Warning: Permanently added '[localhost]:28594' (ECDSA) to the list of known hosts.
2022/09/14 11:37:28 fuzzer started
2022/09/14 11:37:28 dialing manager at localhost:33849
syzkaller login: [ 40.361476] cgroup: Unknown subsys name 'net'
[ 40.466883] cgroup: Unknown subsys name 'rlimit'
2022/09/14 11:37:43 syscalls: 2215
2022/09/14 11:37:43 code coverage: enabled
2022/09/14 11:37:43 comparison tracing: enabled
2022/09/14 11:37:43 extra coverage: enabled
2022/09/14 11:37:43 setuid sandbox: enabled
2022/09/14 11:37:43 namespace sandbox: enabled
2022/09/14 11:37:43 Android sandbox: enabled
2022/09/14 11:37:43 fault injection: enabled
2022/09/14 11:37:43 leak checking: enabled
2022/09/14 11:37:43 net packet injection: enabled
2022/09/14 11:37:43 net device setup: enabled
2022/09/14 11:37:43 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist
2022/09/14 11:37:43 devlink PCI setup: PCI device 0000:00:10.0 is not available
2022/09/14 11:37:43 USB emulation: enabled
2022/09/14 11:37:43 hci packet injection: enabled
2022/09/14 11:37:43 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220914 )
2022/09/14 11:37:43 802.15.4 emulation: enabled
2022/09/14 11:37:43 fetching corpus: 0, signal 0/2000 (executing program)
2022/09/14 11:37:43 fetching corpus: 50, signal 29413/32677 (executing program)
2022/09/14 11:37:43 fetching corpus: 100, signal 46923/51126 (executing program)
2022/09/14 11:37:43 fetching corpus: 150, signal 53412/58663 (executing program)
2022/09/14 11:37:43 fetching corpus: 200, signal 62934/68798 (executing program)
2022/09/14 11:37:44 fetching corpus: 250, signal 68475/75022 (executing program)
2022/09/14 11:37:44 fetching corpus: 300, signal 73972/81098 (executing program)
2022/09/14 11:37:44 fetching corpus: 350, signal 79013/86607 (executing program)
2022/09/14 11:37:44 fetching corpus: 400, signal 81820/90018 (executing program)
2022/09/14 11:37:44 fetching corpus: 450, signal 89301/97391 (executing program)
2022/09/14 11:37:45 fetching corpus: 500, signal 93372/101667 (executing program)
2022/09/14 11:37:45 fetching corpus: 550, signal 97425/105953 (executing program)
2022/09/14 11:37:45 fetching corpus: 600, signal 102191/110668 (executing program)
2022/09/14 11:37:45 fetching corpus: 650, signal 105098/113673 (executing program)
2022/09/14 11:37:45 fetching corpus: 700, signal 107334/116079 (executing program)
2022/09/14 11:37:45 fetching corpus: 750, signal 109741/118510 (executing program)
2022/09/14 11:37:46 fetching corpus: 799, signal 113286/121773 (executing program)
2022/09/14 11:37:46 fetching corpus: 849, signal 116345/124567 (executing program)
2022/09/14 11:37:46 fetching corpus: 899, signal 118452/126568 (executing program)
2022/09/14 11:37:46 fetching corpus: 949, signal 120514/128517 (executing program)
2022/09/14 11:37:46 fetching corpus: 999, signal 123384/131026 (executing program)
2022/09/14 11:37:46 fetching corpus: 1049, signal 125961/133160 (executing program)
2022/09/14 11:37:47 fetching corpus: 1099, signal 128057/134969 (executing program)
2022/09/14 11:37:47 fetching corpus: 1149, signal 129874/136674 (executing program)
2022/09/14 11:37:47 fetching corpus: 1199, signal 132475/138647 (executing program)
2022/09/14 11:37:47 fetching corpus: 1249, signal 133714/139673 (executing program)
2022/09/14 11:37:47 fetching corpus: 1299, signal 134973/140641 (executing program)
2022/09/14 11:37:47 fetching corpus: 1349, signal 136899/142171 (executing program)
2022/09/14 11:37:48 fetching corpus: 1399, signal 138845/143507 (executing program)
2022/09/14 11:37:48 fetching corpus: 1449, signal 139884/144252 (executing program)
2022/09/14 11:37:48 fetching corpus: 1499, signal 141310/145134 (executing program)
2022/09/14 11:37:48 fetching corpus: 1549, signal 143378/146454 (executing program)
2022/09/14 11:37:48 fetching corpus: 1599, signal 144751/147289 (executing program)
2022/09/14 11:37:48 fetching corpus: 1649, signal 146024/148175 (executing program)
2022/09/14 11:37:48 fetching corpus: 1650, signal 146040/148247 (executing program)
2022/09/14 11:37:48 fetching corpus: 1650, signal 146040/148315 (executing program)
2022/09/14 11:37:48 fetching corpus: 1650, signal 146040/148367 (executing program)
2022/09/14 11:37:48 fetching corpus: 1650, signal 146040/148427 (executing program)
2022/09/14 11:37:48 fetching corpus: 1650, signal 146040/148481 (executing program)
2022/09/14 11:37:48 fetching corpus: 1650, signal 146040/148540 (executing program)
2022/09/14 11:37:48 fetching corpus: 1650, signal 146040/148604 (executing program)
2022/09/14 11:37:48 fetching corpus: 1650, signal 146040/148661 (executing program)
2022/09/14 11:37:48 fetching corpus: 1650, signal 146040/148733 (executing program)
2022/09/14 11:37:48 fetching corpus: 1650, signal 146040/148792 (executing program)
2022/09/14 11:37:48 fetching corpus: 1650, signal 146040/148852 (executing program)
2022/09/14 11:37:49 fetching corpus: 1650, signal 146040/148918 (executing program)
2022/09/14 11:37:49 fetching corpus: 1650, signal 146040/148988 (executing program)
2022/09/14 11:37:49 fetching corpus: 1650, signal 146040/149061 (executing program)
2022/09/14 11:37:49 fetching corpus: 1650, signal 146040/149121 (executing program)
2022/09/14 11:37:49 fetching corpus: 1650, signal 146040/149191 (executing program)
2022/09/14 11:37:49 fetching corpus: 1650, signal 146040/149246 (executing program)
2022/09/14 11:37:49 fetching corpus: 1650, signal 146040/149305 (executing program)
2022/09/14 11:37:49 fetching corpus: 1650, signal 146040/149373 (executing program)
2022/09/14 11:37:49 fetching corpus: 1650, signal 146040/149422 (executing program)
2022/09/14 11:37:49 fetching corpus: 1650, signal 146040/149478 (executing program)
2022/09/14 11:37:49 fetching corpus: 1650, signal 146040/149535 (executing program)
2022/09/14 11:37:49 fetching corpus: 1650, signal 146040/149591 (executing program)
2022/09/14 11:37:49 fetching corpus: 1650, signal 146040/149656 (executing program)
2022/09/14 11:37:49 fetching corpus: 1650, signal 146040/149725 (executing program)
2022/09/14 11:37:49 fetching corpus: 1650, signal 146040/149796 (executing program)
2022/09/14 11:37:49 fetching corpus: 1650, signal 146040/149870 (executing program)
2022/09/14 11:37:49 fetching corpus: 1650, signal 146040/149926 (executing program)
2022/09/14 11:37:49 fetching corpus: 1650, signal 146040/149984 (executing program)
2022/09/14 11:37:49 fetching corpus: 1650, signal 146040/150038 (executing program)
2022/09/14 11:37:49 fetching corpus: 1650, signal 146040/150099 (executing program)
2022/09/14 11:37:49 fetching corpus: 1650, signal 146040/150179 (executing program)
2022/09/14 11:37:49 fetching corpus: 1650, signal 146040/150242 (executing program)
2022/09/14 11:37:49 fetching corpus: 1650, signal 146040/150284 (executing program)
2022/09/14 11:37:49 fetching corpus: 1650, signal 146040/150284 (executing program)
2022/09/14 11:37:52 starting 8 fuzzer processes
11:37:52 executing program 0:
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0)
ioctl$TIOCMGET(r0, 0x5415, 0x0)
11:37:52 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c20000120300000000000000000000000000000000000073797a6b", 0x7c, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012700)}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x4880}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f0000000000000100", 0x1c, 0x4c00}, {0x0}, {0x0}, {&(0x7f0000013400)}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}], 0x0, &(0x7f0000014a00))
11:37:52 executing program 2:
r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201)
ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201)
11:37:52 executing program 3:
r0 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88)
setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2d, &(0x7f0000000500)={0x3, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88)
[ 63.397545] audit: type=1400 audit(1663155472.295:6): avc: denied { execmem } for pid=286 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1
11:37:52 executing program 4:
mincore(&(0x7f0000ffc000/0x1000)=nil, 0x7ffffffff000, &(0x7f0000000000)=""/26)
11:37:52 executing program 5:
r0 = socket$packet(0x11, 0x3, 0x300)
getpeername(r0, 0x0, 0x0)
11:37:52 executing program 6:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x40002020)
11:37:52 executing program 7:
r0 = socket$inet6(0xa, 0x1, 0x0)
getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, 0x0, &(0x7f00000000c0)=0x54)
[ 64.746275] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1
[ 64.748633] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9
[ 64.750535] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9
[ 64.752306] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[ 64.755239] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 64.757401] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4
[ 64.760540] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3
[ 64.761730] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 64.762972] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2
[ 64.768816] Bluetooth: hci1: HCI_REQ-0x0c1a
[ 64.774307] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 64.776069] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3
[ 64.802253] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[ 64.809806] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1
[ 64.812393] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9
[ 64.816399] Bluetooth: hci0: HCI_REQ-0x0c1a
[ 64.816742] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9
[ 64.826588] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4
[ 64.831595] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3
[ 64.832969] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2
[ 64.844232] Bluetooth: hci2: HCI_REQ-0x0c1a
[ 64.877609] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1
[ 64.884425] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1
[ 64.884918] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1
[ 64.888837] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9
[ 64.890162] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9
[ 64.892690] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9
[ 64.893977] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9
[ 64.904721] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4
[ 64.904793] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9
[ 64.905898] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4
[ 64.909735] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9
[ 64.918516] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3
[ 64.935112] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2
[ 64.935416] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1
[ 64.936719] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4
[ 64.942564] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3
[ 64.942779] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3
[ 64.943802] Bluetooth: hci4: HCI_REQ-0x0c1a
[ 64.945623] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2
[ 64.950816] Bluetooth: hci5: HCI_REQ-0x0c1a
[ 64.978718] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9
[ 64.979855] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2
[ 64.986475] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9
[ 64.998584] Bluetooth: hci7: HCI_REQ-0x0c1a
[ 65.018695] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4
[ 65.025594] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3
[ 65.030560] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2
[ 65.041444] Bluetooth: hci6: HCI_REQ-0x0c1a
[ 66.824448] Bluetooth: hci3: Opcode 0x c03 failed: -110
[ 66.826440] Bluetooth: hci0: command 0x0409 tx timeout
[ 66.827886] Bluetooth: hci1: command 0x0409 tx timeout
[ 66.889923] Bluetooth: hci2: command 0x0409 tx timeout
[ 67.016416] Bluetooth: hci4: command 0x0409 tx timeout
[ 67.017272] Bluetooth: hci5: command 0x0409 tx timeout
[ 67.080382] Bluetooth: hci7: command 0x0409 tx timeout
[ 67.081398] Bluetooth: hci6: command 0x0409 tx timeout
[ 68.872422] Bluetooth: hci1: command 0x041b tx timeout
[ 68.872954] Bluetooth: hci0: command 0x041b tx timeout
[ 68.936382] Bluetooth: hci2: command 0x041b tx timeout
[ 69.064458] Bluetooth: hci5: command 0x041b tx timeout
[ 69.065798] Bluetooth: hci4: command 0x041b tx timeout
[ 69.128422] Bluetooth: hci6: command 0x041b tx timeout
[ 69.129029] Bluetooth: hci7: command 0x041b tx timeout
[ 70.199693] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1
[ 70.206370] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9
[ 70.211991] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9
[ 70.215757] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4
[ 70.218018] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3
[ 70.221311] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2
[ 70.233915] Bluetooth: hci3: HCI_REQ-0x0c1a
[ 70.920486] Bluetooth: hci0: command 0x040f tx timeout
[ 70.922399] Bluetooth: hci1: command 0x040f tx timeout
[ 70.984412] Bluetooth: hci2: command 0x040f tx timeout
[ 71.112494] Bluetooth: hci4: command 0x040f tx timeout
[ 71.114220] Bluetooth: hci5: command 0x040f tx timeout
[ 71.176425] Bluetooth: hci7: command 0x040f tx timeout
[ 71.177255] Bluetooth: hci6: command 0x040f tx timeout
[ 72.264412] Bluetooth: hci3: command 0x0409 tx timeout
[ 72.968458] Bluetooth: hci1: command 0x0419 tx timeout
[ 72.970648] Bluetooth: hci0: command 0x0419 tx timeout
[ 73.032490] Bluetooth: hci2: command 0x0419 tx timeout
[ 73.160416] Bluetooth: hci5: command 0x0419 tx timeout
[ 73.161234] Bluetooth: hci4: command 0x0419 tx timeout
[ 73.224402] Bluetooth: hci6: command 0x0419 tx timeout
[ 73.225198] Bluetooth: hci7: command 0x0419 tx timeout
[ 74.312424] Bluetooth: hci3: command 0x041b tx timeout
[ 76.360376] Bluetooth: hci3: command 0x040f tx timeout
[ 78.408373] Bluetooth: hci3: command 0x0419 tx timeout
11:38:49 executing program 3:
r0 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88)
setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2d, &(0x7f0000000500)={0x3, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88)
11:38:49 executing program 3:
r0 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88)
setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2d, &(0x7f0000000500)={0x3, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88)
11:38:49 executing program 4:
mincore(&(0x7f0000ffc000/0x1000)=nil, 0x7ffffffff000, &(0x7f0000000000)=""/26)
11:38:49 executing program 3:
r0 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88)
setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2d, &(0x7f0000000500)={0x3, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88)
11:38:49 executing program 2:
r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201)
ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201)
11:38:49 executing program 4:
mincore(&(0x7f0000ffc000/0x1000)=nil, 0x7ffffffff000, &(0x7f0000000000)=""/26)
11:38:49 executing program 3:
r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201)
ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201)
11:38:49 executing program 2:
r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201)
ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201)
[ 120.738531] loop1: detected capacity change from 0 to 4096
[ 120.777874] EXT4-fs warning (device loop1): ext4_enable_quotas:6818: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix.
[ 120.785663] EXT4-fs (loop1): mount failed
[ 120.802125] loop1: detected capacity change from 0 to 4096
[ 120.827961] EXT4-fs warning (device loop1): ext4_enable_quotas:6818: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix.
[ 120.842547] EXT4-fs (loop1): mount failed
11:38:51 executing program 0:
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0)
ioctl$TIOCMGET(r0, 0x5415, 0x0)
11:38:51 executing program 4:
mincore(&(0x7f0000ffc000/0x1000)=nil, 0x7ffffffff000, &(0x7f0000000000)=""/26)
11:38:51 executing program 3:
r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201)
ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201)
11:38:51 executing program 2:
r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201)
ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201)
11:38:51 executing program 5:
r0 = socket$packet(0x11, 0x3, 0x300)
getpeername(r0, 0x0, 0x0)
11:38:51 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c20000120300000000000000000000000000000000000073797a6b", 0x7c, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012700)}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x4880}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f0000000000000100", 0x1c, 0x4c00}, {0x0}, {0x0}, {&(0x7f0000013400)}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}], 0x0, &(0x7f0000014a00))
11:38:51 executing program 6:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x40002020)
11:38:51 executing program 7:
r0 = socket$inet6(0xa, 0x1, 0x0)
getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, 0x0, &(0x7f00000000c0)=0x54)
[ 122.472564] loop1: detected capacity change from 0 to 4096
[ 122.501039] EXT4-fs warning (device loop1): ext4_enable_quotas:6818: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix.
[ 122.509517] EXT4-fs (loop1): mount failed
11:38:51 executing program 3:
r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201)
ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201)
11:38:51 executing program 4:
r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201)
ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201)
11:38:51 executing program 5:
r0 = socket$packet(0x11, 0x3, 0x300)
getpeername(r0, 0x0, 0x0)
11:38:51 executing program 2:
r0 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88)
setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2d, &(0x7f0000000500)={0x3, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88)
11:38:51 executing program 6:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x40002020)
11:38:51 executing program 7:
r0 = socket$inet6(0xa, 0x1, 0x0)
getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, 0x0, &(0x7f00000000c0)=0x54)
11:38:51 executing program 0:
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0)
ioctl$TIOCMGET(r0, 0x5415, 0x0)
11:38:51 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c20000120300000000000000000000000000000000000073797a6b", 0x7c, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012700)}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x4880}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f0000000000000100", 0x1c, 0x4c00}, {0x0}, {0x0}, {&(0x7f0000013400)}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}], 0x0, &(0x7f0000014a00))
11:38:51 executing program 6:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x40002020)
11:38:51 executing program 2:
r0 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88)
setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2d, &(0x7f0000000500)={0x3, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88)
11:38:51 executing program 7:
r0 = socket$inet6(0xa, 0x1, 0x0)
getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, 0x0, &(0x7f00000000c0)=0x54)
11:38:51 executing program 4:
r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201)
ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201)
11:38:51 executing program 5:
r0 = socket$packet(0x11, 0x3, 0x300)
getpeername(r0, 0x0, 0x0)
11:38:51 executing program 3:
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000300)={0x80000001, {{0x2, 0x4e22, @private=0xa010102}}}, 0x88)
r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0)
[ 122.757985] loop1: detected capacity change from 0 to 4096
[ 122.770038] audit: type=1400 audit(1663155531.667:7): avc: denied { open } for pid=4006 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1
[ 122.771540] audit: type=1400 audit(1663155531.668:8): avc: denied { kernel } for pid=4006 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1
[ 122.783639] EXT4-fs warning (device loop1): ext4_enable_quotas:6818: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix.
[ 122.792933] EXT4-fs (loop1): mount failed
[ 122.796631] ------------[ cut here ]------------
[ 122.796669]
[ 122.796675] ======================================================
[ 122.796682] WARNING: possible circular locking dependency detected
[ 122.796690] 6.0.0-rc5-next-20220914 #1 Not tainted
[ 122.796703] ------------------------------------------------------
[ 122.796709] syz-executor.3/4008 is trying to acquire lock:
[ 122.796722] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70
[ 122.796791]
[ 122.796791] but task is already holding lock:
[ 122.796797] ffff88800fb9b820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0
[ 122.796852]
[ 122.796852] which lock already depends on the new lock.
[ 122.796852]
[ 122.796858]
[ 122.796858] the existing dependency chain (in reverse order) is:
[ 122.796865]
[ 122.796865] -> #3 (&ctx->lock){....}-{2:2}:
[ 122.796894] _raw_spin_lock+0x2a/0x40
[ 122.796927] __perf_event_task_sched_out+0x53b/0x18d0
[ 122.796952] __schedule+0xedd/0x2470
[ 122.796974] schedule+0xda/0x1b0
[ 122.796994] exit_to_user_mode_prepare+0x114/0x1a0
[ 122.797035] rfkill: input handler disabled
[ 122.797033] syscall_exit_to_user_mode+0x19/0x40
[ 122.797069] do_syscall_64+0x48/0x90
[ 122.797097] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 122.797132]
[ 122.797132] -> #2 (&rq->__lock){-.-.}-{2:2}:
[ 122.797161] _raw_spin_lock_nested+0x30/0x40
[ 122.797191] raw_spin_rq_lock_nested+0x1e/0x30
[ 122.797216] task_fork_fair+0x63/0x4d0
[ 122.797250] sched_cgroup_fork+0x3d0/0x540
[ 122.797278] copy_process+0x4183/0x6e20
[ 122.797299] kernel_clone+0xe7/0x890
[ 122.797319] user_mode_thread+0xad/0xf0
[ 122.797340] rest_init+0x24/0x250
[ 122.797372] arch_call_rest_init+0xf/0x14
[ 122.797395] start_kernel+0x4c1/0x4e6
[ 122.797415] secondary_startup_64_no_verify+0xe0/0xeb
[ 122.797444]
[ 122.797444] -> #1 (&p->pi_lock){-.-.}-{2:2}:
[ 122.797473] _raw_spin_lock_irqsave+0x39/0x60
[ 122.797504] try_to_wake_up+0xab/0x1920
[ 122.797530] up+0x75/0xb0
[ 122.797554] __up_console_sem+0x6e/0x80
[ 122.797586] console_unlock+0x46a/0x590
[ 122.797618] vprintk_emit+0x1bd/0x560
[ 122.797651] vprintk+0x84/0xa0
[ 122.797683] _printk+0xba/0xf1
[ 122.797718] kauditd_hold_skb.cold+0x3f/0x4e
[ 122.797746] kauditd_send_queue+0x233/0x290
[ 122.797775] kauditd_thread+0x5da/0x9a0
[ 122.797803] kthread+0x2ed/0x3a0
[ 122.797832] ret_from_fork+0x22/0x30
[ 122.797857]
[ 122.797857] -> #0 ((console_sem).lock){....}-{2:2}:
[ 122.797885] __lock_acquire+0x2a02/0x5e70
[ 122.797919] lock_acquire+0x1a2/0x530
[ 122.797950] _raw_spin_lock_irqsave+0x39/0x60
[ 122.797981] down_trylock+0xe/0x70
[ 122.798007] __down_trylock_console_sem+0x3b/0xd0
[ 122.798040] vprintk_emit+0x16b/0x560
[ 122.798073] vprintk+0x84/0xa0
[ 122.798105] _printk+0xba/0xf1
[ 122.798138] report_bug.cold+0x72/0xab
[ 122.798163] handle_bug+0x3c/0x70
[ 122.798189] exc_invalid_op+0x14/0x50
[ 122.798216] asm_exc_invalid_op+0x16/0x20
[ 122.798249] group_sched_out.part.0+0x2c7/0x460
[ 122.798271] ctx_sched_out+0x8f1/0xc10
[ 122.798291] __perf_event_task_sched_out+0x6d0/0x18d0
[ 122.798316] __schedule+0xedd/0x2470
[ 122.798336] schedule+0xda/0x1b0
[ 122.798356] exit_to_user_mode_prepare+0x114/0x1a0
[ 122.798394] syscall_exit_to_user_mode+0x19/0x40
[ 122.798429] do_syscall_64+0x48/0x90
[ 122.798456] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 122.798491]
[ 122.798491] other info that might help us debug this:
[ 122.798491]
[ 122.798496] Chain exists of:
[ 122.798496] (console_sem).lock --> &rq->__lock --> &ctx->lock
[ 122.798496]
[ 122.798527] Possible unsafe locking scenario:
[ 122.798527]
[ 122.798532] CPU0 CPU1
[ 122.798537] ---- ----
[ 122.798541] lock(&ctx->lock);
[ 122.798553] lock(&rq->__lock);
[ 122.798566] lock(&ctx->lock);
[ 122.798579] lock((console_sem).lock);
[ 122.798591]
[ 122.798591] *** DEADLOCK ***
[ 122.798591]
[ 122.798595] 2 locks held by syz-executor.3/4008:
[ 122.798609] #0: ffff88806ce37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470
[ 122.798663] #1: ffff88800fb9b820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0
[ 122.798721]
[ 122.798721] stack backtrace:
[ 122.798726] CPU: 0 PID: 4008 Comm: syz-executor.3 Not tainted 6.0.0-rc5-next-20220914 #1
[ 122.798752] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 122.798768] Call Trace:
[ 122.798774]
[ 122.798782] dump_stack_lvl+0x8b/0xb3
[ 122.798813] check_noncircular+0x263/0x2e0
[ 122.798846] ? format_decode+0x26c/0xb50
[ 122.798876] ? print_circular_bug+0x450/0x450
[ 122.798911] ? enable_ptr_key_workfn+0x20/0x20
[ 122.798942] ? format_decode+0x26c/0xb50
[ 122.798974] ? alloc_chain_hlocks+0x1ec/0x5a0
[ 122.799010] __lock_acquire+0x2a02/0x5e70
[ 122.799054] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 122.799101] lock_acquire+0x1a2/0x530
[ 122.799135] ? down_trylock+0xe/0x70
[ 122.799165] ? rcu_read_unlock+0x40/0x40
[ 122.799207] ? vprintk+0x84/0xa0
[ 122.799244] _raw_spin_lock_irqsave+0x39/0x60
[ 122.799277] ? down_trylock+0xe/0x70
[ 122.799305] down_trylock+0xe/0x70
[ 122.799332] ? vprintk+0x84/0xa0
[ 122.799366] __down_trylock_console_sem+0x3b/0xd0
[ 122.799402] vprintk_emit+0x16b/0x560
[ 122.799441] vprintk+0x84/0xa0
[ 122.799477] _printk+0xba/0xf1
[ 122.799512] ? record_print_text.cold+0x16/0x16
[ 122.799557] ? report_bug.cold+0x66/0xab
[ 122.799587] ? group_sched_out.part.0+0x2c7/0x460
[ 122.799636] report_bug.cold+0x72/0xab
[ 122.799668] handle_bug+0x3c/0x70
[ 122.799697] exc_invalid_op+0x14/0x50
[ 122.799726] asm_exc_invalid_op+0x16/0x20
[ 122.799761] RIP: 0010:group_sched_out.part.0+0x2c7/0x460
[ 122.799788] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00
[ 122.799812] RSP: 0018:ffff88803fb97c48 EFLAGS: 00010006
[ 122.799831] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000
[ 122.799846] RDX: ffff88803fb75040 RSI: ffffffff81566027 RDI: 0000000000000005
[ 122.799862] RBP: ffff8880086605c8 R08: 0000000000000005 R09: 0000000000000001
[ 122.799878] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff88800fb9b800
[ 122.799894] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002
[ 122.799917] ? group_sched_out.part.0+0x2c7/0x460
[ 122.799944] ? group_sched_out.part.0+0x2c7/0x460
[ 122.799971] ctx_sched_out+0x8f1/0xc10
[ 122.799997] __perf_event_task_sched_out+0x6d0/0x18d0
[ 122.800029] ? lock_is_held_type+0xd7/0x130
[ 122.800066] ? __perf_cgroup_move+0x160/0x160
[ 122.800090] ? set_next_entity+0x304/0x550
[ 122.800126] ? update_curr+0x267/0x740
[ 122.800164] ? lock_is_held_type+0xd7/0x130
[ 122.800202] __schedule+0xedd/0x2470
[ 122.800229] ? io_schedule_timeout+0x150/0x150
[ 122.800256] ? rcu_read_lock_sched_held+0x3e/0x80
[ 122.800297] schedule+0xda/0x1b0
[ 122.800320] exit_to_user_mode_prepare+0x114/0x1a0
[ 122.800361] syscall_exit_to_user_mode+0x19/0x40
[ 122.800398] do_syscall_64+0x48/0x90
[ 122.800428] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 122.800464] RIP: 0033:0x7f69f95c8b19
[ 122.800482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 122.800504] RSP: 002b:00007f69f6b3e218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
[ 122.800527] RAX: 0000000000000001 RBX: 00007f69f96dbf68 RCX: 00007f69f95c8b19
[ 122.800542] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f69f96dbf6c
[ 122.800558] RBP: 00007f69f96dbf60 R08: 000000000000000e R09: 0000000000000000
[ 122.800573] R10: 0000000000000005 R11: 0000000000000246 R12: 00007f69f96dbf6c
[ 122.800588] R13: 00007ffe69cd7caf R14: 00007f69f6b3e300 R15: 0000000000022000
[ 122.800614]
[ 122.811248] rfkill: input handler enabled
[ 122.811348] WARNING: CPU: 0 PID: 4008 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460
[ 122.903199] Modules linked in:
[ 122.903672] CPU: 0 PID: 4008 Comm: syz-executor.3 Not tainted 6.0.0-rc5-next-20220914 #1
[ 122.904804] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 122.906357] RIP: 0010:group_sched_out.part.0+0x2c7/0x460
[ 122.907126] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00
[ 122.909622] RSP: 0018:ffff88803fb97c48 EFLAGS: 00010006
[ 122.910367] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000
[ 122.911353] RDX: ffff88803fb75040 RSI: ffffffff81566027 RDI: 0000000000000005
[ 122.912365] RBP: ffff8880086605c8 R08: 0000000000000005 R09: 0000000000000001
[ 122.913349] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff88800fb9b800
[ 122.914337] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002
[ 122.915317] FS: 00007f69f6b3e700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000
[ 122.916433] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 122.917239] CR2: 00007fff185fefe8 CR3: 000000003f232000 CR4: 0000000000350ef0
[ 122.918214] Call Trace:
[ 122.918581]
[ 122.918904] ctx_sched_out+0x8f1/0xc10
[ 122.919458] __perf_event_task_sched_out+0x6d0/0x18d0
[ 122.920189] ? lock_is_held_type+0xd7/0x130
[ 122.920807] ? __perf_cgroup_move+0x160/0x160
[ 122.921431] ? set_next_entity+0x304/0x550
[ 122.922031] ? update_curr+0x267/0x740
[ 122.922589] ? lock_is_held_type+0xd7/0x130
[ 122.923205] __schedule+0xedd/0x2470
[ 122.923748] ? io_schedule_timeout+0x150/0x150
[ 122.924387] ? rcu_read_lock_sched_held+0x3e/0x80
[ 122.925084] schedule+0xda/0x1b0
[ 122.925573] exit_to_user_mode_prepare+0x114/0x1a0
[ 122.926273] syscall_exit_to_user_mode+0x19/0x40
[ 122.926937] do_syscall_64+0x48/0x90
[ 122.927471] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 122.928213] RIP: 0033:0x7f69f95c8b19
[ 122.928729] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 122.931190] RSP: 002b:00007f69f6b3e218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
[ 122.932237] RAX: 0000000000000001 RBX: 00007f69f96dbf68 RCX: 00007f69f95c8b19
[ 122.933194] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f69f96dbf6c
[ 122.934163] RBP: 00007f69f96dbf60 R08: 000000000000000e R09: 0000000000000000
[ 122.935130] R10: 0000000000000005 R11: 0000000000000246 R12: 00007f69f96dbf6c
[ 122.936104] R13: 00007ffe69cd7caf R14: 00007f69f6b3e300 R15: 0000000000022000
[ 122.937089]
[ 122.937416] irq event stamp: 886
[ 122.937875] hardirqs last enabled at (885): [] exit_to_user_mode_prepare+0x109/0x1a0
[ 122.939167] hardirqs last disabled at (886): [] __schedule+0x1225/0x2470
[ 122.940286] softirqs last enabled at (872): [] __irq_exit_rcu+0x11b/0x180
[ 122.941446] softirqs last disabled at (823): [] __irq_exit_rcu+0x11b/0x180
[ 122.942603] ---[ end trace 0000000000000000 ]---
[ 122.980331] hrtimer: interrupt took 17112 ns
[ 123.080359] I/O error, dev loop1, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2
[ 123.178718] loop1: detected capacity change from 0 to 4096
11:38:52 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c20000120300000000000000000000000000000000000073797a6b", 0x7c, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012700)}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x4880}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f0000000000000100", 0x1c, 0x4c00}, {0x0}, {0x0}, {&(0x7f0000013400)}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}], 0x0, &(0x7f0000014a00))
11:38:52 executing program 5:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
getsockopt$inet_int(r0, 0x0, 0x6, 0x0, &(0x7f0000000d00))
11:38:52 executing program 0:
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0)
ioctl$TIOCMGET(r0, 0x5415, 0x0)
11:38:52 executing program 4:
r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201)
ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201)
11:38:52 executing program 7:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001140)=ANY=[@ANYBLOB="2c0000001000010000000000000000000c00000002000000000000fb030000000c000400000000a3"], 0x2c}], 0x1}, 0x0)
11:38:52 executing program 2:
r0 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88)
setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2d, &(0x7f0000000500)={0x3, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88)
11:38:52 executing program 3:
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000300)={0x80000001, {{0x2, 0x4e22, @private=0xa010102}}}, 0x88)
r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0)
11:38:52 executing program 6:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
sendmmsg$inet(r0, &(0x7f0000008980)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000004c0)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ssrr={0x89, 0x8, 0x4, [@local]}]}}}], 0x18}}], 0x1, 0x0)
[ 123.211699] netlink: 'syz-executor.7': attribute type 4 has an invalid length.
11:38:52 executing program 6:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
sendmmsg$inet(r0, &(0x7f0000008980)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000004c0)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ssrr={0x89, 0x8, 0x4, [@local]}]}}}], 0x18}}], 0x1, 0x0)
[ 123.229858] EXT4-fs warning (device loop1): ext4_enable_quotas:6818: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix.
11:38:52 executing program 0:
r0 = syz_io_uring_setup(0x178f, &(0x7f0000000080)={0x0, 0x0, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_CLOSE, 0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x7)
io_uring_enter(r0, 0x64d0, 0x0, 0x0, 0x0, 0x0)
[ 123.273199] EXT4-fs (loop1): mount failed
[ 123.295270] rfkill: input handler disabled
[ 123.302042] rfkill: input handler enabled
11:38:52 executing program 6:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
sendmmsg$inet(r0, &(0x7f0000008980)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000004c0)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ssrr={0x89, 0x8, 0x4, [@local]}]}}}], 0x18}}], 0x1, 0x0)
11:38:52 executing program 5:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
getsockopt$inet_int(r0, 0x0, 0x6, 0x0, &(0x7f0000000d00))
11:38:52 executing program 7:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001140)=ANY=[@ANYBLOB="2c0000001000010000000000000000000c00000002000000000000fb030000000c000400000000a3"], 0x2c}], 0x1}, 0x0)
11:38:52 executing program 2:
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x44031, 0xffffffffffffffff, 0x0)
madvise(&(0x7f000015a000/0x1000)=nil, 0x1000, 0x1)
11:38:52 executing program 5:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
getsockopt$inet_int(r0, 0x0, 0x6, 0x0, &(0x7f0000000d00))
[ 123.383121] netlink: 'syz-executor.7': attribute type 4 has an invalid length.
11:38:52 executing program 4:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$netlbl_cipso(0x0, r0)
r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0)
sendmsg$NBD_CMD_STATUS(r1, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs(0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff})
vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0)
fcntl$setpipe(r2, 0x407, 0x10001)
[ 123.469815] netlink: 'syz-executor.7': attribute type 4 has an invalid length.
11:38:52 executing program 7:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001140)=ANY=[@ANYBLOB="2c0000001000010000000000000000000c00000002000000000000fb030000000c000400000000a3"], 0x2c}], 0x1}, 0x0)
11:38:52 executing program 3:
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000300)={0x80000001, {{0x2, 0x4e22, @private=0xa010102}}}, 0x88)
r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0)
11:38:52 executing program 0:
r0 = syz_io_uring_setup(0x178f, &(0x7f0000000080)={0x0, 0x0, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_CLOSE, 0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x7)
io_uring_enter(r0, 0x64d0, 0x0, 0x0, 0x0, 0x0)
11:38:52 executing program 6:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
sendmmsg$inet(r0, &(0x7f0000008980)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000004c0)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ssrr={0x89, 0x8, 0x4, [@local]}]}}}], 0x18}}], 0x1, 0x0)
11:38:52 executing program 4:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$netlbl_cipso(0x0, r0)
r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0)
sendmsg$NBD_CMD_STATUS(r1, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs(0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff})
vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0)
fcntl$setpipe(r2, 0x407, 0x10001)
11:38:52 executing program 5:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
getsockopt$inet_int(r0, 0x0, 0x6, 0x0, &(0x7f0000000d00))
11:38:52 executing program 2:
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x44031, 0xffffffffffffffff, 0x0)
madvise(&(0x7f000015a000/0x1000)=nil, 0x1000, 0x1)
11:38:52 executing program 7:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001140)=ANY=[@ANYBLOB="2c0000001000010000000000000000000c00000002000000000000fb030000000c000400000000a3"], 0x2c}], 0x1}, 0x0)
11:38:52 executing program 0:
r0 = syz_io_uring_setup(0x178f, &(0x7f0000000080)={0x0, 0x0, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_CLOSE, 0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x7)
io_uring_enter(r0, 0x64d0, 0x0, 0x0, 0x0, 0x0)
11:38:52 executing program 3:
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000300)={0x80000001, {{0x2, 0x4e22, @private=0xa010102}}}, 0x88)
r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0)
ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2})
ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0)
[ 123.605713] netlink: 'syz-executor.7': attribute type 4 has an invalid length.
11:38:52 executing program 2:
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x44031, 0xffffffffffffffff, 0x0)
madvise(&(0x7f000015a000/0x1000)=nil, 0x1000, 0x1)
11:38:52 executing program 4:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$netlbl_cipso(0x0, r0)
r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0)
sendmsg$NBD_CMD_STATUS(r1, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs(0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff})
vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0)
fcntl$setpipe(r2, 0x407, 0x10001)
11:38:52 executing program 7:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$netlbl_cipso(0x0, r0)
r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0)
sendmsg$NBD_CMD_STATUS(r1, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs(0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff})
vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0)
fcntl$setpipe(r2, 0x407, 0x10001)
11:38:52 executing program 1:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$netlbl_cipso(0x0, r0)
r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0)
sendmsg$NBD_CMD_STATUS(r1, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs(0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff})
vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0)
fcntl$setpipe(r2, 0x407, 0x10001)
11:38:52 executing program 6:
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x44031, 0xffffffffffffffff, 0x0)
madvise(&(0x7f000015a000/0x1000)=nil, 0x1000, 0x1)
11:38:52 executing program 5:
r0 = syz_io_uring_setup(0x178f, &(0x7f0000000080)={0x0, 0x0, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_CLOSE, 0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x7)
io_uring_enter(r0, 0x64d0, 0x0, 0x0, 0x0, 0x0)
11:38:52 executing program 0:
r0 = syz_io_uring_setup(0x178f, &(0x7f0000000080)={0x0, 0x0, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_CLOSE, 0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x7)
io_uring_enter(r0, 0x64d0, 0x0, 0x0, 0x0, 0x0)
11:38:52 executing program 7:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$netlbl_cipso(0x0, r0)
r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0)
sendmsg$NBD_CMD_STATUS(r1, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs(0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff})
vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0)
fcntl$setpipe(r2, 0x407, 0x10001)
11:38:52 executing program 1:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$netlbl_cipso(0x0, r0)
r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0)
sendmsg$NBD_CMD_STATUS(r1, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs(0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff})
vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0)
fcntl$setpipe(r2, 0x407, 0x10001)
11:38:52 executing program 5:
r0 = syz_io_uring_setup(0x178f, &(0x7f0000000080)={0x0, 0x0, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_CLOSE, 0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x7)
io_uring_enter(r0, 0x64d0, 0x0, 0x0, 0x0, 0x0)
11:38:52 executing program 0:
syz_emit_ethernet(0x6e, &(0x7f00000001c0)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ddc20", 0x38, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "c98b46", 0x0, 0x32, 0x0, @remote, @loopback, [], "fb8ee2471316fa4e"}}}}}}}, 0x0)
11:38:52 executing program 6:
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x44031, 0xffffffffffffffff, 0x0)
madvise(&(0x7f000015a000/0x1000)=nil, 0x1000, 0x1)
11:38:53 executing program 2:
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x44031, 0xffffffffffffffff, 0x0)
madvise(&(0x7f000015a000/0x1000)=nil, 0x1000, 0x1)
[ 124.132343] loop3: detected capacity change from 0 to 40
11:38:53 executing program 4:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$netlbl_cipso(0x0, r0)
r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0)
sendmsg$NBD_CMD_STATUS(r1, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs(0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff})
vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0)
fcntl$setpipe(r2, 0x407, 0x10001)
11:38:53 executing program 3:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
11:38:53 executing program 6:
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x44031, 0xffffffffffffffff, 0x0)
madvise(&(0x7f000015a000/0x1000)=nil, 0x1000, 0x1)
11:38:53 executing program 5:
r0 = syz_io_uring_setup(0x178f, &(0x7f0000000080)={0x0, 0x0, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_CLOSE, 0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x7)
io_uring_enter(r0, 0x64d0, 0x0, 0x0, 0x0, 0x0)
11:38:53 executing program 0:
syz_emit_ethernet(0x6e, &(0x7f00000001c0)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ddc20", 0x38, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "c98b46", 0x0, 0x32, 0x0, @remote, @loopback, [], "fb8ee2471316fa4e"}}}}}}}, 0x0)
11:38:53 executing program 1:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$netlbl_cipso(0x0, r0)
r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0)
sendmsg$NBD_CMD_STATUS(r1, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs(0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff})
vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0)
fcntl$setpipe(r2, 0x407, 0x10001)
11:38:53 executing program 7:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$netlbl_cipso(0x0, r0)
r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0)
sendmsg$NBD_CMD_STATUS(r1, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs(0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff})
vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0)
fcntl$setpipe(r2, 0x407, 0x10001)
11:38:53 executing program 0:
syz_emit_ethernet(0x6e, &(0x7f00000001c0)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ddc20", 0x38, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "c98b46", 0x0, 0x32, 0x0, @remote, @loopback, [], "fb8ee2471316fa4e"}}}}}}}, 0x0)
[ 124.254575] loop3: detected capacity change from 0 to 40
[ 124.527066] loop6: detected capacity change from 0 to 40
[ 124.527984] loop1: detected capacity change from 0 to 40
[ 124.551951] loop3: detected capacity change from 0 to 40
11:38:53 executing program 2:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r0, 0x0, 0x0, 0x87ffffc)
pwritev2(r0, &(0x7f0000001240)=[{&(0x7f0000000180)="ca", 0x1}], 0x1, 0x0, 0x0, 0xe)
11:38:53 executing program 4:
r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x149041, 0x0)
write$hidraw(r0, 0x0, 0x0)
11:38:53 executing program 3:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
11:38:53 executing program 0:
syz_emit_ethernet(0x6e, &(0x7f00000001c0)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ddc20", 0x38, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "c98b46", 0x0, 0x32, 0x0, @remote, @loopback, [], "fb8ee2471316fa4e"}}}}}}}, 0x0)
11:38:53 executing program 6:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
11:38:53 executing program 1:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
11:38:53 executing program 2:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r0, 0x0, 0x0, 0x87ffffc)
pwritev2(r0, &(0x7f0000001240)=[{&(0x7f0000000180)="ca", 0x1}], 0x1, 0x0, 0x0, 0xe)
11:38:53 executing program 7:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
11:38:53 executing program 4:
r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x149041, 0x0)
write$hidraw(r0, 0x0, 0x0)
[ 124.629809] loop7: detected capacity change from 0 to 40
11:38:53 executing program 1:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
[ 124.709815] loop1: detected capacity change from 0 to 40
11:38:53 executing program 4:
r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x149041, 0x0)
write$hidraw(r0, 0x0, 0x0)
11:38:53 executing program 6:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
11:38:53 executing program 2:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r0, 0x0, 0x0, 0x87ffffc)
pwritev2(r0, &(0x7f0000001240)=[{&(0x7f0000000180)="ca", 0x1}], 0x1, 0x0, 0x0, 0xe)
[ 124.768561] loop5: detected capacity change from 0 to 40
11:38:53 executing program 5:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
[ 124.802544] loop6: detected capacity change from 0 to 40
11:38:53 executing program 3:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
11:38:53 executing program 4:
r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x149041, 0x0)
write$hidraw(r0, 0x0, 0x0)
11:38:53 executing program 0:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
[ 124.914825] loop3: detected capacity change from 0 to 40
11:38:53 executing program 7:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
[ 124.928282] loop0: detected capacity change from 0 to 40
11:38:53 executing program 2:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
fallocate(r0, 0x0, 0x0, 0x87ffffc)
pwritev2(r0, &(0x7f0000001240)=[{&(0x7f0000000180)="ca", 0x1}], 0x1, 0x0, 0x0, 0xe)
11:38:53 executing program 4:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
[ 125.037707] loop7: detected capacity change from 0 to 40
[ 125.054739] loop4: detected capacity change from 0 to 40
[ 125.298326] loop4: detected capacity change from 0 to 40
[ 125.300913] loop3: detected capacity change from 0 to 40
11:38:54 executing program 6:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
11:38:54 executing program 7:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
11:38:54 executing program 1:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
11:38:54 executing program 2:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
11:38:54 executing program 0:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
11:38:54 executing program 3:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
11:38:54 executing program 4:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
11:38:54 executing program 5:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
[ 125.337874] loop5: detected capacity change from 0 to 40
[ 125.340715] loop1: detected capacity change from 0 to 40
[ 125.343856] loop2: detected capacity change from 0 to 40
[ 125.350307] loop0: detected capacity change from 0 to 40
[ 125.352643] loop6: detected capacity change from 0 to 40
[ 125.387689] loop7: detected capacity change from 0 to 40
11:38:54 executing program 4:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
[ 125.478228] loop4: detected capacity change from 0 to 40
11:38:54 executing program 5:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
11:38:54 executing program 2:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
11:38:54 executing program 1:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
[ 125.608888] loop5: detected capacity change from 0 to 40
11:38:54 executing program 3:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x4156, 0x4)
sendmmsg$inet(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0x2, 0x4e21}, 0x10, 0x0}}], 0x1, 0x0)
recvmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=""/81, 0x51}}], 0x1, 0x40012301, 0x0)
11:38:54 executing program 4:
perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000001340)='F', 0x1, 0xfffffffffffffffa}], 0x40, &(0x7f00000015c0)={[], [{@fsuuid}]})
syz_mount_image$ext4(&(0x7f0000001780)='ext3\x00', &(0x7f00000017c0)='./file0\x00', 0x0, 0x1, &(0x7f0000003c40)=[{&(0x7f0000001800)="b8", 0x1}], 0x8, &(0x7f0000003d40)={[{@journal_async_commit}, {@lazytime}, {@noacl}, {@test_dummy_encryption}]})
11:38:54 executing program 6:
creat(&(0x7f0000000040)='./file0\x00', 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
creat(&(0x7f0000000380)='./file0\x00', 0x0)
11:38:54 executing program 0:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
11:38:54 executing program 7:
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 0x1000, 0x4})
[ 125.637774] loop4: detected capacity change from 0 to 16383
[ 125.638882] =======================================================
[ 125.638882] WARNING: The mand mount option has been deprecated and
[ 125.638882] and is ignored by this kernel. Remove the mand
[ 125.638882] option from the mount to silence this warning.
[ 125.638882] =======================================================
[ 125.652049] ext2: Unknown parameter 'fsuuid'
[ 125.652354] loop2: detected capacity change from 0 to 40
[ 125.653451] loop1: detected capacity change from 0 to 40
[ 125.658696] EXT4-fs: Mount option "noacl" will be removed by 3.5
[ 125.658696] Contact linux-ext4@vger.kernel.org if you think we should keep it.
[ 125.658696]
[ 125.659823] EXT4-fs: test_dummy_encryption option not supported
[ 125.669218] loop4: detected capacity change from 0 to 16383
[ 125.670106] ext2: Unknown parameter 'fsuuid'
11:38:54 executing program 3:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x4156, 0x4)
sendmmsg$inet(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0x2, 0x4e21}, 0x10, 0x0}}], 0x1, 0x0)
recvmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=""/81, 0x51}}], 0x1, 0x40012301, 0x0)
11:38:54 executing program 6:
creat(&(0x7f0000000040)='./file0\x00', 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
creat(&(0x7f0000000380)='./file0\x00', 0x0)
[ 125.697456] loop0: detected capacity change from 0 to 40
11:38:54 executing program 4:
perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000001340)='F', 0x1, 0xfffffffffffffffa}], 0x40, &(0x7f00000015c0)={[], [{@fsuuid}]})
syz_mount_image$ext4(&(0x7f0000001780)='ext3\x00', &(0x7f00000017c0)='./file0\x00', 0x0, 0x1, &(0x7f0000003c40)=[{&(0x7f0000001800)="b8", 0x1}], 0x8, &(0x7f0000003d40)={[{@journal_async_commit}, {@lazytime}, {@noacl}, {@test_dummy_encryption}]})
11:38:54 executing program 7:
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 0x1000, 0x4})
11:38:54 executing program 3:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x4156, 0x4)
sendmmsg$inet(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0x2, 0x4e21}, 0x10, 0x0}}], 0x1, 0x0)
recvmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=""/81, 0x51}}], 0x1, 0x40012301, 0x0)
[ 125.777652] loop4: detected capacity change from 0 to 16383
[ 125.782603] ext2: Unknown parameter 'fsuuid'
11:38:54 executing program 6:
creat(&(0x7f0000000040)='./file0\x00', 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
creat(&(0x7f0000000380)='./file0\x00', 0x0)
[ 125.801237] EXT4-fs: Mount option "noacl" will be removed by 3.5
[ 125.801237] Contact linux-ext4@vger.kernel.org if you think we should keep it.
[ 125.801237]
[ 125.802393] EXT4-fs: test_dummy_encryption option not supported
11:38:54 executing program 1:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
11:38:54 executing program 4:
perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000001340)='F', 0x1, 0xfffffffffffffffa}], 0x40, &(0x7f00000015c0)={[], [{@fsuuid}]})
syz_mount_image$ext4(&(0x7f0000001780)='ext3\x00', &(0x7f00000017c0)='./file0\x00', 0x0, 0x1, &(0x7f0000003c40)=[{&(0x7f0000001800)="b8", 0x1}], 0x8, &(0x7f0000003d40)={[{@journal_async_commit}, {@lazytime}, {@noacl}, {@test_dummy_encryption}]})
11:38:54 executing program 6:
creat(&(0x7f0000000040)='./file0\x00', 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
creat(&(0x7f0000000380)='./file0\x00', 0x0)
[ 125.904539] loop4: detected capacity change from 0 to 16383
[ 125.906243] ext2: Unknown parameter 'fsuuid'
[ 125.917346] loop1: detected capacity change from 0 to 40
[ 125.918993] EXT4-fs: Mount option "noacl" will be removed by 3.5
[ 125.918993] Contact linux-ext4@vger.kernel.org if you think we should keep it.
[ 125.918993]
[ 125.920923] EXT4-fs: test_dummy_encryption option not supported
11:38:54 executing program 2:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
11:38:54 executing program 3:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x4156, 0x4)
sendmmsg$inet(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0x2, 0x4e21}, 0x10, 0x0}}], 0x1, 0x0)
recvmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=""/81, 0x51}}], 0x1, 0x40012301, 0x0)
11:38:54 executing program 5:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x4156, 0x4)
sendmmsg$inet(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0x2, 0x4e21}, 0x10, 0x0}}], 0x1, 0x0)
recvmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=""/81, 0x51}}], 0x1, 0x40012301, 0x0)
11:38:54 executing program 0:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x4156, 0x4)
sendmmsg$inet(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0x2, 0x4e21}, 0x10, 0x0}}], 0x1, 0x0)
recvmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=""/81, 0x51}}], 0x1, 0x40012301, 0x0)
11:38:54 executing program 7:
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 0x1000, 0x4})
11:38:54 executing program 7:
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 0x1000, 0x4})
11:38:54 executing program 0:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x4156, 0x4)
sendmmsg$inet(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0x2, 0x4e21}, 0x10, 0x0}}], 0x1, 0x0)
recvmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=""/81, 0x51}}], 0x1, 0x40012301, 0x0)
[ 126.038277] loop2: detected capacity change from 0 to 40
11:38:54 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000009c0)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@dev, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in=@private, 0x0, 0x6c}, @in6=@mcast2}}}, 0xf8}}, 0x0)
11:38:54 executing program 5:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x4156, 0x4)
sendmmsg$inet(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0x2, 0x4e21}, 0x10, 0x0}}], 0x1, 0x0)
recvmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=""/81, 0x51}}], 0x1, 0x40012301, 0x0)
11:38:54 executing program 4:
perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000001340)='F', 0x1, 0xfffffffffffffffa}], 0x40, &(0x7f00000015c0)={[], [{@fsuuid}]})
syz_mount_image$ext4(&(0x7f0000001780)='ext3\x00', &(0x7f00000017c0)='./file0\x00', 0x0, 0x1, &(0x7f0000003c40)=[{&(0x7f0000001800)="b8", 0x1}], 0x8, &(0x7f0000003d40)={[{@journal_async_commit}, {@lazytime}, {@noacl}, {@test_dummy_encryption}]})
11:38:54 executing program 3:
perf_event_open$cgroup(&(0x7f0000000000)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4003}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
11:38:55 executing program 0:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x4156, 0x4)
sendmmsg$inet(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0x2, 0x4e21}, 0x10, 0x0}}], 0x1, 0x0)
recvmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=""/81, 0x51}}], 0x1, 0x40012301, 0x0)
[ 126.172164] loop4: detected capacity change from 0 to 16383
[ 126.175426] ext2: Unknown parameter 'fsuuid'
11:38:55 executing program 3:
perf_event_open$cgroup(&(0x7f0000000000)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4003}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
[ 126.197927] EXT4-fs: Mount option "noacl" will be removed by 3.5
[ 126.197927] Contact linux-ext4@vger.kernel.org if you think we should keep it.
[ 126.197927]
[ 126.199821] EXT4-fs: test_dummy_encryption option not supported
11:38:55 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000009c0)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@dev, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in=@private, 0x0, 0x6c}, @in6=@mcast2}}}, 0xf8}}, 0x0)
11:38:55 executing program 1:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0)
chdir(0x0)
mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0])
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "1047c359a4f1acb11cad4ebfd27f6921c592f1"})
pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8)
mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1)
openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x4441, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f}, 0x68)
sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
11:38:55 executing program 7:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='debugfs\x00', 0x0, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000300)={[{@gid={'gid', 0x3d, 0xffffffffffffffff}}]})
11:38:55 executing program 5:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x4156, 0x4)
sendmmsg$inet(r0, &(0x7f0000002a00)=[{{&(0x7f0000000000)={0x2, 0x4e21}, 0x10, 0x0}}], 0x1, 0x0)
recvmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=""/81, 0x51}}], 0x1, 0x40012301, 0x0)
11:38:55 executing program 3:
perf_event_open$cgroup(&(0x7f0000000000)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4003}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
[ 126.335710] loop1: detected capacity change from 0 to 40
[ 126.470551] ieee80211 : Selected rate control algorithm 'minstrel_ht'
11:38:55 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000009c0)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@dev, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in=@private, 0x0, 0x6c}, @in6=@mcast2}}}, 0xf8}}, 0x0)
11:38:55 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$netlink(0x10, 0x3, 0x10)
sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)={0x1c, 0x1d, 0x1, 0x0, 0x0, "", [@typed={0x4, 0x0, 0x0, 0x0, @binary}, @nested={0x5, 0x11, 0x0, 0x1, [@generic="1c"]}]}, 0x1c}], 0x1}, 0x0)
11:38:55 executing program 3:
perf_event_open$cgroup(&(0x7f0000000000)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4003}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
11:38:55 executing program 0:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='debugfs\x00', 0x0, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000300)={[{@gid={'gid', 0x3d, 0xffffffffffffffff}}]})
11:38:55 executing program 7:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='debugfs\x00', 0x0, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000300)={[{@gid={'gid', 0x3d, 0xffffffffffffffff}}]})
11:38:55 executing program 5:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
pwrite64(r2, &(0x7f0000000840)='2', 0x1, 0x83b2)
r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
pwrite64(r3, &(0x7f0000000140)="c0", 0x1, 0x75d6)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1})
11:38:55 executing program 2:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r0, r0, 0x0, 0x100000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2)
fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff)
getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14)
ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}})
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc)
socket$inet6_udp(0xa, 0x2, 0x0)
r3 = socket$inet6(0xa, 0x1, 0x0)
socket$nl_audit(0x10, 0x3, 0x9)
setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14)
perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3)
11:38:55 executing program 0:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='debugfs\x00', 0x0, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000300)={[{@gid={'gid', 0x3d, 0xffffffffffffffff}}]})
11:38:55 executing program 6:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000009c0)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@dev, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in=@private, 0x0, 0x6c}, @in6=@mcast2}}}, 0xf8}}, 0x0)
[ 126.546535] ieee80211 phy3: Selected rate control algorithm 'minstrel_ht'
11:38:55 executing program 7:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='debugfs\x00', 0x0, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000300)={[{@gid={'gid', 0x3d, 0xffffffffffffffff}}]})
11:38:55 executing program 5:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
pwrite64(r2, &(0x7f0000000840)='2', 0x1, 0x83b2)
r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
pwrite64(r3, &(0x7f0000000140)="c0", 0x1, 0x75d6)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1})
11:38:55 executing program 0:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='debugfs\x00', 0x0, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000300)={[{@gid={'gid', 0x3d, 0xffffffffffffffff}}]})
[ 126.606812] syz-executor.4 (4280) used greatest stack depth: 24088 bytes left
11:38:55 executing program 7:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='debugfs\x00', 0x0, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000300)={[{@gid={'gid', 0x3d, 0xffffffffffffffff}}]})
11:38:55 executing program 2:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r0, r0, 0x0, 0x100000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2)
fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff)
getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14)
ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}})
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc)
socket$inet6_udp(0xa, 0x2, 0x0)
r3 = socket$inet6(0xa, 0x1, 0x0)
socket$nl_audit(0x10, 0x3, 0x9)
setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14)
perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3)
11:38:55 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$netlink(0x10, 0x3, 0x10)
sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)={0x1c, 0x1d, 0x1, 0x0, 0x0, "", [@typed={0x4, 0x0, 0x0, 0x0, @binary}, @nested={0x5, 0x11, 0x0, 0x1, [@generic="1c"]}]}, 0x1c}], 0x1}, 0x0)
[ 126.669897] ieee80211 phy4: Selected rate control algorithm 'minstrel_ht'
11:38:55 executing program 5:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
pwrite64(r2, &(0x7f0000000840)='2', 0x1, 0x83b2)
r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
pwrite64(r3, &(0x7f0000000140)="c0", 0x1, 0x75d6)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1})
11:38:55 executing program 6:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0,
VM DIAGNOSIS:
11:38:51 Registers:
info registers vcpu 0
RAX=0000000040000002 RBX=0000000000000001 RCX=0000000000000000 RDX=ffff88803fb75040
RSI=ffffffff812c8146 RDI=0000000000000001 RBP=ffff88803fb97a28 RSP=ffff88803fb979f0
R8 =0000000000000001 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001
R12=0000000000000024 R13=ffff8880401b8000 R14=0000000000000000 R15=ffff88803fb97a78
RIP=ffffffff812c8148 RFL=00000006 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 00007f69f6b3e700 00000000 00000000
GS =0000 ffff88806ce00000 00000000 00000000
LDT=0000 fffffe0000000000 00000000 00000000
TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy
GDT= fffffe0000001000 0000007f
IDT= fffffe0000000000 00000fff
CR0=80050033 CR2=00007fff185fefe8 CR3=000000003f232000 CR4=00350ef0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM01=0000000000000000 0000000000000000 00007f69f96af7c0 00007f69f96af7c8
YMM02=0000000000000000 0000000000000000 00007f69f96af7e0 00007f69f96af7c0
YMM03=0000000000000000 0000000000000000 00007f69f96af7c8 00007f69f96af7c0
YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000
YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245
YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040
YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000
info registers vcpu 1
RAX=dffffc0000000000 RBX=ffff88803b0472d0 RCX=0000000000000000 RDX=1ffff11007608e6e
RSI=ffffffff816aa95d RDI=ffff88803b0472dc RBP=ffff88803b047370 RSP=ffff88803b0471e8
R8 =ffffffff85ed9e2e R9 =ffffffff85ed9e32 R10=ffffed1007608e4e R11=ffff88803b047248
R12=ffff88803b0472d0 R13=0000000000000000 R14=ffff8880186bb580 R15=0000000000092cc0
RIP=ffffffff8135b463 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 00005555563ef400 00000000 00000000
GS =0000 ffff88806cf00000 00000000 00000000
LDT=0000 fffffe0000000000 00000000 00000000
TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy
GDT= fffffe0000048000 0000007f
IDT= fffffe0000000000 00000fff
CR0=80050033 CR2=0000001b2e021000 CR3=000000001ba92000 CR4=00350ee0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM01=0000000000000000 0000000000000000 00007f71fe5027c0 00007f71fe5027c8
YMM02=0000000000000000 0000000000000000 00007f71fe5027e0 00007f71fe5027c0
YMM03=0000000000000000 0000000000000000 00007f71fe5027c8 00007f71fe5027c0
YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000
YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245
YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040
YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000