r1, &(0x7f00000010c0)=""/4088, 0xff8, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1e3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000580)=ANY=[]) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_io_uring_setup(0x20, &(0x7f0000000580)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r3 = syz_io_uring_setup(0x20, &(0x7f0000000580)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) io_uring_enter(r3, 0x76d3, 0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000040)) 17:02:37 executing program 3: r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)=0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000004) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r3, r1, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) 17:02:37 executing program 5: socket$packet(0x11, 0x2, 0x300) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) creat(0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="940000005e00c5d524bd700002dcdf2502000200800000807b005700a65444eab1142741b40d6b82b95fa632f55f339f54919096bfd26940a2e3916fb75c84c723d83e8bf9212dba54eab1bcd6abe820551f9d64eb6a0464cc34862b6b27fac918fd602136c66034224fc472ebcf751732c9ce58d024f26e163c00feffffffffffff5360011a82d940cabfa1103bd6b1dc7e9400"], 0x94}}, 0x40000) 17:02:37 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xfffffffbffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000140)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x0, "4fa2f8201eed6e500c32342a227989f18a88ab65bad4c23a441d66f462f1df77bc777d160562da8c50431b2a204f36c6ed27b00215909d75417aa68c9029c5fd", "176764fe8c2ff71a1633d53dafbecd823af97cf5831be9a6fed5449e9f77dd92"}) getsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00000000c0), &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f00000000c0)='\x00', 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) 17:02:37 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000001c00), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000001c40)) 17:02:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 17:02:37 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) close(0xffffffffffffffff) read(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, r0) [ 126.634519] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 17:02:37 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r0, 0x0, 0x0) keyctl$join(0x1, 0x0) keyctl$read(0x12, 0x0, 0x0, 0x0) 17:02:37 executing program 5: socket$packet(0x11, 0x2, 0x300) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) creat(0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="940000005e00c5d524bd700002dcdf2502000200800000807b005700a65444eab1142741b40d6b82b95fa632f55f339f54919096bfd26940a2e3916fb75c84c723d83e8bf9212dba54eab1bcd6abe820551f9d64eb6a0464cc34862b6b27fac918fd602136c66034224fc472ebcf751732c9ce58d024f26e163c00feffffffffffff5360011a82d940cabfa1103bd6b1dc7e9400"], 0x94}}, 0x40000) [ 127.146748] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue 17:02:38 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001680)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="400100001a0001000000000000000000ac14142b000000000000000000000000ff01000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x140}}, 0x0) close_range(r0, r2, 0x2) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000001c0)=0xffffffff, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x1, 0x0, r1, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x1}, 0x1) 17:02:38 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) close(0xffffffffffffffff) read(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, r0) 17:02:38 executing program 1: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xfb, 0x19, 0x2, 0x5, "e94a778c76633ed225f974ca1274fbf1", "2f01e5aa"}, 0x19, 0x3) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) close_range(0xffffffffffffffff, r1, 0x2) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x3938700}}, 0x0) open_tree(r0, &(0x7f0000000100)='./file1\x00', 0x100) timerfd_create(0x0, 0x0) unshare(0x48020200) 17:02:38 executing program 4: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4", 0x14) r0 = socket$netlink(0x10, 0x3, 0x6ad76e5c0d830546) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x110) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r2, 0x80047210, &(0x7f0000000140)) r3 = syz_open_dev$rtc(&(0x7f0000000080), 0x9, 0x101001) ioctl$F2FS_IOC_GARBAGE_COLLECT(r3, 0x4004f506, &(0x7f00000000c0)=0x1) unshare(0x48020200) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) unshare(0x58040280) unshare(0x10040200) 17:02:38 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)=ANY=[@ANYBLOB="c0000000190001000000000000000000ffffffff000000000000000000000000ac1e000100000000000000000000000000000000000000000a000000e6"], 0xc0}}, 0x0) [ 127.331795] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.3'. [ 127.336704] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 17:02:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 17:02:38 executing program 5: socket$packet(0x11, 0x2, 0x300) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) creat(0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="940000005e00c5d524bd700002dcdf2502000200800000807b005700a65444eab1142741b40d6b82b95fa632f55f339f54919096bfd26940a2e3916fb75c84c723d83e8bf9212dba54eab1bcd6abe820551f9d64eb6a0464cc34862b6b27fac918fd602136c66034224fc472ebcf751732c9ce58d024f26e163c00feffffffffffff5360011a82d940cabfa1103bd6b1dc7e9400"], 0x94}}, 0x40000) 17:02:38 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xfffffffbffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000140)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x0, "4fa2f8201eed6e500c32342a227989f18a88ab65bad4c23a441d66f462f1df77bc777d160562da8c50431b2a204f36c6ed27b00215909d75417aa68c9029c5fd", "176764fe8c2ff71a1633d53dafbecd823af97cf5831be9a6fed5449e9f77dd92"}) getsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00000000c0), &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f00000000c0)='\x00', 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) 17:02:38 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0x158, 0x1a, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@local, 0x0, 0x33}, @in=@private, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}}]}, 0x158}}, 0x0) 17:02:38 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) lseek(r2, 0x0, 0x4) 17:02:38 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) close(0xffffffffffffffff) read(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, r0) 17:02:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000002ec0), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) write$bt_hci(0xffffffffffffffff, 0x0, 0x106) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) setgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2692, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) 17:02:38 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) close(0xffffffffffffffff) read(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, r0) 17:02:38 executing program 7: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000040)=""/7) [ 127.743494] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue 17:02:39 executing program 7: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xfb, 0x19, 0x2, 0x5, "e94a778c76633ed225f974ca1274fbf1", "2f01e5aa"}, 0x19, 0x3) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) close_range(0xffffffffffffffff, r1, 0x2) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x3938700}}, 0x0) open_tree(r0, &(0x7f0000000100)='./file1\x00', 0x100) timerfd_create(0x0, 0x0) unshare(0x48020200) 17:02:39 executing program 2: pselect6(0x0, 0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3f}, &(0x7f0000000380), &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000440)={&(0x7f0000000400)={[0x4]}, 0x8}) 17:02:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 17:02:39 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xfffffffbffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000140)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x0, "4fa2f8201eed6e500c32342a227989f18a88ab65bad4c23a441d66f462f1df77bc777d160562da8c50431b2a204f36c6ed27b00215909d75417aa68c9029c5fd", "176764fe8c2ff71a1633d53dafbecd823af97cf5831be9a6fed5449e9f77dd92"}) getsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00000000c0), &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f00000000c0)='\x00', 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) 17:02:39 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001680)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="400100001a0001000000000000000000ac14142b000000000000000000000000ff01000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x140}}, 0x0) close_range(r0, r2, 0x2) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000001c0)=0xffffffff, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x1, 0x0, r1, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x1}, 0x1) 17:02:39 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 17:02:39 executing program 5: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xfb, 0x19, 0x2, 0x5, "e94a778c76633ed225f974ca1274fbf1", "2f01e5aa"}, 0x19, 0x3) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) close_range(0xffffffffffffffff, r1, 0x2) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x3938700}}, 0x0) open_tree(r0, &(0x7f0000000100)='./file1\x00', 0x100) timerfd_create(0x0, 0x0) unshare(0x48020200) 17:02:39 executing program 1: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xfb, 0x19, 0x2, 0x5, "e94a778c76633ed225f974ca1274fbf1", "2f01e5aa"}, 0x19, 0x3) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) close_range(0xffffffffffffffff, r1, 0x2) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x3938700}}, 0x0) open_tree(r0, &(0x7f0000000100)='./file1\x00', 0x100) timerfd_create(0x0, 0x0) unshare(0x48020200) [ 128.555050] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.3'. 17:02:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000340)={'U+', 0xfe0000000004}, 0x16, 0x0) 17:02:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x8401, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tun(r0, 0x0, 0x285) 17:02:39 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001680)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="400100001a0001000000000000000000ac14142b000000000000000000000000ff01000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x140}}, 0x0) close_range(r0, r2, 0x2) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000001c0)=0xffffffff, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x1, 0x0, r1, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x1}, 0x1) 17:02:39 executing program 0: io_submit(0x0, 0x2, &(0x7f0000001680)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) io_cancel(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000440)="ae11e4447f5eda7d9de18b601a10d36a4b906d50147309633db606700d00b9bb89017b382feb8ecbedaf8e74bbe920223ce0fc4c3ec73e01d93695cdbda40b533f22eefe760847aa120a706a9aba7c6128994781ec0a20efb8c5662db6c6c7d8467451d94ba55515af46f5e2456bb18be89792dab21fc6214d7a7e3ee6191f89b9177a829bf12fc671d28c2f2796d183678fccf1f0a13d", 0x97, 0x40, 0x0, 0x3}, &(0x7f0000000540)) r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000340)={0x53, 0x0, 0x6, 0x0, @buffer={0x300, 0xa3, &(0x7f00000005c0)=""/163}, &(0x7f0000000040)="4feb7dc9066b", 0x0, 0x0, 0x0, 0x4, 0x0}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000003c0)=[0xffffffffffffffff], 0x1) ioctl$LOOP_SET_STATUS(r3, 0x127f, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "200b45308126f4d56bd2ba158d4c64e1f35cac77c8e818b6a5589e4a69395a5223db6b4323e0b29fba0da3344bc9163688567feda8dba320d292f4ebefe64e99", "220c0000002d52004bde09505bf1c35930ac1d9268624c1420b156a2ac400377"}) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x3, 0xa4, 0x8, 0x1, 0x0, 0x0, 0x18308, 0x5, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x1, @perf_bp={&(0x7f0000000000), 0x3}, 0x0, 0x9, 0x0, 0x2, 0x5, 0x5, 0x9dfc, 0x0, 0x6, 0x0, 0x2}, r2, 0x3, r3, 0x0) 17:02:39 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000000c0)) [ 128.894851] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.3'. 17:02:39 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000000c0)) [ 129.057963] audit: type=1400 audit(1699117359.772:9): avc: denied { write } for pid=4352 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 17:02:39 executing program 1: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xfb, 0x19, 0x2, 0x5, "e94a778c76633ed225f974ca1274fbf1", "2f01e5aa"}, 0x19, 0x3) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) close_range(0xffffffffffffffff, r1, 0x2) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x3938700}}, 0x0) open_tree(r0, &(0x7f0000000100)='./file1\x00', 0x100) timerfd_create(0x0, 0x0) unshare(0x48020200) 17:02:39 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000000c0)) [ 129.501859] EXT4-fs: failed to create workqueue [ 129.502946] EXT4-fs (loop6): mount failed 17:02:40 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000000c0)) 17:02:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:02:40 executing program 0: io_submit(0x0, 0x2, &(0x7f0000001680)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) io_cancel(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000440)="ae11e4447f5eda7d9de18b601a10d36a4b906d50147309633db606700d00b9bb89017b382feb8ecbedaf8e74bbe920223ce0fc4c3ec73e01d93695cdbda40b533f22eefe760847aa120a706a9aba7c6128994781ec0a20efb8c5662db6c6c7d8467451d94ba55515af46f5e2456bb18be89792dab21fc6214d7a7e3ee6191f89b9177a829bf12fc671d28c2f2796d183678fccf1f0a13d", 0x97, 0x40, 0x0, 0x3}, &(0x7f0000000540)) r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000340)={0x53, 0x0, 0x6, 0x0, @buffer={0x300, 0xa3, &(0x7f00000005c0)=""/163}, &(0x7f0000000040)="4feb7dc9066b", 0x0, 0x0, 0x0, 0x4, 0x0}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000003c0)=[0xffffffffffffffff], 0x1) ioctl$LOOP_SET_STATUS(r3, 0x127f, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "200b45308126f4d56bd2ba158d4c64e1f35cac77c8e818b6a5589e4a69395a5223db6b4323e0b29fba0da3344bc9163688567feda8dba320d292f4ebefe64e99", "220c0000002d52004bde09505bf1c35930ac1d9268624c1420b156a2ac400377"}) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x3, 0xa4, 0x8, 0x1, 0x0, 0x0, 0x18308, 0x5, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x1, @perf_bp={&(0x7f0000000000), 0x3}, 0x0, 0x9, 0x0, 0x2, 0x5, 0x5, 0x9dfc, 0x0, 0x6, 0x0, 0x2}, r2, 0x3, r3, 0x0) 17:02:40 executing program 1: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xfb, 0x19, 0x2, 0x5, "e94a778c76633ed225f974ca1274fbf1", "2f01e5aa"}, 0x19, 0x3) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) close_range(0xffffffffffffffff, r1, 0x2) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x3938700}}, 0x0) open_tree(r0, &(0x7f0000000100)='./file1\x00', 0x100) timerfd_create(0x0, 0x0) unshare(0x48020200) 17:02:40 executing program 7: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xfb, 0x19, 0x2, 0x5, "e94a778c76633ed225f974ca1274fbf1", "2f01e5aa"}, 0x19, 0x3) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) close_range(0xffffffffffffffff, r1, 0x2) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x3938700}}, 0x0) open_tree(r0, &(0x7f0000000100)='./file1\x00', 0x100) timerfd_create(0x0, 0x0) unshare(0x48020200) 17:02:40 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001680)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="400100001a0001000000000000000000ac14142b000000000000000000000000ff01000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x140}}, 0x0) close_range(r0, r2, 0x2) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000001c0)=0xffffffff, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x1, 0x0, r1, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x1}, 0x1) 17:02:40 executing program 5: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xfb, 0x19, 0x2, 0x5, "e94a778c76633ed225f974ca1274fbf1", "2f01e5aa"}, 0x19, 0x3) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) close_range(0xffffffffffffffff, r1, 0x2) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x3938700}}, 0x0) open_tree(r0, &(0x7f0000000100)='./file1\x00', 0x100) timerfd_create(0x0, 0x0) unshare(0x48020200) 17:02:40 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xfffffffbffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000140)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x0, "4fa2f8201eed6e500c32342a227989f18a88ab65bad4c23a441d66f462f1df77bc777d160562da8c50431b2a204f36c6ed27b00215909d75417aa68c9029c5fd", "176764fe8c2ff71a1633d53dafbecd823af97cf5831be9a6fed5449e9f77dd92"}) getsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00000000c0), &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f00000000c0)='\x00', 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) [ 130.073127] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.3'. 17:02:40 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_readv(r0, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {&(0x7f0000001b40)=""/124, 0x7a}, {&(0x7f0000001980)=""/161, 0xa1}], 0x3, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xffffffbc}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000001d00)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) 17:02:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x6c}, 0x0, @in=@empty}}, 0xe8) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000040)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x6c}, 0x0, @in=@empty}}, 0xe8) 17:02:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x6c}, 0x0, @in=@empty}}, 0xe8) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000040)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x6c}, 0x0, @in=@empty}}, 0xe8) 17:02:41 executing program 0: io_submit(0x0, 0x2, &(0x7f0000001680)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) io_cancel(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000440)="ae11e4447f5eda7d9de18b601a10d36a4b906d50147309633db606700d00b9bb89017b382feb8ecbedaf8e74bbe920223ce0fc4c3ec73e01d93695cdbda40b533f22eefe760847aa120a706a9aba7c6128994781ec0a20efb8c5662db6c6c7d8467451d94ba55515af46f5e2456bb18be89792dab21fc6214d7a7e3ee6191f89b9177a829bf12fc671d28c2f2796d183678fccf1f0a13d", 0x97, 0x40, 0x0, 0x3}, &(0x7f0000000540)) r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000340)={0x53, 0x0, 0x6, 0x0, @buffer={0x300, 0xa3, &(0x7f00000005c0)=""/163}, &(0x7f0000000040)="4feb7dc9066b", 0x0, 0x0, 0x0, 0x4, 0x0}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000003c0)=[0xffffffffffffffff], 0x1) ioctl$LOOP_SET_STATUS(r3, 0x127f, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "200b45308126f4d56bd2ba158d4c64e1f35cac77c8e818b6a5589e4a69395a5223db6b4323e0b29fba0da3344bc9163688567feda8dba320d292f4ebefe64e99", "220c0000002d52004bde09505bf1c35930ac1d9268624c1420b156a2ac400377"}) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x3, 0xa4, 0x8, 0x1, 0x0, 0x0, 0x18308, 0x5, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x1, @perf_bp={&(0x7f0000000000), 0x3}, 0x0, 0x9, 0x0, 0x2, 0x5, 0x5, 0x9dfc, 0x0, 0x6, 0x0, 0x2}, r2, 0x3, r3, 0x0) 17:02:41 executing program 5: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xfb, 0x19, 0x2, 0x5, "e94a778c76633ed225f974ca1274fbf1", "2f01e5aa"}, 0x19, 0x3) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) close_range(0xffffffffffffffff, r1, 0x2) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x3938700}}, 0x0) open_tree(r0, &(0x7f0000000100)='./file1\x00', 0x100) timerfd_create(0x0, 0x0) unshare(0x48020200) 17:02:41 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) r1 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x40800, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, 0x0) 17:02:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x6c}, 0x0, @in=@empty}}, 0xe8) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000040)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x6c}, 0x0, @in=@empty}}, 0xe8) [ 130.505996] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 130.565433] program syz-executor.4 is using a deprecated SCSI ioctl, please convert it to SG_IO 17:02:41 executing program 0: io_submit(0x0, 0x2, &(0x7f0000001680)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) io_cancel(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000440)="ae11e4447f5eda7d9de18b601a10d36a4b906d50147309633db606700d00b9bb89017b382feb8ecbedaf8e74bbe920223ce0fc4c3ec73e01d93695cdbda40b533f22eefe760847aa120a706a9aba7c6128994781ec0a20efb8c5662db6c6c7d8467451d94ba55515af46f5e2456bb18be89792dab21fc6214d7a7e3ee6191f89b9177a829bf12fc671d28c2f2796d183678fccf1f0a13d", 0x97, 0x40, 0x0, 0x3}, &(0x7f0000000540)) r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000340)={0x53, 0x0, 0x6, 0x0, @buffer={0x300, 0xa3, &(0x7f00000005c0)=""/163}, &(0x7f0000000040)="4feb7dc9066b", 0x0, 0x0, 0x0, 0x4, 0x0}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000003c0)=[0xffffffffffffffff], 0x1) ioctl$LOOP_SET_STATUS(r3, 0x127f, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "200b45308126f4d56bd2ba158d4c64e1f35cac77c8e818b6a5589e4a69395a5223db6b4323e0b29fba0da3344bc9163688567feda8dba320d292f4ebefe64e99", "220c0000002d52004bde09505bf1c35930ac1d9268624c1420b156a2ac400377"}) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x3, 0xa4, 0x8, 0x1, 0x0, 0x0, 0x18308, 0x5, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x1, @perf_bp={&(0x7f0000000000), 0x3}, 0x0, 0x9, 0x0, 0x2, 0x5, 0x5, 0x9dfc, 0x0, 0x6, 0x0, 0x2}, r2, 0x3, r3, 0x0) 17:02:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x6c}, 0x0, @in=@empty}}, 0xe8) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000040)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x6c}, 0x0, @in=@empty}}, 0xe8) 17:02:41 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) r1 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x40800, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, 0x0) [ 130.690369] program syz-executor.4 is using a deprecated SCSI ioctl, please convert it to SG_IO 17:02:41 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) r1 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x40800, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, 0x0) [ 130.818188] program syz-executor.4 is using a deprecated SCSI ioctl, please convert it to SG_IO 17:02:41 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x6, 0x3}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet(0x2, 0x1, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_int(r0, 0x0, 0x1, &(0x7f0000000100)=0x20, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000080)={0x0, 0x3, 0x2b, 0x0, 0x6}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x80800, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0}, 0x0) unshare(0x48020200) 17:02:41 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x24}, 0x18) 17:02:41 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) r1 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x40800, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, 0x0) 17:02:41 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000300)='./file1\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x58c0, 0x0) mount$bind(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x2012408, 0x0) 17:02:41 executing program 7: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xfb, 0x19, 0x2, 0x5, "e94a778c76633ed225f974ca1274fbf1", "2f01e5aa"}, 0x19, 0x3) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) close_range(0xffffffffffffffff, r1, 0x2) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x3938700}}, 0x0) open_tree(r0, &(0x7f0000000100)='./file1\x00', 0x100) timerfd_create(0x0, 0x0) unshare(0x48020200) 17:02:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x24, 0x2c, 0xc21, 0x0, 0x0, {}, [@typed={0x4}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x24}}, 0x0) 17:02:41 executing program 1: syz_emit_ethernet(0x89, &(0x7f0000000180)={@link_local, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x88, 0x0, @private=0xa010101, @local}, @echo_reply={0x0, 0x0, 0x0, 0x66, 0x2, "78c2e222bec70615cb8a65ae2f51f366684ae5fe8b3486c96db2029cddcba1fe9c8823242eea9b010fe93a8698060f6c79f757aabe76144a9fbc5c47b71e31cfcd3effc05dc29a5867b0746df61f616972473a3084a62ce90b42f305898836"}}}}}, 0x0) 17:02:41 executing program 5: r0 = timerfd_create(0x8, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f00000001c0)={{0x0, r1+10000000}, {0x0, 0x3938700}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000080)={{0x77359400}}, &(0x7f00000000c0)) 17:02:41 executing program 2: openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x224c0}, 0xfe8) 17:02:41 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) statx(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x2c80, 0x4, 0x0) chown(0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x46842, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r2, 0x0) creat(&(0x7f0000000200)='./file0/file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000380)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) io_destroy(0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file1\x00'}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x882c2, 0x0) io_uring_enter(0xffffffffffffffff, 0x76d3, 0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000240)) 17:02:41 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x15, 0x0, &(0x7f0000000280)=@abs={0x1}, 0x6e) 17:02:41 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x801, 0x0) write$rfkill(r0, &(0x7f0000000080)={0x0, 0x0, 0x3, 0x1}, 0x8) 17:02:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x543, 0x0) close(r0) syz_io_uring_setup(0x4d50, &(0x7f0000000000), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = epoll_create1(0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 131.243949] [ 131.244153] ====================================================== [ 131.244770] WARNING: possible circular locking dependency detected [ 131.245426] 5.10.199 #1 Not tainted [ 131.245840] ------------------------------------------------------ [ 131.246515] syz-executor.5/4447 is trying to acquire lock: [ 131.247132] ffff88801a664ae8 ((work_completion)(&hdev->tx_work)){+.+.}-{0:0}, at: __flush_work+0xdd/0xa90 [ 131.251725] [ 131.251725] but task is already holding lock: [ 131.252349] ffff88801a664f40 (&hdev->req_lock){+.+.}-{3:3}, at: hci_dev_do_close+0xef/0x1240 [ 131.253270] [ 131.253270] which lock already depends on the new lock. [ 131.253270] [ 131.254179] [ 131.254179] the existing dependency chain (in reverse order) is: [ 131.255001] [ 131.255001] -> #3 (&hdev->req_lock){+.+.}-{3:3}: [ 131.255706] __mutex_lock+0x13d/0x10b0 [ 131.256195] hci_dev_do_close+0xef/0x1240 [ 131.256695] hci_rfkill_set_block+0x166/0x1a0 [ 131.257245] rfkill_set_block+0x1fd/0x540 [ 131.257792] rfkill_fop_write+0x253/0x4b0 [ 131.258433] vfs_write+0x29a/0xa70 [ 131.259056] ksys_write+0x1f6/0x260 [ 131.259702] do_syscall_64+0x33/0x40 [ 131.260361] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 131.261236] [ 131.261236] -> #2 (rfkill_global_mutex){+.+.}-{3:3}: [ 131.262275] __mutex_lock+0x13d/0x10b0 [ 131.262950] rfkill_register+0x36/0xa10 [ 131.263624] hci_register_dev+0x42e/0xc00 [ 131.264336] __vhci_create_device+0x2c8/0x5c0 [ 131.265088] vhci_open_timeout+0x38/0x50 [ 131.265786] process_one_work+0x9a9/0x14b0 [ 131.266511] worker_thread+0x61d/0x1310 [ 131.267204] kthread+0x38f/0x470 [ 131.267803] ret_from_fork+0x22/0x30 [ 131.268448] [ 131.268448] -> #1 (&data->open_mutex){+.+.}-{3:3}: [ 131.269454] __mutex_lock+0x13d/0x10b0 [ 131.270146] vhci_send_frame+0x63/0xa0 [ 131.270620] hci_send_frame+0x1b9/0x320 [ 131.271105] hci_tx_work+0x10af/0x1660 [ 131.271587] process_one_work+0x9a9/0x14b0 [ 131.272106] worker_thread+0x61d/0x1310 [ 131.272609] kthread+0x38f/0x470 [ 131.273034] ret_from_fork+0x22/0x30 [ 131.273484] [ 131.273484] -> #0 ((work_completion)(&hdev->tx_work)){+.+.}-{0:0}: [ 131.274304] __lock_acquire+0x29e7/0x5b00 [ 131.274778] lock_acquire+0x197/0x470 [ 131.275203] __flush_work+0x105/0xa90 [ 131.275629] hci_dev_do_close+0x131/0x1240 [ 131.276092] hci_rfkill_set_block+0x166/0x1a0 [ 131.276584] rfkill_set_block+0x1fd/0x540 [ 131.277041] rfkill_fop_write+0x253/0x4b0 [ 131.277501] vfs_write+0x29a/0xa70 [ 131.277905] ksys_write+0x1f6/0x260 [ 131.278316] do_syscall_64+0x33/0x40 [ 131.278729] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 131.279281] [ 131.279281] other info that might help us debug this: [ 131.279281] [ 131.280059] Chain exists of: [ 131.280059] (work_completion)(&hdev->tx_work) --> rfkill_global_mutex --> &hdev->req_lock [ 131.280059] [ 131.281396] Possible unsafe locking scenario: [ 131.281396] [ 131.282013] CPU0 CPU1 [ 131.282507] ---- ---- [ 131.283002] lock(&hdev->req_lock); [ 131.283414] lock(rfkill_global_mutex); [ 131.284122] lock(&hdev->req_lock); [ 131.284859] lock((work_completion)(&hdev->tx_work)); [ 131.285432] [ 131.285432] *** DEADLOCK *** [ 131.285432] [ 131.286049] 2 locks held by syz-executor.5/4447: [ 131.286520] #0: ffffffff85619468 (rfkill_global_mutex){+.+.}-{3:3}, at: rfkill_fop_write+0xff/0x4b0 [ 131.287450] #1: ffff88801a664f40 (&hdev->req_lock){+.+.}-{3:3}, at: hci_dev_do_close+0xef/0x1240 [ 131.288395] [ 131.288395] stack backtrace: [ 131.288858] CPU: 1 PID: 4447 Comm: syz-executor.5 Not tainted 5.10.199 #1 [ 131.289568] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 131.290449] Call Trace: [ 131.290720] dump_stack+0x107/0x167 [ 131.291114] check_noncircular+0x263/0x2e0 [ 131.291547] ? register_lock_class+0xbb/0x17b0 [ 131.292002] ? print_circular_bug+0x470/0x470 [ 131.292461] ? stack_trace_consume_entry+0x160/0x160 [ 131.292974] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 131.293444] __lock_acquire+0x29e7/0x5b00 [ 131.293892] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 131.294445] ? rwlock_bug.part.0+0x90/0x90 [ 131.294889] lock_acquire+0x197/0x470 [ 131.295281] ? __flush_work+0xdd/0xa90 [ 131.295681] ? lock_release+0x680/0x680 [ 131.296083] ? lock_release+0x680/0x680 [ 131.296484] ? lock_chain_count+0x20/0x20 [ 131.296902] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 131.297428] ? lock_chain_count+0x20/0x20 [ 131.297856] ? lock_acquire+0x197/0x470 [ 131.298255] __flush_work+0x105/0xa90 [ 131.298642] ? __flush_work+0xdd/0xa90 [ 131.299049] ? queue_delayed_work_on+0xe0/0xe0 [ 131.299530] ? hci_dev_do_close+0xef/0x1240 [ 131.299974] ? __cancel_work_timer+0x2a9/0x4c0 [ 131.300446] ? mutex_lock_io_nested+0xf30/0xf30 [ 131.300933] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 131.301480] ? cancel_delayed_work+0x24d/0x2b0 [ 131.301970] ? trace_hardirqs_on+0x5b/0x180 [ 131.302422] ? cancel_delayed_work+0x1b8/0x2b0 [ 131.302894] ? cancel_delayed_work_sync+0x20/0x20 [ 131.303401] hci_dev_do_close+0x131/0x1240 [ 131.303849] ? rfkill_set_block+0x18f/0x540 [ 131.304302] ? hci_dev_open+0x350/0x350 [ 131.304721] ? mark_held_locks+0x9e/0xe0 [ 131.305145] hci_rfkill_set_block+0x166/0x1a0 [ 131.305599] ? hci_power_off+0x20/0x20 [ 131.305993] rfkill_set_block+0x1fd/0x540 [ 131.306408] rfkill_fop_write+0x253/0x4b0 [ 131.306822] ? rfkill_sync_work+0xa0/0xa0 [ 131.307247] ? security_file_permission+0x24e/0x570 [ 131.307754] ? rfkill_sync_work+0xa0/0xa0 [ 131.308186] vfs_write+0x29a/0xa70 [ 131.308554] ksys_write+0x1f6/0x260 [ 131.308936] ? __ia32_sys_read+0xb0/0xb0 [ 131.309358] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 131.309918] ? syscall_enter_from_user_mode+0x1d/0x50 [ 131.310461] do_syscall_64+0x33/0x40 [ 131.310840] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 131.311359] RIP: 0033:0x7fa68c524b19 [ 131.311729] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 131.313555] RSP: 002b:00007fa689a9a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 131.314328] RAX: ffffffffffffffda RBX: 00007fa68c637f60 RCX: 00007fa68c524b19 [ 131.315041] RDX: 0000000000000008 RSI: 0000000020000080 RDI: 0000000000000003 [ 131.315752] RBP: 00007fa68c57ef6d R08: 0000000000000000 R09: 0000000000000000 [ 131.316464] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 131.317175] R13: 00007ffd15f3d4af R14: 00007fa689a9a300 R15: 0000000000022000 [ 131.350795] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 17:02:42 executing program 1: set_mempolicy(0x8003, &(0x7f0000000140)=0xfffffffffffffffe, 0x80) syz_80211_join_ibss(&(0x7f0000000040)='wlan1\x00', 0x0, 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x16be, 0xef) r0 = fork() tkill(0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40}, 0x0, 0x0, 0x100, 0x0, 0x2000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000100)=0x3, 0x4) kcmp(0x0, r0, 0x4, 0xffffffffffffffff, r1) r2 = fork() syz_80211_inject_frame(&(0x7f00000002c0)=@device_b, &(0x7f0000000080)=ANY=[@ANYBLOB="6901c08ed1a125c62fd3a22fb21f"], 0xa) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x8, r2) r3 = fcntl$getown(r1, 0x9) ptrace$setopts(0x4206, r3, 0xe7, 0x1) wait4(r0, 0x0, 0x40000000, &(0x7f0000000540)) 17:02:42 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x80045301, 0x0) 17:02:42 executing program 4: r0 = inotify_init() pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) ppoll(&(0x7f00000000c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) 17:02:42 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000240)=@updsa={0x138, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast2, @in=@local}, {@in6=@private2, 0x0, 0x6c}, @in=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}, 0x17}}]}, 0x138}}, 0x0) 17:02:42 executing program 3: flock(0xffffffffffffffff, 0x8) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x87, 0x3, 0x80, 0x6, 0x0, 0x7, 0x10082, 0xd, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xdfe, 0x4, @perf_config_ext={0x20, 0x9}, 0x1000, 0x7000000000000, 0x2e4, 0x1, 0x80000001, 0xdc, 0xd749, 0x0, 0x6, 0x0, 0x401}, r0, 0xb, 0xffffffffffffffff, 0x1) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x44180, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000080)={0x7, 0x1, 0x1, 'queue1\x00', 0x6b}) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000140)=0x6) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r3, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="2321202e2f66696c65302000202f6465762f7663730020717565756531000a21747d3fe849d354180b65bde36aa4e27fa216461e4ef24bde6d82a00ea2992b283b423a24ee36a72b9f23825c8f745816da64859e1c06e1fe3e3c8079ea2ec58f5b6d2f704d92d0b3ef15753335456932927fde1f622da37dcb136aee30f54ff066f7ebccb11bc5ed7084ecae86aff8801b481ba14984ba40375bf727fa3e007c99c32a9c5495cec64b31837efbfd8619b6cb57c93fa92daac8001ba323b8ff4fb6c73761cfe8a67b371943b596ab9d53c6f71c450b542f04a14343e1e46f938a3ff472444ae5246e2020844f9d747dd25d5222fec1"], 0xa8) 17:02:42 executing program 4: pselect6(0x0, 0x0, &(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)={0x77359400}, 0x0) 17:02:42 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @none}, 0xe) listen(r0, 0x0) shutdown(r0, 0x1) [ 131.439915] audit: type=1326 audit(1699117362.160:10): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4466 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff4aab78b19 code=0x7ffc0000 [ 131.445287] audit: type=1326 audit(1699117362.165:11): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4466 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7ff4aab78b19 code=0x7ffc0000 [ 131.448017] audit: type=1326 audit(1699117362.168:12): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4466 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff4aab78b19 code=0x7ffc0000 [ 131.456521] audit: type=1326 audit(1699117362.174:13): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4466 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7ff4aab78b19 code=0x7ffc0000 17:02:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xbfbc, 0x4400006}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) [ 131.467955] audit: type=1326 audit(1699117362.174:14): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4466 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff4aab78b19 code=0x7ffc0000 [ 131.492993] audit: type=1326 audit(1699117362.174:15): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4466 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7ff4aab78b19 code=0x7ffc0000 17:02:42 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x3f, 0x9, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x401}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) [ 131.509045] audit: type=1326 audit(1699117362.174:16): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4466 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff4aab78b19 code=0x7ffc0000 [ 131.512367] Restarting kernel threads ... done. [ 131.518487] audit: type=1326 audit(1699117362.174:17): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4466 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7ff4aab78b19 code=0x7ffc0000 17:02:42 executing program 0: mmap$usbmon(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x110, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x6000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10bf42, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c00, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000440)=ANY=[@ANYBLOB="0309000000000000000000eda577b74cf8c13c7ff04266e723a45091714b17c77fa0831f177b51fc819559a2eceea3893d94020bfc32e6f150be1df02846c27c63f23e6e07f6cf2af9fbe8212768ba373069b0c94a3b5d19178e98ac005e175953aaa4154ecaab6b328af6750291727132834c2c6d0fdcd98ebbea66d3643e21ad47eb31a8104674b6ade1951fe0be674d68c571162af56e9e816edd59f1fd12ed42a8b25ded2de8c6658b5a84e008b5578351814faa9d2e8f434760fa183b51ea7f4adc1245ef339e9957880ec5632fe655bb29cdefc124572813e08e8ab2ccb2398c9b8e4c12dc1ad896b18bcc3bed7843abfbefb66401a2f759c3f3e67f9ce3e3df6882511bfd762dd1cddb0250957e79cc735284a874636d8dbfa7760aa6e4111602e52709879c6d9bf6bccdaeecef613bbcecaef887202f9e89b5e11830dad2b6f9d71b8a555a6ea28ebbcb6fd0cca141337e26d57f0e7835ffbd375904c860ea4c37812adb43b0e2b5242b52dc00000000000000000000000000dff5628cb7f7a9f32b4f966d2ecefb025b320f7d14d748384c35f47411a2538384dc26bae4c11df896941fef9ec3b902480546c883c0e434709efc459d91fc443dc1ed7dc5c67646ef8439711164c6b130c8804aa7aa3083de2cda07e05c792abd2aa60f1e8f11decfc65a103288adcf1d3463f009e6739aff83860b62a89e4ca41a625a4af50ae3c496319586752555301a2be5d27183362cf6468873b52d06e7d1aa7c950d34795e9bd9429d8b78ff8c8551f5fb4ddeff64ea58fc00d322d05c67880000"]) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, {}, 0x0, {}, 0x73f, 0x2, 0x20, 0x1, "65b1f037f3d7d047c53723d0fecb97ca3e612c0c0196a26c857cb0ea1f082b35075247f3a37e2c1675c47e6f9936a75f5f36c08b1836e14a2e0416bb1d00", "0d6211a6ea2c657793c9465f43bef3537a32c88172ed4f000000000000000200", [0x69, 0x6]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(0xffffffffffffffff, 0x0, 0xe65, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') pread64(r3, &(0x7f0000001100)=""/4095, 0xae3, 0x6800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000280)=@IORING_OP_OPENAT2={0x1c, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000240)='./file0\x00'}, 0x10004) faccessat2(r2, 0x0, 0x80, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000140)={0x0, 0x3, 0xecf4}) [ 131.528128] audit: type=1326 audit(1699117362.180:18): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4466 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff4aab78b19 code=0x7ffc0000 17:02:42 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) statx(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x2c80, 0x4, 0x0) chown(0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x46842, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r2, 0x0) creat(&(0x7f0000000200)='./file0/file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000380)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) io_destroy(0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file1\x00'}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x882c2, 0x0) io_uring_enter(0xffffffffffffffff, 0x76d3, 0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000240)) 17:02:42 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @none}, 0xe) listen(r0, 0x0) shutdown(r0, 0x1) 17:02:42 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x3f, 0x9, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x401}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) [ 131.614734] Restarting kernel threads ... done. 17:02:42 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @none}, 0xe) listen(r0, 0x0) shutdown(r0, 0x1) 17:02:42 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) statx(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x2c80, 0x4, 0x0) chown(0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x46842, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r2, 0x0) creat(&(0x7f0000000200)='./file0/file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000380)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) io_destroy(0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file1\x00'}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x882c2, 0x0) io_uring_enter(0xffffffffffffffff, 0x76d3, 0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000240)) [ 132.477924] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 17:02:43 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) statx(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x2c80, 0x4, 0x0) chown(0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x46842, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r2, 0x0) creat(&(0x7f0000000200)='./file0/file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000380)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) io_destroy(0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file1\x00'}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x882c2, 0x0) io_uring_enter(0xffffffffffffffff, 0x76d3, 0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000240)) 17:02:43 executing program 4: mmap$usbmon(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x110, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x6000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10bf42, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c00, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, {}, 0x0, {}, 0x73f, 0x2, 0x20, 0x1, "65b1f037f3d7d047c53723d0fecb97ca3e612c0c0196a26c857cb0ea1f082b35075247f3a37e2c1675c47e6f9936a75f5f36c08b1836e14a2e0416bb1d00", "0d6211a6ea2c657793c9465f43bef3537a32c88172ed4f000000000000000200", [0x69, 0x6]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(0xffffffffffffffff, 0x0, 0xe65, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') pread64(r3, &(0x7f0000001100)=""/4095, 0xae3, 0x6800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000280)=@IORING_OP_OPENAT2={0x1c, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000240)='./file0\x00'}, 0x10004) faccessat2(r2, 0x0, 0x80, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000140)={0x0, 0x3, 0xecf4}) 17:02:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080), 0x4) 17:02:43 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @none}, 0xe) listen(r0, 0x0) shutdown(r0, 0x1) 17:02:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x3f, 0x9, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x401}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 17:02:43 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) statx(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x2c80, 0x4, 0x0) chown(0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x46842, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r2, 0x0) creat(&(0x7f0000000200)='./file0/file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000380)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) io_destroy(0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file1\x00'}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x882c2, 0x0) io_uring_enter(0xffffffffffffffff, 0x76d3, 0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000240)) 17:02:43 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) statx(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x2c80, 0x4, 0x0) chown(0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x46842, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r2, 0x0) creat(&(0x7f0000000200)='./file0/file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000380)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) io_destroy(0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file1\x00'}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x882c2, 0x0) io_uring_enter(0xffffffffffffffff, 0x76d3, 0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000240)) 17:02:43 executing program 0: mmap$usbmon(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x110, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x6000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10bf42, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c00, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, {}, 0x0, {}, 0x73f, 0x2, 0x20, 0x1, "65b1f037f3d7d047c53723d0fecb97ca3e612c0c0196a26c857cb0ea1f082b35075247f3a37e2c1675c47e6f9936a75f5f36c08b1836e14a2e0416bb1d00", "0d6211a6ea2c657793c9465f43bef3537a32c88172ed4f000000000000000200", [0x69, 0x6]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(0xffffffffffffffff, 0x0, 0xe65, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') pread64(r3, &(0x7f0000001100)=""/4095, 0xae3, 0x6800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000280)=@IORING_OP_OPENAT2={0x1c, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000240)='./file0\x00'}, 0x10004) faccessat2(r2, 0x0, 0x80, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000140)={0x0, 0x3, 0xecf4}) [ 132.517180] Restarting kernel threads ... done. 17:02:43 executing program 2: setresuid(0xee01, 0xffffffffffffffff, 0xee00) setfsuid(0x0) 17:02:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x3f, 0x9, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x401}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x22, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 17:02:43 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, 0x0, 0x1) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000480)={0x10, 0x0, 0x0, 0x80200058}, 0xc) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) [ 132.625335] Restarting kernel threads ... done. 17:02:43 executing program 2: r0 = syz_io_uring_setup(0x3ac4, &(0x7f00000002c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f00000001c0)=0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f0000000340)="c9", 0x1}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 17:02:43 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, 0x0, 0x1) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000480)={0x10, 0x0, 0x0, 0x80200058}, 0xc) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 17:02:43 executing program 4: mmap$usbmon(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x110, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x6000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10bf42, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c00, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, {}, 0x0, {}, 0x73f, 0x2, 0x20, 0x1, "65b1f037f3d7d047c53723d0fecb97ca3e612c0c0196a26c857cb0ea1f082b35075247f3a37e2c1675c47e6f9936a75f5f36c08b1836e14a2e0416bb1d00", "0d6211a6ea2c657793c9465f43bef3537a32c88172ed4f000000000000000200", [0x69, 0x6]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(0xffffffffffffffff, 0x0, 0xe65, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') pread64(r3, &(0x7f0000001100)=""/4095, 0xae3, 0x6800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000280)=@IORING_OP_OPENAT2={0x1c, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000240)='./file0\x00'}, 0x10004) faccessat2(r2, 0x0, 0x80, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000140)={0x0, 0x3, 0xecf4}) 17:02:43 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000008981b700"/18, @ANYRESHEX, @ANYBLOB=',Shdno=', @ANYRESHEX, @ANYBLOB=',cache=none,smackfsfloor=:,\x00']) fcntl$getown(0xffffffffffffffff, 0x9) chdir(&(0x7f0000000000)='./file1\x00') r2 = socket$inet(0x2, 0x3, 0x3) fcntl$addseals(r2, 0x409, 0x8) fsmount(r1, 0x0, 0x70) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) 17:02:43 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) statx(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x2c80, 0x4, 0x0) chown(0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x46842, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r2, 0x0) creat(&(0x7f0000000200)='./file0/file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000380)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) io_destroy(0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file1\x00'}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x882c2, 0x0) io_uring_enter(0xffffffffffffffff, 0x76d3, 0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000240)) 17:02:43 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) statx(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x2c80, 0x4, 0x0) chown(0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x46842, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r2, 0x0) creat(&(0x7f0000000200)='./file0/file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000380)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) io_destroy(0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file1\x00'}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x882c2, 0x0) io_uring_enter(0xffffffffffffffff, 0x76d3, 0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000240)) 17:02:43 executing program 2: r0 = syz_io_uring_setup(0x3ac4, &(0x7f00000002c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f00000001c0)=0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f0000000340)="c9", 0x1}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 17:02:43 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) statx(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x2c80, 0x4, 0x0) chown(0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x46842, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r2, 0x0) creat(&(0x7f0000000200)='./file0/file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000380)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) io_destroy(0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file1\x00'}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x882c2, 0x0) io_uring_enter(0xffffffffffffffff, 0x76d3, 0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000240)) 17:02:43 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, 0x0, 0x1) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000480)={0x10, 0x0, 0x0, 0x80200058}, 0xc) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 17:02:43 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000008981b700"/18, @ANYRESHEX, @ANYBLOB=',Shdno=', @ANYRESHEX, @ANYBLOB=',cache=none,smackfsfloor=:,\x00']) fcntl$getown(0xffffffffffffffff, 0x9) chdir(&(0x7f0000000000)='./file1\x00') r2 = socket$inet(0x2, 0x3, 0x3) fcntl$addseals(r2, 0x409, 0x8) fsmount(r1, 0x0, 0x70) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) 17:02:43 executing program 4: mmap$usbmon(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x110, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x6000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10bf42, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c00, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, {}, 0x0, {}, 0x73f, 0x2, 0x20, 0x1, "65b1f037f3d7d047c53723d0fecb97ca3e612c0c0196a26c857cb0ea1f082b35075247f3a37e2c1675c47e6f9936a75f5f36c08b1836e14a2e0416bb1d00", "0d6211a6ea2c657793c9465f43bef3537a32c88172ed4f000000000000000200", [0x69, 0x6]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(0xffffffffffffffff, 0x0, 0xe65, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') pread64(r3, &(0x7f0000001100)=""/4095, 0xae3, 0x6800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000280)=@IORING_OP_OPENAT2={0x1c, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000240)='./file0\x00'}, 0x10004) faccessat2(r2, 0x0, 0x80, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000140)={0x0, 0x3, 0xecf4}) 17:02:43 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000008981b700"/18, @ANYRESHEX, @ANYBLOB=',Shdno=', @ANYRESHEX, @ANYBLOB=',cache=none,smackfsfloor=:,\x00']) fcntl$getown(0xffffffffffffffff, 0x9) chdir(&(0x7f0000000000)='./file1\x00') r2 = socket$inet(0x2, 0x3, 0x3) fcntl$addseals(r2, 0x409, 0x8) fsmount(r1, 0x0, 0x70) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) 17:02:43 executing program 0: mmap$usbmon(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x110, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x6000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10bf42, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c00, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, {}, 0x0, {}, 0x73f, 0x2, 0x20, 0x1, "65b1f037f3d7d047c53723d0fecb97ca3e612c0c0196a26c857cb0ea1f082b35075247f3a37e2c1675c47e6f9936a75f5f36c08b1836e14a2e0416bb1d00", "0d6211a6ea2c657793c9465f43bef3537a32c88172ed4f000000000000000200", [0x69, 0x6]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(0xffffffffffffffff, 0x0, 0xe65, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') pread64(r3, &(0x7f0000001100)=""/4095, 0xae3, 0x6800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000280)=@IORING_OP_OPENAT2={0x1c, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000240)='./file0\x00'}, 0x10004) faccessat2(r2, 0x0, 0x80, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000140)={0x0, 0x3, 0xecf4}) 17:02:43 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, 0x0, 0x1) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000480)={0x10, 0x0, 0x0, 0x80200058}, 0xc) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 17:02:43 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000008981b700"/18, @ANYRESHEX, @ANYBLOB=',Shdno=', @ANYRESHEX, @ANYBLOB=',cache=none,smackfsfloor=:,\x00']) fcntl$getown(0xffffffffffffffff, 0x9) chdir(&(0x7f0000000000)='./file1\x00') r2 = socket$inet(0x2, 0x3, 0x3) fcntl$addseals(r2, 0x409, 0x8) fsmount(r1, 0x0, 0x70) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) 17:02:43 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000008981b700"/18, @ANYRESHEX, @ANYBLOB=',Shdno=', @ANYRESHEX, @ANYBLOB=',cache=none,smackfsfloor=:,\x00']) fcntl$getown(0xffffffffffffffff, 0x9) chdir(&(0x7f0000000000)='./file1\x00') r2 = socket$inet(0x2, 0x3, 0x3) fcntl$addseals(r2, 0x409, 0x8) fsmount(r1, 0x0, 0x70) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) 17:02:43 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000008981b700"/18, @ANYRESHEX, @ANYBLOB=',Shdno=', @ANYRESHEX, @ANYBLOB=',cache=none,smackfsfloor=:,\x00']) fcntl$getown(0xffffffffffffffff, 0x9) chdir(&(0x7f0000000000)='./file1\x00') r2 = socket$inet(0x2, 0x3, 0x3) fcntl$addseals(r2, 0x409, 0x8) fsmount(r1, 0x0, 0x70) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) 17:02:44 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000008981b700"/18, @ANYRESHEX, @ANYBLOB=',Shdno=', @ANYRESHEX, @ANYBLOB=',cache=none,smackfsfloor=:,\x00']) fcntl$getown(0xffffffffffffffff, 0x9) chdir(&(0x7f0000000000)='./file1\x00') r2 = socket$inet(0x2, 0x3, 0x3) fcntl$addseals(r2, 0x409, 0x8) fsmount(r1, 0x0, 0x70) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) 17:02:44 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000008981b700"/18, @ANYRESHEX, @ANYBLOB=',Shdno=', @ANYRESHEX, @ANYBLOB=',cache=none,smackfsfloor=:,\x00']) fcntl$getown(0xffffffffffffffff, 0x9) chdir(&(0x7f0000000000)='./file1\x00') r2 = socket$inet(0x2, 0x3, 0x3) fcntl$addseals(r2, 0x409, 0x8) fsmount(r1, 0x0, 0x70) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) 17:02:44 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffdffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r0 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r0, 0x0, 0x0, 0x400004) 17:02:44 executing program 0: mmap$usbmon(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x110, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x6000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10bf42, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c00, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000440)=ANY=[@ANYBLOB="0309000000000000000000eda577b74cf8c13c7ff04266e723a45091714b17c77fa0831f177b51fc819559a2eceea3893d94020bfc32e6f150be1df02846c27c63f23e6e07f6cf2af9fbe8212768ba373069b0c94a3b5d19178e98ac005e175953aaa4154ecaab6b328af6750291727132834c2c6d0fdcd98ebbea66d3643e21ad47eb31a8104674b6ade1951fe0be674d68c571162af56e9e816edd59f1fd12ed42a8b25ded2de8c6658b5a84e008b5578351814faa9d2e8f434760fa183b51ea7f4adc1245ef339e9957880ec5632fe655bb29cdefc124572813e08e8ab2ccb2398c9b8e4c12dc1ad896b18bcc3bed7843abfbefb66401a2f759c3f3e67f9ce3e3df6882511bfd762dd1cddb0250957e79cc735284a874636d8dbfa7760aa6e4111602e52709879c6d9bf6bccdaeecef613bbcecaef887202f9e89b5e11830dad2b6f9d71b8a555a6ea28ebbcb6fd0cca141337e26d57f0e7835ffbd375904c860ea4c37812adb43b0e2b5242b52dc00000000000000000000000000dff5628cb7f7a9f32b4f966d2ecefb025b320f7d14d748384c35f47411a2538384dc26bae4c11df896941fef9ec3b902480546c883c0e434709efc459d91fc443dc1ed7dc5c67646ef8439711164c6b130c8804aa7aa3083de2cda07e05c792abd2aa60f1e8f11decfc65a103288adcf1d3463f009e6739aff83860b62a89e4ca41a625a4af50ae3c496319586752555301a2be5d27183362cf6468873b52d06e7d1aa7c950d34795e9bd9429d8b78ff8c8551f5fb4ddeff64ea58fc00d322d05c67880000"]) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, {}, 0x0, {}, 0x73f, 0x2, 0x20, 0x1, "65b1f037f3d7d047c53723d0fecb97ca3e612c0c0196a26c857cb0ea1f082b35075247f3a37e2c1675c47e6f9936a75f5f36c08b1836e14a2e0416bb1d00", "0d6211a6ea2c657793c9465f43bef3537a32c88172ed4f000000000000000200", [0x69, 0x6]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(0xffffffffffffffff, 0x0, 0xe65, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') pread64(r3, &(0x7f0000001100)=""/4095, 0xae3, 0x6800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000280)=@IORING_OP_OPENAT2={0x1c, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000240)='./file0\x00'}, 0x10004) faccessat2(r2, 0x0, 0x80, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000140)={0x0, 0x3, 0xecf4}) 17:02:44 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) statx(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x2c80, 0x4, 0x0) chown(0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x46842, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r2, 0x0) creat(&(0x7f0000000200)='./file0/file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000380)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) io_destroy(0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file1\x00'}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x882c2, 0x0) io_uring_enter(0xffffffffffffffff, 0x76d3, 0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000240)) 17:02:44 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0xffffffffffffff65, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 17:02:44 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000008981b700"/18, @ANYRESHEX, @ANYBLOB=',Shdno=', @ANYRESHEX, @ANYBLOB=',cache=none,smackfsfloor=:,\x00']) fcntl$getown(0xffffffffffffffff, 0x9) chdir(&(0x7f0000000000)='./file1\x00') r2 = socket$inet(0x2, 0x3, 0x3) fcntl$addseals(r2, 0x409, 0x8) fsmount(r1, 0x0, 0x70) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) 17:02:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xb, &(0x7f0000000000)=0xba, 0x4) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, 0x0, 0x4, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 17:02:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f00000002c0)=@updsa={0x148, 0x10, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xffffffff, 0x32}, @in6=@private0, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x58, 0x2, {{'cbc(aes)\x00'}, 0x80, "0f24aa6b13c2e62f3556b1cbcfeac2a0"}}]}, 0x148}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) [ 133.736914] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4598 comm=syz-executor.4 17:02:44 executing program 2: r0 = syz_io_uring_setup(0x3ac4, &(0x7f00000002c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f00000001c0)=0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f0000000340)="c9", 0x1}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 17:02:44 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000008981b700"/18, @ANYRESHEX, @ANYBLOB=',Shdno=', @ANYRESHEX, @ANYBLOB=',cache=none,smackfsfloor=:,\x00']) fcntl$getown(0xffffffffffffffff, 0x9) chdir(&(0x7f0000000000)='./file1\x00') r2 = socket$inet(0x2, 0x3, 0x3) fcntl$addseals(r2, 0x409, 0x8) fsmount(r1, 0x0, 0x70) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) 17:02:44 executing program 7: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f0000000840)='./file0/../file0\x00', 0x200) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) [ 133.750442] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4610 comm=syz-executor.4 17:02:44 executing program 4: r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9, 0x80071, 0xffffffffffffffff, 0x8000000) syz_io_uring_complete(r0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x15) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) 17:02:44 executing program 7: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f0000000840)='./file0/../file0\x00', 0x200) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) [ 133.866957] blktrace: Concurrent blktraces are not allowed on loop2 17:02:44 executing program 7: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f0000000840)='./file0/../file0\x00', 0x200) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 17:02:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x20, 0x69, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @ipv4=@private}]}]}, 0x20}}, 0x0) 17:02:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup(r1) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x2, 0x301, 0x0, 0x0, {0x5, 0x0, 0x4}, [@CTA_EXPECT_ZONE={0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) r2 = dup(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r5) sendmsg$IEEE802154_LLSEC_DEL_DEV(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)={0x20, r6, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5}, 0x1c) sendmsg$AUDIT_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x3e8, 0x10, 0x70bd28, 0x25dfdbfd, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x4004010}, 0x800) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r3, {0x10001}}, './file0\x00'}) dup(r2) 17:02:44 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000340)={0x0, 0x18, 0x0, 0x9, 0x0, 0x0, 0x0, 0x62, 0x1}) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r1, 0xfffffffffffffffc, 0x9, 0x0) memfd_create(&(0x7f00000002c0)='sessionid\x00', 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000100)={0x38, 0x22, 0x15, 0x20010, 0x0, 0xc, 0x2, 0x95, 0x1}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f0000000240)) 17:02:44 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)=ANY=[@ANYBLOB]) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000240)={0x3ff, 0x0, 0x0, 0x0, 0x0, "0489fdc1843fc745ea52a5fff7962e807836db"}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) 17:02:44 executing program 7: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f0000000840)='./file0/../file0\x00', 0x200) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 17:02:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0), 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r1 = dup2(r0, r0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000000)=0x3, 0x4) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@broadcast, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x11, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {0x0, 0x4e20, 0x9, 0x0, @opaque='|'}}}}}, 0x0) 17:02:45 executing program 2: r0 = syz_io_uring_setup(0x3ac4, &(0x7f00000002c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f00000001c0)=0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f0000000340)="c9", 0x1}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 17:02:45 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)=ANY=[@ANYBLOB]) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000240)={0x3ff, 0x0, 0x0, 0x0, 0x0, "0489fdc1843fc745ea52a5fff7962e807836db"}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) 17:02:45 executing program 7: rename(&(0x7f0000000080)='.\x00', &(0x7f0000000040)='./mnt\x00') 17:02:45 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000340)={0x0, 0x18, 0x0, 0x9, 0x0, 0x0, 0x0, 0x62, 0x1}) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r1, 0xfffffffffffffffc, 0x9, 0x0) memfd_create(&(0x7f00000002c0)='sessionid\x00', 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000100)={0x38, 0x22, 0x15, 0x20010, 0x0, 0xc, 0x2, 0x95, 0x1}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f0000000240)) 17:02:45 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000340)={0x0, 0x18, 0x0, 0x9, 0x0, 0x0, 0x0, 0x62, 0x1}) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r1, 0xfffffffffffffffc, 0x9, 0x0) memfd_create(&(0x7f00000002c0)='sessionid\x00', 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000100)={0x38, 0x22, 0x15, 0x20010, 0x0, 0xc, 0x2, 0x95, 0x1}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f0000000240)) 17:02:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup(r1) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x2, 0x301, 0x0, 0x0, {0x5, 0x0, 0x4}, [@CTA_EXPECT_ZONE={0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) r2 = dup(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r5) sendmsg$IEEE802154_LLSEC_DEL_DEV(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)={0x20, r6, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5}, 0x1c) sendmsg$AUDIT_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x3e8, 0x10, 0x70bd28, 0x25dfdbfd, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x4004010}, 0x800) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r3, {0x10001}}, './file0\x00'}) dup(r2) 17:02:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000000c0)={0x14, 0x12, 0x69844ea0a6ddcd11, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) 17:02:45 executing program 7: syz_mount_image$nfs(&(0x7f0000001940), &(0x7f0000001980)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001d00)={[], [{@smackfsdef}]}) 17:02:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/cgroup\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/cgroup\x00') 17:02:45 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)=ANY=[@ANYBLOB]) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000240)={0x3ff, 0x0, 0x0, 0x0, 0x0, "0489fdc1843fc745ea52a5fff7962e807836db"}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) 17:02:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup(r1) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x2, 0x301, 0x0, 0x0, {0x5, 0x0, 0x4}, [@CTA_EXPECT_ZONE={0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) r2 = dup(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r5) sendmsg$IEEE802154_LLSEC_DEL_DEV(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)={0x20, r6, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5}, 0x1c) sendmsg$AUDIT_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x3e8, 0x10, 0x70bd28, 0x25dfdbfd, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x4004010}, 0x800) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r3, {0x10001}}, './file0\x00'}) dup(r2) [ 134.807362] nfs: Unknown parameter 'smackfsdef' [ 134.812342] nfs: Unknown parameter 'smackfsdef' 17:02:46 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x5, 0x7, 0x7}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000001380)="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", 0x4b3}], 0x1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x4, 0x627, 0xffff}) r1 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r2}}, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000100)={0x5, 0x91f7, 0xf15f}) chdir(&(0x7f00000000c0)='./file0\x00') write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, 0x0, 0x4004) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x4, 0x81, 0xc1, 0x0, 0x6, 0x40, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff, 0x2}, 0x40, 0xda77, 0x3ff, 0x4, 0x9ebb, 0x5, 0x8001, 0x0, 0x7f, 0x0, 0xfff}, 0x0, 0x7, r4, 0x2) 17:02:46 executing program 1: syz_io_uring_setup(0x2, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x5, 0x11d, 0x0, 0x1, [{0x4}]}]}, 0x24}}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000000080), 0x4) 17:02:46 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000000)) 17:02:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup(r1) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x2, 0x301, 0x0, 0x0, {0x5, 0x0, 0x4}, [@CTA_EXPECT_ZONE={0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) r2 = dup(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r5) sendmsg$IEEE802154_LLSEC_DEL_DEV(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)={0x20, r6, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5}, 0x1c) sendmsg$AUDIT_GET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x3e8, 0x10, 0x70bd28, 0x25dfdbfd, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x4004010}, 0x800) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r3, {0x10001}}, './file0\x00'}) dup(r2) 17:02:46 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)=ANY=[@ANYBLOB]) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000240)={0x3ff, 0x0, 0x0, 0x0, 0x0, "0489fdc1843fc745ea52a5fff7962e807836db"}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) 17:02:46 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000340)={0x0, 0x18, 0x0, 0x9, 0x0, 0x0, 0x0, 0x62, 0x1}) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r1, 0xfffffffffffffffc, 0x9, 0x0) memfd_create(&(0x7f00000002c0)='sessionid\x00', 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000100)={0x38, 0x22, 0x15, 0x20010, 0x0, 0xc, 0x2, 0x95, 0x1}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f0000000240)) 17:02:46 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000340)={0x0, 0x18, 0x0, 0x9, 0x0, 0x0, 0x0, 0x62, 0x1}) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r1, 0xfffffffffffffffc, 0x9, 0x0) memfd_create(&(0x7f00000002c0)='sessionid\x00', 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000100)={0x38, 0x22, 0x15, 0x20010, 0x0, 0xc, 0x2, 0x95, 0x1}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f0000000240)) 17:02:46 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000340)={0x0, 0x18, 0x0, 0x9, 0x0, 0x0, 0x0, 0x62, 0x1}) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r1, 0xfffffffffffffffc, 0x9, 0x0) memfd_create(&(0x7f00000002c0)='sessionid\x00', 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000100)={0x38, 0x22, 0x15, 0x20010, 0x0, 0xc, 0x2, 0x95, 0x1}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f0000000240)) 17:02:46 executing program 1: r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='fdinfo/3\x00') r2 = dup2(r0, r0) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000000)=[0xffffffffffffffff], 0x1) pread64(r1, &(0x7f0000000040)=""/55, 0x37, 0x0) 17:02:46 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x5, 0x7, 0x7}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000001380)="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", 0x4b3}], 0x1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x4, 0x627, 0xffff}) r1 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r2}}, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000100)={0x5, 0x91f7, 0xf15f}) chdir(&(0x7f00000000c0)='./file0\x00') write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, 0x0, 0x4004) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x4, 0x81, 0xc1, 0x0, 0x6, 0x40, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff, 0x2}, 0x40, 0xda77, 0x3ff, 0x4, 0x9ebb, 0x5, 0x8001, 0x0, 0x7f, 0x0, 0xfff}, 0x0, 0x7, r4, 0x2) 17:02:46 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000340)={0x0, 0x18, 0x0, 0x9, 0x0, 0x0, 0x0, 0x62, 0x1}) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r1, 0xfffffffffffffffc, 0x9, 0x0) memfd_create(&(0x7f00000002c0)='sessionid\x00', 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000100)={0x38, 0x22, 0x15, 0x20010, 0x0, 0xc, 0x2, 0x95, 0x1}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f0000000240)) 17:02:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB]) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sysvipc/sem\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r5 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x40200, 0x0) flistxattr(r5, &(0x7f00000002c0)=""/251, 0xfb) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) 17:02:46 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000)='\x00', 0x0) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f00000000c0)='D', 0x1}], 0x1, 0x7f, 0x0, 0x0) lseek(r0, 0x0, 0x4) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) geteuid() readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1) 17:02:46 executing program 1: r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='fdinfo/3\x00') r2 = dup2(r0, r0) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000000)=[0xffffffffffffffff], 0x1) pread64(r1, &(0x7f0000000040)=""/55, 0x37, 0x0) 17:02:46 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000000)) 17:02:46 executing program 5: socket(0x1f, 0x0, 0x0) 17:02:47 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x5, 0x7, 0x7}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000001380)="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", 0x4b3}], 0x1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x4, 0x627, 0xffff}) r1 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r2}}, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000100)={0x5, 0x91f7, 0xf15f}) chdir(&(0x7f00000000c0)='./file0\x00') write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, 0x0, 0x4004) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x4, 0x81, 0xc1, 0x0, 0x6, 0x40, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff, 0x2}, 0x40, 0xda77, 0x3ff, 0x4, 0x9ebb, 0x5, 0x8001, 0x0, 0x7f, 0x0, 0xfff}, 0x0, 0x7, r4, 0x2) 17:02:47 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000480)='mountinfo\x00') prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00') 17:02:47 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000000)) 17:02:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) setsockopt$inet6_tcp_int(r0, 0x6, 0xc, &(0x7f0000000240)=0x6, 0x4) 17:02:47 executing program 1: r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='fdinfo/3\x00') r2 = dup2(r0, r0) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000000)=[0xffffffffffffffff], 0x1) pread64(r1, &(0x7f0000000040)=""/55, 0x37, 0x0) 17:02:47 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000000)) [ 136.361219] kauditd_printk_skb: 30 callbacks suppressed [ 136.361234] audit: type=1326 audit(1699117367.081:49): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4736 comm="syz-executor.5" exe="/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fa68c524b19 code=0x0 [ 137.187219] audit: type=1326 audit(1699117367.907:50): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4736 comm="syz-executor.5" exe="/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fa68c524b19 code=0x0 17:02:47 executing program 1: r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='fdinfo/3\x00') r2 = dup2(r0, r0) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000000)=[0xffffffffffffffff], 0x1) pread64(r1, &(0x7f0000000040)=""/55, 0x37, 0x0) 17:02:47 executing program 6: getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488404cabd15439f170e429dd5057d7d5db566fc9e4cab1128bce328ef54be2ac02ea82a613a077c2508b07638c2da855795a8523c7986a4979fc9300627bae481812a27b8f8d511a4dfbfc9680cf5c993b89f8efb3de820ef8e9bd306955000037976789cf995521a65b9192b2dde0498242f3042690688050b620e188a301b717bf204eb12a7fcd85332358a4e595f838fbe8e29ca7b0315e9f9e74ba8f08031384702d819754"], &(0x7f0000000340)=""/106, 0x6a) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1cf7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff, 0x8}, 0x2030, 0x0, 0x1000, 0x7, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x20}}, 0x0) pread64(0xffffffffffffffff, &(0x7f00000003c0)=""/195, 0xc3, 0x5) r0 = openat(0xffffffffffffff9c, 0x0, 0x60000, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x4, 0x0, r0}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) r2 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x100800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfdef) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000280)='./file0\x00', 0xffffffffffffffff) 17:02:47 executing program 7: syz_emit_ethernet(0x2a, &(0x7f0000000140)={@local, @link_local, @void, {@ipv4={0x8864, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x57, 0x0, 0x1, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}, @info_request}}}}, 0x0) 17:02:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB]) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sysvipc/sem\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r5 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x40200, 0x0) flistxattr(r5, &(0x7f00000002c0)=""/251, 0xfb) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) 17:02:47 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x5, 0x7, 0x7}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000001380)="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", 0x4b3}], 0x1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x4, 0x627, 0xffff}) r1 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r2}}, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000100)={0x5, 0x91f7, 0xf15f}) chdir(&(0x7f00000000c0)='./file0\x00') write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, 0x0, 0x4004) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x4, 0x81, 0xc1, 0x0, 0x6, 0x40, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff, 0x2}, 0x40, 0xda77, 0x3ff, 0x4, 0x9ebb, 0x5, 0x8001, 0x0, 0x7f, 0x0, 0xfff}, 0x0, 0x7, r4, 0x2) 17:02:47 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x5, 0x7, 0x7}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000001380)="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", 0x4b3}], 0x1) socket$inet_udp(0x2, 0x2, 0x0) ioct VM DIAGNOSIS: 17:02:42 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=ffffed1003058e69 RCX=0000000000000000 RDX=0000000000000000 RSI=0000000000000008 RDI=ffff88806ce3c128 RBP=0000000000000000 RSP=ffff8880182c7338 R8 =0000000000000000 R9 =ffffffff856725cf R10=fffffbfff0ace4b9 R11=0000000000000001 R12=0000000000000002 R13=0000000000000000 R14=ffffffff84ff8560 R15=0000000000000000 RIP=ffffffff8127251c RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2d12e000 CR3=0000000017704000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00ff000000000000ff00000000000000 XMM01=00010000000000000100000000000000 XMM02=7463656a6e695f31313230385f7a7973 XMM03=ffffffff81310534ffffffff8130f6ab XMM04=ffffffff81310654ffffffff81310534 XMM05=ffffffff8130f6abffffffff8130f57b XMM06=ffffffff8130f573ffffffff8130f51a XMM07=ffffffff812fb1f1ffffffff81088bec XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=000000000000006e RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822ca1d1 RDI=ffffffff879e81e0 RBP=ffffffff879e81a0 RSP=ffff88804669f2e8 R8 =0000000000000001 R9 =0000000000000003 R10=0000000000000000 R11=0000000000000001 R12=000000000000006e R13=000000000000006e R14=ffffffff879e81a0 R15=dffffc0000000000 RIP=ffffffff822ca228 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fa689a9a700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000557d2ef39a50 CR3=0000000045b60000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000