Warning: Permanently added '[localhost]:65281' (ECDSA) to the list of known hosts.
2022/09/12 14:28:40 fuzzer started
2022/09/12 14:28:41 dialing manager at localhost:38027
syzkaller login: [   36.380723] cgroup: Unknown subsys name 'net'
[   36.488857] cgroup: Unknown subsys name 'rlimit'
2022/09/12 14:28:55 syscalls: 2215
2022/09/12 14:28:55 code coverage: enabled
2022/09/12 14:28:55 comparison tracing: enabled
2022/09/12 14:28:55 extra coverage: enabled
2022/09/12 14:28:55 setuid sandbox: enabled
2022/09/12 14:28:55 namespace sandbox: enabled
2022/09/12 14:28:55 Android sandbox: enabled
2022/09/12 14:28:55 fault injection: enabled
2022/09/12 14:28:55 leak checking: enabled
2022/09/12 14:28:55 net packet injection: enabled
2022/09/12 14:28:55 net device setup: enabled
2022/09/12 14:28:55 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist
2022/09/12 14:28:55 devlink PCI setup: PCI device 0000:00:10.0 is not available
2022/09/12 14:28:55 USB emulation: enabled
2022/09/12 14:28:55 hci packet injection: enabled
2022/09/12 14:28:55 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220912                                          )
2022/09/12 14:28:55 802.15.4 emulation: enabled
2022/09/12 14:28:55 fetching corpus: 0, signal 0/2000 (executing program)
2022/09/12 14:28:55 fetching corpus: 38, signal 28088/31485 (executing program)
2022/09/12 14:28:56 fetching corpus: 88, signal 45443/50009 (executing program)
2022/09/12 14:28:56 fetching corpus: 138, signal 56751/62329 (executing program)
2022/09/12 14:28:56 fetching corpus: 187, signal 62468/69188 (executing program)
2022/09/12 14:28:56 fetching corpus: 237, signal 72073/79491 (executing program)
2022/09/12 14:28:56 fetching corpus: 287, signal 78320/86505 (executing program)
2022/09/12 14:28:57 fetching corpus: 337, signal 84090/92966 (executing program)
2022/09/12 14:28:57 fetching corpus: 386, signal 88894/98399 (executing program)
2022/09/12 14:28:57 fetching corpus: 436, signal 92948/103094 (executing program)
2022/09/12 14:28:57 fetching corpus: 486, signal 97431/108016 (executing program)
2022/09/12 14:28:57 fetching corpus: 535, signal 100741/111918 (executing program)
2022/09/12 14:28:57 fetching corpus: 583, signal 104074/115737 (executing program)
2022/09/12 14:28:58 fetching corpus: 632, signal 106203/118426 (executing program)
2022/09/12 14:28:58 fetching corpus: 682, signal 109007/121627 (executing program)
2022/09/12 14:28:58 fetching corpus: 732, signal 111434/124546 (executing program)
2022/09/12 14:28:58 fetching corpus: 782, signal 113398/126979 (executing program)
2022/09/12 14:28:58 fetching corpus: 832, signal 116251/130125 (executing program)
2022/09/12 14:28:58 fetching corpus: 879, signal 119594/133525 (executing program)
2022/09/12 14:28:58 fetching corpus: 928, signal 122047/136232 (executing program)
2022/09/12 14:28:59 fetching corpus: 978, signal 124022/138500 (executing program)
2022/09/12 14:28:59 fetching corpus: 1028, signal 125377/140219 (executing program)
2022/09/12 14:28:59 fetching corpus: 1078, signal 127161/142243 (executing program)
2022/09/12 14:28:59 fetching corpus: 1128, signal 129606/144670 (executing program)
2022/09/12 14:28:59 fetching corpus: 1178, signal 131235/146524 (executing program)
2022/09/12 14:28:59 fetching corpus: 1228, signal 133716/148937 (executing program)
2022/09/12 14:29:00 fetching corpus: 1277, signal 135166/150575 (executing program)
2022/09/12 14:29:00 fetching corpus: 1327, signal 136820/152362 (executing program)
2022/09/12 14:29:00 fetching corpus: 1377, signal 137971/153765 (executing program)
2022/09/12 14:29:00 fetching corpus: 1427, signal 139015/155067 (executing program)
2022/09/12 14:29:00 fetching corpus: 1477, signal 140657/156722 (executing program)
2022/09/12 14:29:00 fetching corpus: 1527, signal 142497/158424 (executing program)
2022/09/12 14:29:00 fetching corpus: 1577, signal 144177/160018 (executing program)
2022/09/12 14:29:00 fetching corpus: 1627, signal 146073/161689 (executing program)
2022/09/12 14:29:01 fetching corpus: 1677, signal 147963/163298 (executing program)
2022/09/12 14:29:01 fetching corpus: 1727, signal 149441/164646 (executing program)
2022/09/12 14:29:01 fetching corpus: 1777, signal 150616/165794 (executing program)
2022/09/12 14:29:01 fetching corpus: 1827, signal 151661/166800 (executing program)
2022/09/12 14:29:01 fetching corpus: 1877, signal 152545/167727 (executing program)
2022/09/12 14:29:01 fetching corpus: 1927, signal 154194/169038 (executing program)
2022/09/12 14:29:02 fetching corpus: 1977, signal 154913/169837 (executing program)
2022/09/12 14:29:02 fetching corpus: 2027, signal 156326/171015 (executing program)
2022/09/12 14:29:02 fetching corpus: 2077, signal 157378/171943 (executing program)
2022/09/12 14:29:02 fetching corpus: 2127, signal 158614/173079 (executing program)
2022/09/12 14:29:02 fetching corpus: 2177, signal 160027/174207 (executing program)
2022/09/12 14:29:02 fetching corpus: 2227, signal 161027/175025 (executing program)
2022/09/12 14:29:03 fetching corpus: 2277, signal 162274/175970 (executing program)
2022/09/12 14:29:03 fetching corpus: 2327, signal 163406/176777 (executing program)
2022/09/12 14:29:03 fetching corpus: 2376, signal 164691/177669 (executing program)
2022/09/12 14:29:03 fetching corpus: 2426, signal 166258/178666 (executing program)
2022/09/12 14:29:03 fetching corpus: 2476, signal 167260/179465 (executing program)
2022/09/12 14:29:03 fetching corpus: 2526, signal 169016/180473 (executing program)
2022/09/12 14:29:03 fetching corpus: 2576, signal 169594/180950 (executing program)
2022/09/12 14:29:04 fetching corpus: 2626, signal 170560/181571 (executing program)
2022/09/12 14:29:04 fetching corpus: 2676, signal 171660/182429 (executing program)
2022/09/12 14:29:04 fetching corpus: 2726, signal 173472/183366 (executing program)
2022/09/12 14:29:04 fetching corpus: 2776, signal 174343/183878 (executing program)
2022/09/12 14:29:04 fetching corpus: 2826, signal 175224/184456 (executing program)
2022/09/12 14:29:04 fetching corpus: 2876, signal 175953/184874 (executing program)
2022/09/12 14:29:05 fetching corpus: 2926, signal 176443/185247 (executing program)
2022/09/12 14:29:05 fetching corpus: 2976, signal 177394/185749 (executing program)
2022/09/12 14:29:05 fetching corpus: 3026, signal 178175/186156 (executing program)
2022/09/12 14:29:05 fetching corpus: 3076, signal 178838/186488 (executing program)
2022/09/12 14:29:05 fetching corpus: 3126, signal 179635/186883 (executing program)
2022/09/12 14:29:05 fetching corpus: 3176, signal 180388/187238 (executing program)
2022/09/12 14:29:05 fetching corpus: 3226, signal 181400/187729 (executing program)
2022/09/12 14:29:06 fetching corpus: 3276, signal 182421/188131 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/188391 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/188461 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/188546 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/188638 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/188719 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/188796 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/188881 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/188959 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/189031 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/189114 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/189191 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/189249 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/189321 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/189405 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/189468 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/189552 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/189616 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/189693 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/189776 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/189846 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/189935 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/190011 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/190086 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/190161 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/190247 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/190279 (executing program)
2022/09/12 14:29:06 fetching corpus: 3299, signal 182994/190279 (executing program)
2022/09/12 14:29:09 starting 8 fuzzer processes
14:29:09 executing program 0:
syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[])
chdir(&(0x7f0000000000)='./file0\x00')
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
unlink(&(0x7f00000001c0)='./file1\x00')
fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0)
14:29:09 executing program 1:
r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[])
ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000))
14:29:09 executing program 2:
r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000440), 0x0)
ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000540)={{}, 0x0, 0x0, 'id0\x00', 'timer0\x00'})
14:29:09 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'lo\x00', &(0x7f00000000c0)=@ethtool_dump={0x3f}})
[   64.714670] audit: type=1400 audit(1662992949.475:6): avc:  denied  { execmem } for  pid=286 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1
14:29:09 executing program 4:
r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, 0x0)
14:29:09 executing program 5:
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x1a, 0x1b, 0x1f5, &(0x7f00000004c0)})
14:29:09 executing program 6:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0)
fcntl$setlease(r0, 0x400, 0x1)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]})
epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00')
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
14:29:09 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsopen(0x0, 0x0)
r1 = socket$inet6_udp(0xa, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
sendmmsg$inet(r2, &(0x7f0000000a80)=[{{&(0x7f0000000080)={0x2, 0x4e22, @local}, 0x10, 0x0}}, {{&(0x7f0000000600)={0x2, 0x4e24, @broadcast}, 0x10, 0x0}}], 0x2, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
fsetxattr$security_evm(r0, &(0x7f0000000000), &(0x7f0000000040)=@sha1={0x1, "5ca1565e3a3fb9f311355d48fc675cb77cca91b7"}, 0x15, 0x1)
[   66.057445] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[   66.059017] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[   66.061309] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[   66.066316] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[   66.068346] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1
[   66.069858] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3
[   66.071307] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[   66.074520] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9
[   66.078696] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9
[   66.079460] Bluetooth: hci0: HCI_REQ-0x0c1a
[   66.086017] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4
[   66.088020] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3
[   66.089008] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2
[   66.097723] Bluetooth: hci1: HCI_REQ-0x0c1a
[   66.104062] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1
[   66.111411] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9
[   66.118802] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9
[   66.126359] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4
[   66.128715] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3
[   66.129666] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2
[   66.137194] Bluetooth: hci3: HCI_REQ-0x0c1a
[   66.160787] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1
[   66.162492] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1
[   66.165957] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1
[   66.167139] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9
[   66.171446] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9
[   66.172604] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9
[   66.174330] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9
[   66.178554] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9
[   66.178723] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9
[   66.210400] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4
[   66.212027] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4
[   66.213879] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3
[   66.215409] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2
[   66.219781] Bluetooth: hci7: HCI_REQ-0x0c1a
[   66.236423] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3
[   66.240403] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4
[   66.241654] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2
[   66.257444] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3
[   66.260922] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2
[   66.264405] Bluetooth: hci6: HCI_REQ-0x0c1a
[   66.274161] Bluetooth: hci5: HCI_REQ-0x0c1a
[   66.291968] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1
[   66.294031] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9
[   66.295013] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9
[   66.323664] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4
[   66.328381] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3
[   66.332706] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2
[   66.344634] Bluetooth: hci2: HCI_REQ-0x0c1a
[   68.134841] Bluetooth: hci1: command 0x0409 tx timeout
[   68.135232] Bluetooth: hci4: Opcode 0x c03 failed: -110
[   68.137486] Bluetooth: hci0: command 0x0409 tx timeout
[   68.198176] Bluetooth: hci3: command 0x0409 tx timeout
[   68.262144] Bluetooth: hci7: command 0x0409 tx timeout
[   68.327354] Bluetooth: hci5: command 0x0409 tx timeout
[   68.328138] Bluetooth: hci6: command 0x0409 tx timeout
[   68.391306] Bluetooth: hci2: command 0x0409 tx timeout
[   70.183185] Bluetooth: hci0: command 0x041b tx timeout
[   70.183928] Bluetooth: hci1: command 0x041b tx timeout
[   70.247181] Bluetooth: hci3: command 0x041b tx timeout
[   70.310206] Bluetooth: hci7: command 0x041b tx timeout
[   70.375221] Bluetooth: hci6: command 0x041b tx timeout
[   70.376691] Bluetooth: hci5: command 0x041b tx timeout
[   70.438217] Bluetooth: hci2: command 0x041b tx timeout
[   71.433610] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1
[   71.436390] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9
[   71.438349] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9
[   71.444719] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4
[   71.457863] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3
[   71.462586] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2
[   71.476144] Bluetooth: hci4: HCI_REQ-0x0c1a
[   72.230275] Bluetooth: hci1: command 0x040f tx timeout
[   72.232571] Bluetooth: hci0: command 0x040f tx timeout
[   72.294152] Bluetooth: hci3: command 0x040f tx timeout
[   72.359347] Bluetooth: hci7: command 0x040f tx timeout
[   72.422190] Bluetooth: hci5: command 0x040f tx timeout
[   72.424916] Bluetooth: hci6: command 0x040f tx timeout
[   72.486165] Bluetooth: hci2: command 0x040f tx timeout
[   73.511165] Bluetooth: hci4: command 0x0409 tx timeout
[   74.279127] Bluetooth: hci0: command 0x0419 tx timeout
[   74.279581] Bluetooth: hci1: command 0x0419 tx timeout
[   74.343176] Bluetooth: hci3: command 0x0419 tx timeout
[   74.407171] Bluetooth: hci7: command 0x0419 tx timeout
[   74.471124] Bluetooth: hci6: command 0x0419 tx timeout
[   74.471543] Bluetooth: hci5: command 0x0419 tx timeout
[   74.535137] Bluetooth: hci2: command 0x0419 tx timeout
[   75.559186] Bluetooth: hci4: command 0x041b tx timeout
[   77.606123] Bluetooth: hci4: command 0x040f tx timeout
[   79.654178] Bluetooth: hci4: command 0x0419 tx timeout
14:30:04 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'lo\x00', &(0x7f00000000c0)=@ethtool_dump={0x3f}})
14:30:04 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'lo\x00', &(0x7f00000000c0)=@ethtool_dump={0x3f}})
14:30:04 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'lo\x00', &(0x7f00000000c0)=@ethtool_dump={0x3f}})
14:30:04 executing program 3:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r1})
[  119.701304] loop1: detected capacity change from 0 to 40
[  119.766273] audit: type=1326 audit(1662993004.529:7): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=3821 comm="syz-executor.6" exe="/syz-executor.6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f7ebc79db19 code=0x0
14:30:04 executing program 1:
r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[])
ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000))
14:30:04 executing program 5:
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x1a, 0x1b, 0x1f5, &(0x7f00000004c0)})
[  119.868692] audit: type=1400 audit(1662993004.631:8): avc:  denied  { open } for  pid=3821 comm="syz-executor.6" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1
[  119.870232] audit: type=1400 audit(1662993004.631:9): avc:  denied  { kernel } for  pid=3821 comm="syz-executor.6" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1
[  119.877183] ------------[ cut here ]------------
[  119.877203] 
[  119.877206] ======================================================
[  119.877210] WARNING: possible circular locking dependency detected
[  119.877214] 6.0.0-rc5-next-20220912 #1 Not tainted
[  119.877221] ------------------------------------------------------
[  119.877224] syz-executor.6/3830 is trying to acquire lock:
[  119.877230] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70
[  119.877272] 
[  119.877272] but task is already holding lock:
[  119.877274] ffff88800f473020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0
[  119.877305] 
[  119.877305] which lock already depends on the new lock.
[  119.877305] 
[  119.877308] 
[  119.877308] the existing dependency chain (in reverse order) is:
[  119.877312] 
[  119.877312] -> #3 (&ctx->lock){....}-{2:2}:
[  119.877325]        _raw_spin_lock+0x2a/0x40
[  119.877343]        __perf_event_task_sched_out+0x53b/0x18d0
[  119.877355]        __schedule+0xedd/0x2470
[  119.877365]        schedule+0xda/0x1b0
[  119.877374]        exit_to_user_mode_prepare+0x114/0x1a0
[  119.877395]        syscall_exit_to_user_mode+0x19/0x40
[  119.877413]        do_syscall_64+0x48/0x90
[  119.877427]        entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  119.877444] 
[  119.877444] -> #2 (&rq->__lock){-.-.}-{2:2}:
[  119.877458]        _raw_spin_lock_nested+0x30/0x40
[  119.877472]        raw_spin_rq_lock_nested+0x1e/0x30
[  119.877486]        task_fork_fair+0x63/0x4d0
[  119.877503]        sched_cgroup_fork+0x3d0/0x540
[  119.877518]        copy_process+0x3f9e/0x6df0
[  119.877528]        kernel_clone+0xe7/0x890
[  119.877538]        user_mode_thread+0xad/0xf0
[  119.877548]        rest_init+0x24/0x250
[  119.877565]        arch_call_rest_init+0xf/0x14
[  119.877584]        start_kernel+0x4c1/0x4e6
[  119.877601]        secondary_startup_64_no_verify+0xe0/0xeb
[  119.877616] 
[  119.877616] -> #1 (&p->pi_lock){-.-.}-{2:2}:
[  119.877629]        _raw_spin_lock_irqsave+0x39/0x60
[  119.877644]        try_to_wake_up+0xab/0x1920
[  119.877658]        up+0x75/0xb0
[  119.877669]        __up_console_sem+0x6e/0x80
[  119.877685]        console_unlock+0x46a/0x590
[  119.877702]        con_install+0x14e/0x5d0
[  119.877722]        tty_init_dev.part.0+0xa0/0x610
[  119.877735]        tty_open+0xbc0/0x1370
[  119.877746]        chrdev_open+0x268/0x6e0
[  119.877759]        do_dentry_open+0x6ca/0x12b0
[  119.877773]        path_openat+0x19e1/0x2800
[  119.877785]        do_filp_open+0x1b6/0x410
[  119.877796]        do_sys_openat2+0x171/0x4c0
[  119.877811]        __x64_sys_openat+0x13f/0x1f0
[  119.877826]        do_syscall_64+0x3b/0x90
[  119.877838]        entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  119.877855] 
[  119.877855] -> #0 ((console_sem).lock){....}-{2:2}:
[  119.877869]        __lock_acquire+0x2a02/0x5e70
[  119.877886]        lock_acquire+0x1a2/0x530
[  119.877902]        _raw_spin_lock_irqsave+0x39/0x60
[  119.877917]        down_trylock+0xe/0x70
[  119.877929]        __down_trylock_console_sem+0x3b/0xd0
[  119.877945]        vprintk_emit+0x16b/0x560
[  119.877962]        vprintk+0x84/0xa0
[  119.877979]        _printk+0xba/0xf1
[  119.877997]        report_bug.cold+0x72/0xab
[  119.878009]        handle_bug+0x3c/0x70
[  119.878021]        exc_invalid_op+0x14/0x50
[  119.878034]        asm_exc_invalid_op+0x16/0x20
[  119.878050]        group_sched_out.part.0+0x2c7/0x460
[  119.878061]        ctx_sched_out+0x8f1/0xc10
[  119.878070]        __perf_event_task_sched_out+0x6d0/0x18d0
[  119.878097]        __schedule+0xedd/0x2470
[  119.878107]        schedule+0xda/0x1b0
[  119.878116]        exit_to_user_mode_prepare+0x114/0x1a0
[  119.878135]        syscall_exit_to_user_mode+0x19/0x40
[  119.878152]        do_syscall_64+0x48/0x90
[  119.878165]        entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  119.878181] 
[  119.878181] other info that might help us debug this:
[  119.878181] 
[  119.878184] Chain exists of:
[  119.878184]   (console_sem).lock --> &rq->__lock --> &ctx->lock
[  119.878184] 
[  119.878199]  Possible unsafe locking scenario:
[  119.878199] 
[  119.878202]        CPU0                    CPU1
[  119.878204]        ----                    ----
[  119.878206]   lock(&ctx->lock);
[  119.878212]                                lock(&rq->__lock);
[  119.878219]                                lock(&ctx->lock);
[  119.878225]   lock((console_sem).lock);
[  119.878230] 
[  119.878230]  *** DEADLOCK ***
[  119.878230] 
[  119.878232] 2 locks held by syz-executor.6/3830:
[  119.878239]  #0: ffff88806cf37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470
[  119.878267]  #1: ffff88800f473020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0
[  119.878297] 
[  119.878297] stack backtrace:
[  119.878300] CPU: 1 PID: 3830 Comm: syz-executor.6 Not tainted 6.0.0-rc5-next-20220912 #1
[  119.878313] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[  119.878322] Call Trace:
[  119.878325]  
[  119.878329]  dump_stack_lvl+0x8b/0xb3
[  119.878343]  check_noncircular+0x263/0x2e0
[  119.878360]  ? format_decode+0x26c/0xb50
[  119.878375]  ? print_circular_bug+0x450/0x450
[  119.878392]  ? enable_ptr_key_workfn+0x20/0x20
[  119.878406]  ? __lockdep_reset_lock+0x180/0x180
[  119.878423]  ? format_decode+0x26c/0xb50
[  119.878438]  ? alloc_chain_hlocks+0x1ec/0x5a0
[  119.878456]  __lock_acquire+0x2a02/0x5e70
[  119.878478]  ? lockdep_hardirqs_on_prepare+0x410/0x410
[  119.878501]  lock_acquire+0x1a2/0x530
[  119.878518]  ? down_trylock+0xe/0x70
[  119.878533]  ? rcu_read_unlock+0x40/0x40
[  119.878551]  ? lockdep_hardirqs_on_prepare+0x410/0x410
[  119.878572]  ? vprintk+0x84/0xa0
[  119.878591]  _raw_spin_lock_irqsave+0x39/0x60
[  119.878606]  ? down_trylock+0xe/0x70
[  119.878620]  down_trylock+0xe/0x70
[  119.878633]  ? vprintk+0x84/0xa0
[  119.878651]  __down_trylock_console_sem+0x3b/0xd0
[  119.878669]  vprintk_emit+0x16b/0x560
[  119.878686]  ? lock_downgrade+0x6d0/0x6d0
[  119.878705]  vprintk+0x84/0xa0
[  119.878723]  _printk+0xba/0xf1
[  119.878741]  ? record_print_text.cold+0x16/0x16
[  119.878761]  ? hrtimer_try_to_cancel+0x163/0x2c0
[  119.878775]  ? lock_downgrade+0x6d0/0x6d0
[  119.878793]  ? report_bug.cold+0x66/0xab
[  119.878806]  ? group_sched_out.part.0+0x2c7/0x460
[  119.878818]  report_bug.cold+0x72/0xab
[  119.878833]  handle_bug+0x3c/0x70
[  119.878846]  exc_invalid_op+0x14/0x50
[  119.878860]  asm_exc_invalid_op+0x16/0x20
[  119.878877] RIP: 0010:group_sched_out.part.0+0x2c7/0x460
[  119.878890] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00
[  119.878903] RSP: 0018:ffff88803f897c48 EFLAGS: 00010006
[  119.878912] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000
[  119.878920] RDX: ffff8880182a8000 RSI: ffffffff81566027 RDI: 0000000000000005
[  119.878928] RBP: ffff88803f898000 R08: 0000000000000005 R09: 0000000000000001
[  119.878935] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800f473000
[  119.878943] R13: ffff88806cf3d100 R14: ffffffff8547bfc0 R15: 0000000000000002
[  119.878954]  ? group_sched_out.part.0+0x2c7/0x460
[  119.878967]  ? group_sched_out.part.0+0x2c7/0x460
[  119.878979]  ctx_sched_out+0x8f1/0xc10
[  119.878992]  __perf_event_task_sched_out+0x6d0/0x18d0
[  119.879007]  ? lock_is_held_type+0xd7/0x130
[  119.879026]  ? __perf_cgroup_move+0x160/0x160
[  119.879038]  ? set_next_entity+0x304/0x550
[  119.879056]  ? update_curr+0x267/0x740
[  119.879075]  ? lock_is_held_type+0xd7/0x130
[  119.879093]  __schedule+0xedd/0x2470
[  119.879106]  ? io_schedule_timeout+0x150/0x150
[  119.879118]  ? __x64_sys_futex_time32+0x480/0x480
[  119.879132]  schedule+0xda/0x1b0
[  119.879142]  exit_to_user_mode_prepare+0x114/0x1a0
[  119.879164]  syscall_exit_to_user_mode+0x19/0x40
[  119.879182]  do_syscall_64+0x48/0x90
[  119.879195]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  119.879213] RIP: 0033:0x7f7ebc79db19
[  119.879221] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  119.879232] RSP: 002b:00007f7eb9cf2218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
[  119.879243] RAX: 0000000000000001 RBX: 00007f7ebc8b1028 RCX: 00007f7ebc79db19
[  119.879251] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f7ebc8b102c
[  119.879258] RBP: 00007f7ebc8b1020 R08: 000000000000000e R09: 0000000000000000
[  119.879265] R10: 0000000000000004 R11: 0000000000000246 R12: 00007f7ebc8b102c
[  119.879273] R13: 00007fffffbe594f R14: 00007f7eb9cf2300 R15: 0000000000022000
[  119.879285]  
[  119.938797] WARNING: CPU: 1 PID: 3830 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460
[  119.939494] Modules linked in:
[  119.939745] CPU: 1 PID: 3830 Comm: syz-executor.6 Not tainted 6.0.0-rc5-next-20220912 #1
[  119.940354] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[  119.941200] RIP: 0010:group_sched_out.part.0+0x2c7/0x460
[  119.941610] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00
[  119.942970] RSP: 0018:ffff88803f897c48 EFLAGS: 00010006
[  119.943371] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000
[  119.943906] RDX: ffff8880182a8000 RSI: ffffffff81566027 RDI: 0000000000000005
[  119.944404] RBP: ffff88803f898000 R08: 0000000000000005 R09: 0000000000000001
[  119.944939] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800f473000
[  119.945475] R13: ffff88806cf3d100 R14: ffffffff8547bfc0 R15: 0000000000000002
[  119.945986] FS:  00007f7eb9cf2700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000
[  119.946577] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  119.947024] CR2: 000055ccb34039e8 CR3: 0000000033eda000 CR4: 0000000000350ee0
[  119.947549] Call Trace:
[  119.947737]  
[  119.947902]  ctx_sched_out+0x8f1/0xc10
[  119.948202]  __perf_event_task_sched_out+0x6d0/0x18d0
[  119.948590]  ? lock_is_held_type+0xd7/0x130
[  119.948921]  ? __perf_cgroup_move+0x160/0x160
[  119.949260]  ? set_next_entity+0x304/0x550
[  119.949589]  ? update_curr+0x267/0x740
[  119.949888]  ? lock_is_held_type+0xd7/0x130
[  119.950225]  __schedule+0xedd/0x2470
[  119.950521]  ? io_schedule_timeout+0x150/0x150
[  119.950870]  ? __x64_sys_futex_time32+0x480/0x480
[  119.951232]  schedule+0xda/0x1b0
[  119.951489]  exit_to_user_mode_prepare+0x114/0x1a0
[  119.951868]  syscall_exit_to_user_mode+0x19/0x40
[  119.952240]  do_syscall_64+0x48/0x90
[  119.952531]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  119.952921] RIP: 0033:0x7f7ebc79db19
[  119.953200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  119.954554] RSP: 002b:00007f7eb9cf2218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
[  119.955105] RAX: 0000000000000001 RBX: 00007f7ebc8b1028 RCX: 00007f7ebc79db19
[  119.955636] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f7ebc8b102c
[  119.956171] RBP: 00007f7ebc8b1020 R08: 000000000000000e R09: 0000000000000000
[  119.956722] R10: 0000000000000004 R11: 0000000000000246 R12: 00007f7ebc8b102c
[  119.957277] R13: 00007fffffbe594f R14: 00007f7eb9cf2300 R15: 0000000000022000
[  119.957819]  
[  119.957996] irq event stamp: 454
[  119.958258] hardirqs last  enabled at (453): [] exit_to_user_mode_prepare+0x109/0x1a0
[  119.958988] hardirqs last disabled at (454): [] __schedule+0x1225/0x2470
[  119.959594] softirqs last  enabled at (226): [] __irq_exit_rcu+0x11b/0x180
[  119.960243] softirqs last disabled at (217): [] __irq_exit_rcu+0x11b/0x180
[  119.960891] ---[ end trace 0000000000000000 ]---
[  119.980344] loop1: detected capacity change from 0 to 40
14:30:04 executing program 3:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r1})
14:30:04 executing program 3:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r1})
[  120.506111] hrtimer: interrupt took 37060 ns
[  120.582552] audit: type=1326 audit(1662993005.346:10): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=3821 comm="syz-executor.6" exe="/syz-executor.6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f7ebc79db19 code=0x0
[  121.587764] loop0: detected capacity change from 0 to 40
14:30:08 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsopen(0x0, 0x0)
r1 = socket$inet6_udp(0xa, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
sendmmsg$inet(r2, &(0x7f0000000a80)=[{{&(0x7f0000000080)={0x2, 0x4e22, @local}, 0x10, 0x0}}, {{&(0x7f0000000600)={0x2, 0x4e24, @broadcast}, 0x10, 0x0}}], 0x2, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
fsetxattr$security_evm(r0, &(0x7f0000000000), &(0x7f0000000040)=@sha1={0x1, "5ca1565e3a3fb9f311355d48fc675cb77cca91b7"}, 0x15, 0x1)
14:30:08 executing program 1:
r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[])
ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000))
14:30:08 executing program 3:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r1})
14:30:08 executing program 5:
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x1a, 0x1b, 0x1f5, &(0x7f00000004c0)})
14:30:08 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsopen(0x0, 0x0)
r1 = socket$inet6_udp(0xa, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
sendmmsg$inet(r2, &(0x7f0000000a80)=[{{&(0x7f0000000080)={0x2, 0x4e22, @local}, 0x10, 0x0}}, {{&(0x7f0000000600)={0x2, 0x4e24, @broadcast}, 0x10, 0x0}}], 0x2, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
fsetxattr$security_evm(r0, &(0x7f0000000000), &(0x7f0000000040)=@sha1={0x1, "5ca1565e3a3fb9f311355d48fc675cb77cca91b7"}, 0x15, 0x1)
14:30:08 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0)
fcntl$setlease(r0, 0x400, 0x1)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]})
epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00')
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
14:30:08 executing program 2:
r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000440), 0x0)
ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000540)={{}, 0x0, 0x0, 'id0\x00', 'timer0\x00'})
14:30:08 executing program 6:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0)
fcntl$setlease(r0, 0x400, 0x1)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]})
epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00')
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
[  123.501989] audit: type=1326 audit(1662993008.265:11): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=3980 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f1c865ccb19 code=0x0
[  123.502853] audit: type=1326 audit(1662993008.266:12): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=3978 comm="syz-executor.6" exe="/syz-executor.6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f7ebc79db19 code=0x0
[  123.521433] loop1: detected capacity change from 0 to 40
[  124.404039] loop1: detected capacity change from 0 to 40
14:30:09 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsopen(0x0, 0x0)
r1 = socket$inet6_udp(0xa, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
sendmmsg$inet(r2, &(0x7f0000000a80)=[{{&(0x7f0000000080)={0x2, 0x4e22, @local}, 0x10, 0x0}}, {{&(0x7f0000000600)={0x2, 0x4e24, @broadcast}, 0x10, 0x0}}], 0x2, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
fsetxattr$security_evm(r0, &(0x7f0000000000), &(0x7f0000000040)=@sha1={0x1, "5ca1565e3a3fb9f311355d48fc675cb77cca91b7"}, 0x15, 0x1)
14:30:09 executing program 2:
r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000440), 0x0)
ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000540)={{}, 0x0, 0x0, 'id0\x00', 'timer0\x00'})
14:30:09 executing program 1:
r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[])
ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000))
14:30:09 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsopen(0x0, 0x0)
r1 = socket$inet6_udp(0xa, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
sendmmsg$inet(r2, &(0x7f0000000a80)=[{{&(0x7f0000000080)={0x2, 0x4e22, @local}, 0x10, 0x0}}, {{&(0x7f0000000600)={0x2, 0x4e24, @broadcast}, 0x10, 0x0}}], 0x2, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
fsetxattr$security_evm(r0, &(0x7f0000000000), &(0x7f0000000040)=@sha1={0x1, "5ca1565e3a3fb9f311355d48fc675cb77cca91b7"}, 0x15, 0x1)
14:30:09 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsopen(0x0, 0x0)
r1 = socket$inet6_udp(0xa, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
sendmmsg$inet(r2, &(0x7f0000000a80)=[{{&(0x7f0000000080)={0x2, 0x4e22, @local}, 0x10, 0x0}}, {{&(0x7f0000000600)={0x2, 0x4e24, @broadcast}, 0x10, 0x0}}], 0x2, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
fsetxattr$security_evm(r0, &(0x7f0000000000), &(0x7f0000000040)=@sha1={0x1, "5ca1565e3a3fb9f311355d48fc675cb77cca91b7"}, 0x15, 0x1)
14:30:09 executing program 5:
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x1a, 0x1b, 0x1f5, &(0x7f00000004c0)})
14:30:09 executing program 6:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0)
fcntl$setlease(r0, 0x400, 0x1)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]})
epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00')
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
14:30:09 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0)
fcntl$setlease(r0, 0x400, 0x1)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]})
epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00')
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
14:30:09 executing program 2:
r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000440), 0x0)
ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000540)={{}, 0x0, 0x0, 'id0\x00', 'timer0\x00'})
14:30:09 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsopen(0x0, 0x0)
r1 = socket$inet6_udp(0xa, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
sendmmsg$inet(r2, &(0x7f0000000a80)=[{{&(0x7f0000000080)={0x2, 0x4e22, @local}, 0x10, 0x0}}, {{&(0x7f0000000600)={0x2, 0x4e24, @broadcast}, 0x10, 0x0}}], 0x2, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
fsetxattr$security_evm(r0, &(0x7f0000000000), &(0x7f0000000040)=@sha1={0x1, "5ca1565e3a3fb9f311355d48fc675cb77cca91b7"}, 0x15, 0x1)
14:30:09 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsopen(0x0, 0x0)
r1 = socket$inet6_udp(0xa, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
sendmmsg$inet(r2, &(0x7f0000000a80)=[{{&(0x7f0000000080)={0x2, 0x4e22, @local}, 0x10, 0x0}}, {{&(0x7f0000000600)={0x2, 0x4e24, @broadcast}, 0x10, 0x0}}], 0x2, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
fsetxattr$security_evm(r0, &(0x7f0000000000), &(0x7f0000000040)=@sha1={0x1, "5ca1565e3a3fb9f311355d48fc675cb77cca91b7"}, 0x15, 0x1)
14:30:09 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsopen(0x0, 0x0)
r1 = socket$inet6_udp(0xa, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
sendmmsg$inet(r2, &(0x7f0000000a80)=[{{&(0x7f0000000080)={0x2, 0x4e22, @local}, 0x10, 0x0}}, {{&(0x7f0000000600)={0x2, 0x4e24, @broadcast}, 0x10, 0x0}}], 0x2, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
fsetxattr$security_evm(r0, &(0x7f0000000000), &(0x7f0000000040)=@sha1={0x1, "5ca1565e3a3fb9f311355d48fc675cb77cca91b7"}, 0x15, 0x1)
[  124.492550] audit: type=1326 audit(1662993009.256:13): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4003 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f1c865ccb19 code=0x0
[  124.521665] audit: type=1326 audit(1662993009.285:14): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4005 comm="syz-executor.6" exe="/syz-executor.6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f7ebc79db19 code=0x0
14:30:10 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0)
fcntl$setlease(r0, 0x400, 0x1)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]})
epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00')
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
14:30:10 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsopen(0x0, 0x0)
r1 = socket$inet6_udp(0xa, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
sendmmsg$inet(r2, &(0x7f0000000a80)=[{{&(0x7f0000000080)={0x2, 0x4e22, @local}, 0x10, 0x0}}, {{&(0x7f0000000600)={0x2, 0x4e24, @broadcast}, 0x10, 0x0}}], 0x2, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
fsetxattr$security_evm(r0, &(0x7f0000000000), &(0x7f0000000040)=@sha1={0x1, "5ca1565e3a3fb9f311355d48fc675cb77cca91b7"}, 0x15, 0x1)
14:30:10 executing program 5:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
lseek(r0, 0x0, 0x3)
14:30:10 executing program 0:
prctl$PR_SCHED_CORE(0x21, 0x0, 0x0, 0x0, 0x0)
14:30:10 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsopen(0x0, 0x0)
r1 = socket$inet6_udp(0xa, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
sendmmsg$inet(r2, &(0x7f0000000a80)=[{{&(0x7f0000000080)={0x2, 0x4e22, @local}, 0x10, 0x0}}, {{&(0x7f0000000600)={0x2, 0x4e24, @broadcast}, 0x10, 0x0}}], 0x2, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
fsetxattr$security_evm(r0, &(0x7f0000000000), &(0x7f0000000040)=@sha1={0x1, "5ca1565e3a3fb9f311355d48fc675cb77cca91b7"}, 0x15, 0x1)
14:30:10 executing program 6:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0)
fcntl$setlease(r0, 0x400, 0x1)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]})
epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00')
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
14:30:10 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsopen(0x0, 0x0)
r1 = socket$inet6_udp(0xa, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
sendmmsg$inet(r2, &(0x7f0000000a80)=[{{&(0x7f0000000080)={0x2, 0x4e22, @local}, 0x10, 0x0}}, {{&(0x7f0000000600)={0x2, 0x4e24, @broadcast}, 0x10, 0x0}}], 0x2, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
fsetxattr$security_evm(r0, &(0x7f0000000000), &(0x7f0000000040)=@sha1={0x1, "5ca1565e3a3fb9f311355d48fc675cb77cca91b7"}, 0x15, 0x1)
14:30:10 executing program 2:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r0)
r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f00000000c0)={0x14, r1, 0x1}, 0x14}}, 0x0)
[  125.463769] audit: type=1326 audit(1662993010.227:15): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4033 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f1c865ccb19 code=0x0
14:30:10 executing program 0:
prctl$PR_SCHED_CORE(0x21, 0x0, 0x0, 0x0, 0x0)
[  125.514776] audit: type=1326 audit(1662993010.278:16): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4036 comm="syz-executor.6" exe="/syz-executor.6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f7ebc79db19 code=0x0
14:30:10 executing program 2:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r0)
r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f00000000c0)={0x14, r1, 0x1}, 0x14}}, 0x0)
14:30:10 executing program 5:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
lseek(r0, 0x0, 0x3)
14:30:10 executing program 0:
prctl$PR_SCHED_CORE(0x21, 0x0, 0x0, 0x0, 0x0)
14:30:10 executing program 2:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r0)
r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f00000000c0)={0x14, r1, 0x1}, 0x14}}, 0x0)
14:30:10 executing program 5:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
lseek(r0, 0x0, 0x3)
14:30:10 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsopen(0x0, 0x0)
r1 = socket$inet6_udp(0xa, 0x2, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
sendmmsg$inet(r2, &(0x7f0000000a80)=[{{&(0x7f0000000080)={0x2, 0x4e22, @local}, 0x10, 0x0}}, {{&(0x7f0000000600)={0x2, 0x4e24, @broadcast}, 0x10, 0x0}}], 0x2, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
fsetxattr$security_evm(r0, &(0x7f0000000000), &(0x7f0000000040)=@sha1={0x1, "5ca1565e3a3fb9f311355d48fc675cb77cca91b7"}, 0x15, 0x1)
14:30:10 executing program 0:
prctl$PR_SCHED_CORE(0x21, 0x0, 0x0, 0x0, 0x0)
14:30:11 executing program 2:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r0)
r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f00000000c0)={0x14, r1, 0x1}, 0x14}}, 0x0)
14:30:11 executing program 1:
syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr=0x64010100, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}, {"62d77cc6dc02115f70ae9549d192486c126f23f4"}}}}}}, 0x0)
14:30:11 executing program 7:
r0 = socket$inet6(0xa, 0x1, 0x0)
connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x7f}, 0x1c)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000080)=0x8000, 0x4)
14:30:11 executing program 3:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0)
pwrite64(r1, &(0x7f0000000640)='2', 0x1, 0x0)
preadv2(r0, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/75, 0x4b}], 0x1, 0x0, 0x0, 0x8)
14:30:11 executing program 5:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0)
lseek(r0, 0x0, 0x3)
14:30:11 executing program 0:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000100)=[{0x4d}, {0x6}]})
ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0)
[  126.392606] sock: sock_timestamping_bind_phc: sock not bind to device
[  126.394942] sock: sock_timestamping_bind_phc: sock not bind to device
[  126.411597] audit: type=1326 audit(1662993011.175:17): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4070 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f76c5673b19 code=0x0
14:30:11 executing program 1:
syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr=0x64010100, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}, {"62d77cc6dc02115f70ae9549d192486c126f23f4"}}}}}}, 0x0)
14:30:11 executing program 3:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0)
pwrite64(r1, &(0x7f0000000640)='2', 0x1, 0x0)
preadv2(r0, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/75, 0x4b}], 0x1, 0x0, 0x0, 0x8)
14:30:11 executing program 7:
r0 = socket$inet6(0xa, 0x1, 0x0)
connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x7f}, 0x1c)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000080)=0x8000, 0x4)
[  126.523454] sock: sock_timestamping_bind_phc: sock not bind to device
14:30:11 executing program 4:
r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5}\x81\xdd4TZ\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7z\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1\x00', 0x5)
fallocate(r0, 0x3, 0x3, 0x7)
14:30:11 executing program 6:
r0 = socket$netlink(0x10, 0x3, 0x0)
lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100))
writev(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000580)="949a214e14e319b25fb9fba2f84a7a36f5100dbf166b50f7c367a9811d29686c08bd86557cecaf6eec1b509947fb9f994f8ed7e8b611fa63745e065faaccf70a757b406d9b850783c1c8cd6fd073691b3582224e3d3869978d385802afc4858f409e5d0fd4ebec35126744a62f9ddfafcf6b14528f2b977a331df3cad0370ff39d0bf3b1b91724be1356bc36ef829c", 0x8f}], 0x1)
syz_open_dev$ptys(0xc, 0x3, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001600)=ANY=[@ANYBLOB="280000001600e1b9"], 0x28}}, 0x0)
recvmmsg(r0, &(0x7f0000008f40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0)
14:30:11 executing program 5:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
shutdown(r0, 0x0)
poll(&(0x7f0000000180)=[{r0, 0x30a}], 0x1, 0x0)
14:30:11 executing program 3:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0)
pwrite64(r1, &(0x7f0000000640)='2', 0x1, 0x0)
preadv2(r0, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/75, 0x4b}], 0x1, 0x0, 0x0, 0x8)
14:30:11 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_timeval(r0, 0x1, 0xa, &(0x7f0000000200)={0x77359400}, 0x10)
14:30:11 executing program 7:
r0 = socket$inet6(0xa, 0x1, 0x0)
connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x7f}, 0x1c)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000080)=0x8000, 0x4)
14:30:11 executing program 1:
syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr=0x64010100, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}, {"62d77cc6dc02115f70ae9549d192486c126f23f4"}}}}}}, 0x0)
14:30:11 executing program 5:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
shutdown(r0, 0x0)
poll(&(0x7f0000000180)=[{r0, 0x30a}], 0x1, 0x0)
14:30:11 executing program 4:
r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5}\x81\xdd4TZ\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7z\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1\x00', 0x5)
fallocate(r0, 0x3, 0x3, 0x7)
[  126.678953] sock: sock_timestamping_bind_phc: sock not bind to device
14:30:11 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_timeval(r0, 0x1, 0xa, &(0x7f0000000200)={0x77359400}, 0x10)
14:30:11 executing program 5:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
shutdown(r0, 0x0)
poll(&(0x7f0000000180)=[{r0, 0x30a}], 0x1, 0x0)
[  126.808512] sock: sock_timestamping_bind_phc: sock not bind to device
14:30:11 executing program 7:
r0 = socket$inet6(0xa, 0x1, 0x0)
connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x7f}, 0x1c)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000080)=0x8000, 0x4)
[  127.231805] audit: type=1326 audit(1662993011.995:18): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4070 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f76c5673b19 code=0x0
14:30:12 executing program 3:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0)
pwrite64(r1, &(0x7f0000000640)='2', 0x1, 0x0)
preadv2(r0, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/75, 0x4b}], 0x1, 0x0, 0x0, 0x8)
14:30:12 executing program 1:
syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr=0x64010100, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}, {"62d77cc6dc02115f70ae9549d192486c126f23f4"}}}}}}, 0x0)
14:30:12 executing program 5:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
shutdown(r0, 0x0)
poll(&(0x7f0000000180)=[{r0, 0x30a}], 0x1, 0x0)
14:30:12 executing program 6:
r0 = socket$netlink(0x10, 0x3, 0x0)
lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100))
writev(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000580)="949a214e14e319b25fb9fba2f84a7a36f5100dbf166b50f7c367a9811d29686c08bd86557cecaf6eec1b509947fb9f994f8ed7e8b611fa63745e065faaccf70a757b406d9b850783c1c8cd6fd073691b3582224e3d3869978d385802afc4858f409e5d0fd4ebec35126744a62f9ddfafcf6b14528f2b977a331df3cad0370ff39d0bf3b1b91724be1356bc36ef829c", 0x8f}], 0x1)
syz_open_dev$ptys(0xc, 0x3, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001600)=ANY=[@ANYBLOB="280000001600e1b9"], 0x28}}, 0x0)
recvmmsg(r0, &(0x7f0000008f40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0)
14:30:12 executing program 0:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000100)=[{0x4d}, {0x6}]})
ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0)
14:30:12 executing program 7:
r0 = socket$netlink(0x10, 0x3, 0x0)
lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100))
writev(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000580)="949a214e14e319b25fb9fba2f84a7a36f5100dbf166b50f7c367a9811d29686c08bd86557cecaf6eec1b509947fb9f994f8ed7e8b611fa63745e065faaccf70a757b406d9b850783c1c8cd6fd073691b3582224e3d3869978d385802afc4858f409e5d0fd4ebec35126744a62f9ddfafcf6b14528f2b977a331df3cad0370ff39d0bf3b1b91724be1356bc36ef829c", 0x8f}], 0x1)
syz_open_dev$ptys(0xc, 0x3, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001600)=ANY=[@ANYBLOB="280000001600e1b9"], 0x28}}, 0x0)
recvmmsg(r0, &(0x7f0000008f40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0)
14:30:12 executing program 4:
r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5}\x81\xdd4TZ\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7z\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1\x00', 0x5)
fallocate(r0, 0x3, 0x3, 0x7)
14:30:12 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_timeval(r0, 0x1, 0xa, &(0x7f0000000200)={0x77359400}, 0x10)
[  127.402354] audit: type=1326 audit(1662993012.166:19): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4124 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f76c5673b19 code=0x0
14:30:12 executing program 4:
r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5}\x81\xdd4TZ\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7z\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1\x00', 0x5)
fallocate(r0, 0x3, 0x3, 0x7)
14:30:12 executing program 5:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000100)=[{0x4d}, {0x6}]})
ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0)
[  127.468907] audit: type=1326 audit(1662993012.232:20): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4128 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f8030b8db19 code=0x0
14:30:13 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_timeval(r0, 0x1, 0xa, &(0x7f0000000200)={0x77359400}, 0x10)
14:30:13 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
shutdown(r0, 0x0)
poll(&(0x7f0000000180)=[{r0, 0x30a}], 0x1, 0x0)
14:30:13 executing program 7:
r0 = socket$netlink(0x10, 0x3, 0x0)
lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100))
writev(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000580)="949a214e14e319b25fb9fba2f84a7a36f5100dbf166b50f7c367a9811d29686c08bd86557cecaf6eec1b509947fb9f994f8ed7e8b611fa63745e065faaccf70a757b406d9b850783c1c8cd6fd073691b3582224e3d3869978d385802afc4858f409e5d0fd4ebec35126744a62f9ddfafcf6b14528f2b977a331df3cad0370ff39d0bf3b1b91724be1356bc36ef829c", 0x8f}], 0x1)
syz_open_dev$ptys(0xc, 0x3, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001600)=ANY=[@ANYBLOB="280000001600e1b9"], 0x28}}, 0x0)
recvmmsg(r0, &(0x7f0000008f40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0)
14:30:13 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0)
write(r1, &(0x7f0000000200)='E', 0x4000)
sendfile(r1, r0, 0x0, 0x7fff)
14:30:13 executing program 4:
syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff)
ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0)
syz_genetlink_get_family_id$nl80211(&(0x7f0000002180), 0xffffffffffffffff)
14:30:13 executing program 6:
r0 = socket$netlink(0x10, 0x3, 0x0)
lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100))
writev(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000580)="949a214e14e319b25fb9fba2f84a7a36f5100dbf166b50f7c367a9811d29686c08bd86557cecaf6eec1b509947fb9f994f8ed7e8b611fa63745e065faaccf70a757b406d9b850783c1c8cd6fd073691b3582224e3d3869978d385802afc4858f409e5d0fd4ebec35126744a62f9ddfafcf6b14528f2b977a331df3cad0370ff39d0bf3b1b91724be1356bc36ef829c", 0x8f}], 0x1)
syz_open_dev$ptys(0xc, 0x3, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001600)=ANY=[@ANYBLOB="280000001600e1b9"], 0x28}}, 0x0)
recvmmsg(r0, &(0x7f0000008f40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0)
14:30:13 executing program 5:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000100)=[{0x4d}, {0x6}]})
ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0)
14:30:13 executing program 0:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000100)=[{0x4d}, {0x6}]})
ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0)
[  128.380338] audit: type=1326 audit(1662993013.141:21): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4137 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f76c5673b19 code=0x0
[  128.411196] audit: type=1326 audit(1662993013.174:22): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4147 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f8030b8db19 code=0x0
14:30:13 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
shutdown(r0, 0x0)
poll(&(0x7f0000000180)=[{r0, 0x30a}], 0x1, 0x0)
14:30:13 executing program 2:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000300))
14:30:13 executing program 7:
r0 = socket$netlink(0x10, 0x3, 0x0)
lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100))
writev(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000580)="949a214e14e319b25fb9fba2f84a7a36f5100dbf166b50f7c367a9811d29686c08bd86557cecaf6eec1b509947fb9f994f8ed7e8b611fa63745e065faaccf70a757b406d9b850783c1c8cd6fd073691b3582224e3d3869978d385802afc4858f409e5d0fd4ebec35126744a62f9ddfafcf6b14528f2b977a331df3cad0370ff39d0bf3b1b91724be1356bc36ef829c", 0x8f}], 0x1)
syz_open_dev$ptys(0xc, 0x3, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001600)=ANY=[@ANYBLOB="280000001600e1b9"], 0x28}}, 0x0)
recvmmsg(r0, &(0x7f0000008f40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0)
[  128.567784] loop2: detected capacity change from 0 to 40
14:30:13 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0)
write(r1, &(0x7f0000000200)='E', 0x4000)
sendfile(r1, r0, 0x0, 0x7fff)
14:30:13 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f00000001c0)={0x14, 0x3e, 0x101, 0x0, 0x0, "", [@nested={0xa}]}, 0x14}], 0x1}, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x5409, 0x0)
14:30:13 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
shutdown(r0, 0x0)
poll(&(0x7f0000000180)=[{r0, 0x30a}], 0x1, 0x0)
14:30:13 executing program 2:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000300))
[  128.767028] loop2: detected capacity change from 0 to 40
[  128.779202] syz-executor.3 (4163) used greatest stack depth: 24536 bytes left
14:30:13 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0)
write(r1, &(0x7f0000000200)='E', 0x4000)
sendfile(r1, r0, 0x0, 0x7fff)
14:30:14 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0)
write(r1, &(0x7f0000000200)='E', 0x4000)
sendfile(r1, r0, 0x0, 0x7fff)
14:30:14 executing program 2:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000300))
14:30:14 executing program 6:
r0 = socket$netlink(0x10, 0x3, 0x0)
lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100))
writev(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000580)="949a214e14e319b25fb9fba2f84a7a36f5100dbf166b50f7c367a9811d29686c08bd86557cecaf6eec1b509947fb9f994f8ed7e8b611fa63745e065faaccf70a757b406d9b850783c1c8cd6fd073691b3582224e3d3869978d385802afc4858f409e5d0fd4ebec35126744a62f9ddfafcf6b14528f2b977a331df3cad0370ff39d0bf3b1b91724be1356bc36ef829c", 0x8f}], 0x1)
syz_open_dev$ptys(0xc, 0x3, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001600)=ANY=[@ANYBLOB="280000001600e1b9"], 0x28}}, 0x0)
recvmmsg(r0, &(0x7f0000008f40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0)
14:30:14 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6(0xa, 0x1, 0x0)
socket$inet6(0xa, 0x1, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0)
readv(r0, &(0x7f0000000480)=[{&(0x7f0000000340)=""/30, 0x1e}], 0x1)
14:30:14 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f00000001c0)={0x14, 0x3e, 0x101, 0x0, 0x0, "", [@nested={0xa}]}, 0x14}], 0x1}, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x5409, 0x0)
14:30:14 executing program 0:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000100)=[{0x4d}, {0x6}]})
ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0)
14:30:14 executing program 5:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000100)=[{0x4d}, {0x6}]})
ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0)
[  129.304866] audit: type=1326 audit(1662993014.068:23): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4179 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f76c5673b19 code=0x0
[  129.320630] loop2: detected capacity change from 0 to 40
14:30:14 executing program 1:
syz_emit_vhci(&(0x7f00000000c0)=ANY=[@ANYBLOB="043e"], 0xd)
syz_emit_vhci(&(0x7f0000000140)=@HCI_EVENT_PKT={0x4, @hci_ev_role_change={{0x12, 0x8}, {0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x8}}}, 0xb)
[  129.347015] audit: type=1326 audit(1662993014.110:24): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4188 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f8030b8db19 code=0x0
14:30:14 executing program 1:
syz_emit_vhci(&(0x7f00000000c0)=ANY=[@ANYBLOB="043e"], 0xd)
syz_emit_vhci(&(0x7f0000000140)=@HCI_EVENT_PKT={0x4, @hci_ev_role_change={{0x12, 0x8}, {0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x8}}}, 0xb)
14:30:14 executing program 2:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000300))
14:30:14 executing program 1:
syz_emit_vhci(&(0x7f00000000c0)=ANY=[@ANYBLOB="043e"], 0xd)
syz_emit_vhci(&(0x7f0000000140)=@HCI_EVENT_PKT={0x4, @hci_ev_role_change={{0x12, 0x8}, {0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x8}}}, 0xb)
[  129.502503] loop2: detected capacity change from 0 to 40
14:30:14 executing program 1:
syz_emit_vhci(&(0x7f00000000c0)=ANY=[@ANYBLOB="043e"], 0xd)
syz_emit_vhci(&(0x7f0000000140)=@HCI_EVENT_PKT={0x4, @hci_ev_role_change={{0x12, 0x8}, {0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x8}}}, 0xb)
14:30:14 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6(0xa, 0x1, 0x0)
socket$inet6(0xa, 0x1, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0)
readv(r0, &(0x7f0000000480)=[{&(0x7f0000000340)=""/30, 0x1e}], 0x1)
14:30:14 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6(0xa, 0x1, 0x0)
socket$inet6(0xa, 0x1, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0)
readv(r0, &(0x7f0000000480)=[{&(0x7f0000000340)=""/30, 0x1e}], 0x1)
14:30:14 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10)
14:30:14 executing program 2:
r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x9e5d, 0x183402)
write(r0, &(0x7f0000000100)="fd", 0x5)
VM DIAGNOSIS:
14:30:04  Registers:
info registers vcpu 0
RAX=0000000000000000 RBX=0000000000000015 RCX=0000000000000000 RDX=ffff88800ff49ac0
RSI=ffffffff840c8de3 RDI=0000000000000007 RBP=ffff88803d87fa90 RSP=ffff88803d87f920
R8 =0000000000000007 R9 =0000000000000000 R10=000000000000000a R11=0000000000000001
R12=0000000000000000 R13=0000000000002800 R14=0000000000000047 R15=0000000000000008
RIP=ffffffff81461740 RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS   [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 0000555555b37400 00000000 00000000
GS =0000 ffff88806ce00000 00000000 00000000
LDT=0000 fffffe0000000000 00000000 00000000
TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy
GDT=     fffffe0000001000 0000007f
IDT=     fffffe0000000000 00000fff
CR0=80050033 CR2=00007f8031bda3a4 CR3=0000000021694000 CR4=00350ef0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff
YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff
YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245
YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040
YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000
info registers vcpu 1
RAX=0000000000000037 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8
RSI=ffffffff822b1e41 RDI=ffffffff8763fae0 RBP=ffffffff8763faa0 RSP=ffff88803f897698
R8 =0000000000000001 R9 =000000000000000a R10=0000000000000037 R11=0000000000000001
R12=0000000000000037 R13=ffffffff8763faa0 R14=0000000000000010 R15=ffffffff822b1e30
RIP=ffffffff822b1e99 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS   [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 00007f7eb9cf2700 00000000 00000000
GS =0000 ffff88806cf00000 00000000 00000000
LDT=0000 fffffe0000000000 00000000 00000000
TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy
GDT=     fffffe0000048000 0000007f
IDT=     fffffe0000000000 00000fff
CR0=80050033 CR2=000055ccb34039e8 CR3=0000000033eda000 CR4=00350ee0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM01=0000000000000000 0000000000000000 00007f7ebc8847c0 00007f7ebc8847c8
YMM02=0000000000000000 0000000000000000 00007f7ebc8847e0 00007f7ebc8847c0
YMM03=0000000000000000 0000000000000000 00007f7ebc8847c8 00007f7ebc8847c0
YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000
YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245
YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040
YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000