Warning: Permanently added '[localhost]:35391' (ECDSA) to the list of known hosts. 2022/09/13 14:12:19 fuzzer started 2022/09/13 14:12:19 dialing manager at localhost:36597 syzkaller login: [ 43.690700] cgroup: Unknown subsys name 'net' [ 43.786612] cgroup: Unknown subsys name 'rlimit' 2022/09/13 14:12:33 syscalls: 2215 2022/09/13 14:12:33 code coverage: enabled 2022/09/13 14:12:33 comparison tracing: enabled 2022/09/13 14:12:33 extra coverage: enabled 2022/09/13 14:12:33 setuid sandbox: enabled 2022/09/13 14:12:33 namespace sandbox: enabled 2022/09/13 14:12:33 Android sandbox: enabled 2022/09/13 14:12:33 fault injection: enabled 2022/09/13 14:12:33 leak checking: enabled 2022/09/13 14:12:33 net packet injection: enabled 2022/09/13 14:12:33 net device setup: enabled 2022/09/13 14:12:33 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/13 14:12:33 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/13 14:12:33 USB emulation: enabled 2022/09/13 14:12:33 hci packet injection: enabled 2022/09/13 14:12:33 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220913) 2022/09/13 14:12:33 802.15.4 emulation: enabled 2022/09/13 14:12:33 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/13 14:12:33 fetching corpus: 50, signal 37204/40447 (executing program) 2022/09/13 14:12:33 fetching corpus: 100, signal 46370/50927 (executing program) 2022/09/13 14:12:33 fetching corpus: 150, signal 54466/60179 (executing program) 2022/09/13 14:12:34 fetching corpus: 200, signal 64334/70976 (executing program) 2022/09/13 14:12:34 fetching corpus: 250, signal 68964/76687 (executing program) 2022/09/13 14:12:34 fetching corpus: 300, signal 76219/84672 (executing program) 2022/09/13 14:12:34 fetching corpus: 350, signal 79586/89031 (executing program) 2022/09/13 14:12:34 fetching corpus: 400, signal 84039/94218 (executing program) 2022/09/13 14:12:34 fetching corpus: 450, signal 87846/98741 (executing program) 2022/09/13 14:12:34 fetching corpus: 500, signal 91890/103430 (executing program) 2022/09/13 14:12:35 fetching corpus: 550, signal 94971/107161 (executing program) 2022/09/13 14:12:35 fetching corpus: 600, signal 98859/111525 (executing program) 2022/09/13 14:12:35 fetching corpus: 650, signal 103330/116407 (executing program) 2022/09/13 14:12:35 fetching corpus: 700, signal 106365/119886 (executing program) 2022/09/13 14:12:35 fetching corpus: 750, signal 109781/123626 (executing program) 2022/09/13 14:12:35 fetching corpus: 800, signal 114483/128371 (executing program) 2022/09/13 14:12:36 fetching corpus: 850, signal 116553/130878 (executing program) 2022/09/13 14:12:36 fetching corpus: 900, signal 119412/133974 (executing program) 2022/09/13 14:12:36 fetching corpus: 950, signal 122313/137067 (executing program) 2022/09/13 14:12:36 fetching corpus: 1000, signal 124505/139524 (executing program) 2022/09/13 14:12:36 fetching corpus: 1050, signal 126358/141718 (executing program) 2022/09/13 14:12:36 fetching corpus: 1100, signal 128706/144246 (executing program) 2022/09/13 14:12:36 fetching corpus: 1150, signal 130399/146185 (executing program) 2022/09/13 14:12:37 fetching corpus: 1200, signal 133379/149070 (executing program) 2022/09/13 14:12:37 fetching corpus: 1250, signal 135521/151285 (executing program) 2022/09/13 14:12:37 fetching corpus: 1300, signal 137961/153668 (executing program) 2022/09/13 14:12:37 fetching corpus: 1350, signal 139861/155594 (executing program) 2022/09/13 14:12:37 fetching corpus: 1400, signal 141067/157021 (executing program) 2022/09/13 14:12:37 fetching corpus: 1450, signal 142452/158551 (executing program) 2022/09/13 14:12:38 fetching corpus: 1500, signal 143807/159954 (executing program) 2022/09/13 14:12:38 fetching corpus: 1550, signal 145346/161491 (executing program) 2022/09/13 14:12:38 fetching corpus: 1600, signal 146877/162942 (executing program) 2022/09/13 14:12:38 fetching corpus: 1650, signal 148062/164254 (executing program) 2022/09/13 14:12:38 fetching corpus: 1700, signal 149536/165657 (executing program) 2022/09/13 14:12:38 fetching corpus: 1750, signal 150758/166874 (executing program) 2022/09/13 14:12:38 fetching corpus: 1799, signal 152267/168244 (executing program) 2022/09/13 14:12:38 fetching corpus: 1849, signal 153738/169568 (executing program) 2022/09/13 14:12:39 fetching corpus: 1899, signal 155021/170710 (executing program) 2022/09/13 14:12:39 fetching corpus: 1948, signal 156537/172099 (executing program) 2022/09/13 14:12:39 fetching corpus: 1998, signal 158173/173388 (executing program) 2022/09/13 14:12:39 fetching corpus: 2047, signal 159307/174384 (executing program) 2022/09/13 14:12:39 fetching corpus: 2097, signal 160553/175439 (executing program) 2022/09/13 14:12:39 fetching corpus: 2147, signal 161387/176251 (executing program) 2022/09/13 14:12:40 fetching corpus: 2197, signal 163298/177666 (executing program) 2022/09/13 14:12:40 fetching corpus: 2247, signal 164533/178676 (executing program) 2022/09/13 14:12:40 fetching corpus: 2297, signal 165604/179566 (executing program) 2022/09/13 14:12:40 fetching corpus: 2347, signal 167288/180683 (executing program) 2022/09/13 14:12:40 fetching corpus: 2397, signal 168217/181454 (executing program) 2022/09/13 14:12:40 fetching corpus: 2447, signal 169934/182564 (executing program) 2022/09/13 14:12:41 fetching corpus: 2495, signal 170976/183335 (executing program) 2022/09/13 14:12:41 fetching corpus: 2545, signal 172831/184431 (executing program) 2022/09/13 14:12:41 fetching corpus: 2595, signal 174218/185274 (executing program) 2022/09/13 14:12:41 fetching corpus: 2645, signal 175221/185923 (executing program) 2022/09/13 14:12:41 fetching corpus: 2695, signal 176161/186518 (executing program) 2022/09/13 14:12:41 fetching corpus: 2745, signal 177009/187060 (executing program) 2022/09/13 14:12:42 fetching corpus: 2795, signal 177988/187648 (executing program) 2022/09/13 14:12:42 fetching corpus: 2845, signal 179316/188400 (executing program) 2022/09/13 14:12:42 fetching corpus: 2895, signal 180591/189082 (executing program) 2022/09/13 14:12:42 fetching corpus: 2945, signal 181984/189780 (executing program) 2022/09/13 14:12:42 fetching corpus: 2995, signal 182803/190216 (executing program) 2022/09/13 14:12:42 fetching corpus: 3045, signal 183776/190719 (executing program) 2022/09/13 14:12:43 fetching corpus: 3095, signal 185244/191337 (executing program) 2022/09/13 14:12:43 fetching corpus: 3144, signal 185978/191700 (executing program) 2022/09/13 14:12:43 fetching corpus: 3156, signal 186312/191911 (executing program) 2022/09/13 14:12:43 fetching corpus: 3156, signal 186312/192001 (executing program) 2022/09/13 14:12:43 fetching corpus: 3156, signal 186312/192086 (executing program) 2022/09/13 14:12:43 fetching corpus: 3156, signal 186312/192173 (executing program) 2022/09/13 14:12:43 fetching corpus: 3156, signal 186312/192256 (executing program) 2022/09/13 14:12:43 fetching corpus: 3156, signal 186312/192329 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/192464 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/192557 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/192665 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/192754 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/192861 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/192954 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/193047 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/193142 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/193224 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/193313 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/193423 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/193507 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/193585 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/193675 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/193764 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/193841 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/193935 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/194021 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/194124 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/194187 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/194266 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/194332 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/194430 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/194523 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/194567 (executing program) 2022/09/13 14:12:43 fetching corpus: 3157, signal 186343/194567 (executing program) 2022/09/13 14:12:46 starting 8 fuzzer processes 14:12:46 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000000)) 14:12:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000001, 0x32, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000), 0x0) 14:12:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/205, 0xcd}], 0x1, 0xffffffff, 0x0) 14:12:46 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) faccessat(r0, &(0x7f0000000080)='./file1\x00', 0x0) 14:12:46 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x105c80, 0x0) [ 69.956349] audit: type=1400 audit(1663078366.329:6): avc: denied { execmem } for pid=285 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 14:12:46 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) 14:12:46 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[@pktinfo={{0x24, 0x29, 0x32, {@private0, r3}}}], 0x28}}], 0x2, 0x0) 14:12:46 executing program 7: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r1, r0, r2, 0x0) [ 71.208140] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 71.210828] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 71.213019] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 71.220944] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 71.222614] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 71.225560] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 71.232095] Bluetooth: hci0: HCI_REQ-0x0c1a [ 71.390453] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 71.397314] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 71.398698] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 71.400292] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 71.417281] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 71.418814] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 71.421967] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 71.423111] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 71.423828] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 71.428060] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 71.429519] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 71.430741] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 71.432975] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 71.434314] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 71.435467] Bluetooth: hci2: HCI_REQ-0x0c1a [ 71.444316] Bluetooth: hci4: HCI_REQ-0x0c1a [ 71.445463] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 71.446822] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 71.448556] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 71.459352] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 71.466127] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 71.466217] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 71.469705] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 71.471613] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 71.473032] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 71.484608] Bluetooth: hci6: HCI_REQ-0x0c1a [ 71.490501] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 71.491791] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 71.497001] Bluetooth: hci3: HCI_REQ-0x0c1a [ 71.552566] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 71.554706] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 71.558608] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 71.561328] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 71.562719] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 71.568203] Bluetooth: hci7: HCI_REQ-0x0c1a [ 71.581940] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 71.584041] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 71.585664] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 71.589140] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 71.591712] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 71.593316] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 71.601873] Bluetooth: hci5: HCI_REQ-0x0c1a [ 73.290406] Bluetooth: hci0: command 0x0409 tx timeout [ 73.355031] Bluetooth: hci1: Opcode 0x c03 failed: -110 [ 73.481956] Bluetooth: hci2: command 0x0409 tx timeout [ 73.481976] Bluetooth: hci4: command 0x0409 tx timeout [ 73.546058] Bluetooth: hci6: command 0x0409 tx timeout [ 73.546849] Bluetooth: hci3: command 0x0409 tx timeout [ 73.609812] Bluetooth: hci7: command 0x0409 tx timeout [ 73.674840] Bluetooth: hci5: command 0x0409 tx timeout [ 75.337854] Bluetooth: hci0: command 0x041b tx timeout [ 75.529938] Bluetooth: hci4: command 0x041b tx timeout [ 75.532643] Bluetooth: hci2: command 0x041b tx timeout [ 75.593856] Bluetooth: hci3: command 0x041b tx timeout [ 75.594644] Bluetooth: hci6: command 0x041b tx timeout [ 75.657912] Bluetooth: hci7: command 0x041b tx timeout [ 75.721915] Bluetooth: hci5: command 0x041b tx timeout [ 76.578378] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 76.589447] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 76.594021] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 76.604014] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 76.608971] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 76.612011] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 76.653865] Bluetooth: hci1: HCI_REQ-0x0c1a [ 77.385802] Bluetooth: hci0: command 0x040f tx timeout [ 77.577847] Bluetooth: hci2: command 0x040f tx timeout [ 77.578361] Bluetooth: hci4: command 0x040f tx timeout [ 77.641900] Bluetooth: hci6: command 0x040f tx timeout [ 77.642367] Bluetooth: hci3: command 0x040f tx timeout [ 77.705870] Bluetooth: hci7: command 0x040f tx timeout [ 77.769826] Bluetooth: hci5: command 0x040f tx timeout [ 78.665824] Bluetooth: hci1: command 0x0409 tx timeout [ 79.433826] Bluetooth: hci0: command 0x0419 tx timeout [ 79.626027] Bluetooth: hci4: command 0x0419 tx timeout [ 79.627156] Bluetooth: hci2: command 0x0419 tx timeout [ 79.689978] Bluetooth: hci3: command 0x0419 tx timeout [ 79.691123] Bluetooth: hci6: command 0x0419 tx timeout [ 79.753851] Bluetooth: hci7: command 0x0419 tx timeout [ 79.817957] Bluetooth: hci5: command 0x0419 tx timeout [ 80.714328] Bluetooth: hci1: command 0x041b tx timeout [ 82.762030] Bluetooth: hci1: command 0x040f tx timeout [ 84.810018] Bluetooth: hci1: command 0x0419 tx timeout [ 127.018302] audit: type=1400 audit(1663078423.391:7): avc: denied { open } for pid=3714 comm="syz-executor.6" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 127.019994] audit: type=1400 audit(1663078423.391:8): avc: denied { kernel } for pid=3714 comm="syz-executor.6" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 127.045199] ------------[ cut here ]------------ [ 127.045219] [ 127.045221] ====================================================== [ 127.045225] WARNING: possible circular locking dependency detected [ 127.045229] 6.0.0-rc5-next-20220913 #1 Not tainted [ 127.045235] ------------------------------------------------------ [ 127.045238] syz-executor.6/3716 is trying to acquire lock: [ 127.045244] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 127.045279] [ 127.045279] but task is already holding lock: [ 127.045281] ffff88800d08f420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 127.045308] [ 127.045308] which lock already depends on the new lock. [ 127.045308] [ 127.045310] [ 127.045310] the existing dependency chain (in reverse order) is: [ 127.045313] [ 127.045313] -> #3 (&ctx->lock){....}-{2:2}: [ 127.045327] _raw_spin_lock+0x2a/0x40 [ 127.045343] __perf_event_task_sched_out+0x53b/0x18d0 [ 127.045355] __schedule+0xedd/0x2470 [ 127.045365] schedule+0xda/0x1b0 [ 127.045374] exit_to_user_mode_prepare+0x114/0x1a0 [ 127.045393] syscall_exit_to_user_mode+0x19/0x40 [ 127.045410] do_syscall_64+0x48/0x90 [ 127.045423] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 127.045439] [ 127.045439] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 127.045453] _raw_spin_lock_nested+0x30/0x40 [ 127.045467] raw_spin_rq_lock_nested+0x1e/0x30 [ 127.045479] task_fork_fair+0x63/0x4d0 [ 127.045495] sched_cgroup_fork+0x3d0/0x540 [ 127.045509] copy_process+0x3f9e/0x6df0 [ 127.045519] kernel_clone+0xe7/0x890 [ 127.045528] user_mode_thread+0xad/0xf0 [ 127.045538] rest_init+0x24/0x250 [ 127.045554] arch_call_rest_init+0xf/0x14 [ 127.045572] start_kernel+0x4c1/0x4e6 [ 127.045588] secondary_startup_64_no_verify+0xe0/0xeb [ 127.045602] [ 127.045602] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 127.045615] _raw_spin_lock_irqsave+0x39/0x60 [ 127.045630] try_to_wake_up+0xab/0x1920 [ 127.045643] up+0x75/0xb0 [ 127.045654] __up_console_sem+0x6e/0x80 [ 127.045668] console_unlock+0x46a/0x590 [ 127.045684] vt_ioctl+0x2822/0x2ca0 [ 127.045696] tty_ioctl+0x7c4/0x1700 [ 127.045707] __x64_sys_ioctl+0x19a/0x210 [ 127.045722] do_syscall_64+0x3b/0x90 [ 127.045734] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 127.045750] [ 127.045750] -> #0 ((console_sem).lock){....}-{2:2}: [ 127.045767] __lock_acquire+0x2a02/0x5e70 [ 127.045782] lock_acquire+0x1a2/0x530 [ 127.045798] _raw_spin_lock_irqsave+0x39/0x60 [ 127.045812] down_trylock+0xe/0x70 [ 127.045824] __down_trylock_console_sem+0x3b/0xd0 [ 127.045840] vprintk_emit+0x16b/0x560 [ 127.045855] vprintk+0x84/0xa0 [ 127.045871] _printk+0xba/0xf1 [ 127.045887] report_bug.cold+0x72/0xab [ 127.045899] handle_bug+0x3c/0x70 [ 127.045911] exc_invalid_op+0x14/0x50 [ 127.045924] asm_exc_invalid_op+0x16/0x20 [ 127.045939] group_sched_out.part.0+0x2c7/0x460 [ 127.045950] ctx_sched_out+0x8f1/0xc10 [ 127.045959] __perf_event_task_sched_out+0x6d0/0x18d0 [ 127.045971] __schedule+0xedd/0x2470 [ 127.045980] schedule+0xda/0x1b0 [ 127.045990] exit_to_user_mode_prepare+0x114/0x1a0 [ 127.046008] syscall_exit_to_user_mode+0x19/0x40 [ 127.046024] do_syscall_64+0x48/0x90 [ 127.046036] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 127.046053] [ 127.046053] other info that might help us debug this: [ 127.046053] [ 127.046055] Chain exists of: [ 127.046055] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 127.046055] [ 127.046070] Possible unsafe locking scenario: [ 127.046070] [ 127.046072] CPU0 CPU1 [ 127.046075] ---- ---- [ 127.046077] lock(&ctx->lock); [ 127.046082] lock(&rq->__lock); [ 127.046088] lock(&ctx->lock); [ 127.046094] lock((console_sem).lock); [ 127.046100] [ 127.046100] *** DEADLOCK *** [ 127.046100] [ 127.046102] 2 locks held by syz-executor.6/3716: [ 127.046109] #0: ffff88806cf37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 127.046134] #1: ffff88800d08f420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 127.046161] [ 127.046161] stack backtrace: [ 127.046164] CPU: 1 PID: 3716 Comm: syz-executor.6 Not tainted 6.0.0-rc5-next-20220913 #1 [ 127.046177] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 127.046185] Call Trace: [ 127.046188] [ 127.046192] dump_stack_lvl+0x8b/0xb3 [ 127.046206] check_noncircular+0x263/0x2e0 [ 127.046223] ? format_decode+0x26c/0xb50 [ 127.046239] ? print_circular_bug+0x450/0x450 [ 127.046256] ? enable_ptr_key_workfn+0x20/0x20 [ 127.046271] ? format_decode+0x26c/0xb50 [ 127.046288] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 127.046306] __lock_acquire+0x2a02/0x5e70 [ 127.046329] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 127.046348] ? __mutex_add_waiter+0x120/0x120 [ 127.046367] lock_acquire+0x1a2/0x530 [ 127.046384] ? down_trylock+0xe/0x70 [ 127.046399] ? rcu_read_unlock+0x40/0x40 [ 127.046422] ? vprintk+0x84/0xa0 [ 127.046440] _raw_spin_lock_irqsave+0x39/0x60 [ 127.046456] ? down_trylock+0xe/0x70 [ 127.046470] down_trylock+0xe/0x70 [ 127.046483] ? vprintk+0x84/0xa0 [ 127.046500] __down_trylock_console_sem+0x3b/0xd0 [ 127.046518] vprintk_emit+0x16b/0x560 [ 127.046538] vprintk+0x84/0xa0 [ 127.046556] _printk+0xba/0xf1 [ 127.046574] ? record_print_text.cold+0x16/0x16 [ 127.046597] ? report_bug.cold+0x66/0xab [ 127.046612] ? group_sched_out.part.0+0x2c7/0x460 [ 127.046623] report_bug.cold+0x72/0xab [ 127.046639] handle_bug+0x3c/0x70 [ 127.046653] exc_invalid_op+0x14/0x50 [ 127.046668] asm_exc_invalid_op+0x16/0x20 [ 127.046688] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 127.046703] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 127.046714] RSP: 0018:ffff88801a097c48 EFLAGS: 00010006 [ 127.046723] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 127.046731] RDX: ffff88800f2f8000 RSI: ffffffff81566027 RDI: 0000000000000005 [ 127.046739] RBP: ffff88803e760000 R08: 0000000000000005 R09: 0000000000000001 [ 127.046746] R10: 0000000000000000 R11: ffffffff865aa05b R12: ffff88800d08f400 [ 127.046754] R13: ffff88806cf3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 127.046766] ? group_sched_out.part.0+0x2c7/0x460 [ 127.046779] ? group_sched_out.part.0+0x2c7/0x460 [ 127.046792] ctx_sched_out+0x8f1/0xc10 [ 127.046805] __perf_event_task_sched_out+0x6d0/0x18d0 [ 127.046822] ? lock_is_held_type+0xd7/0x130 [ 127.046840] ? __perf_cgroup_move+0x160/0x160 [ 127.046852] ? set_next_entity+0x304/0x550 [ 127.046870] ? update_curr+0x267/0x740 [ 127.046890] ? lock_is_held_type+0xd7/0x130 [ 127.046909] __schedule+0xedd/0x2470 [ 127.046923] ? io_schedule_timeout+0x150/0x150 [ 127.046936] ? __x64_sys_futex_time32+0x480/0x480 [ 127.046950] schedule+0xda/0x1b0 [ 127.046961] exit_to_user_mode_prepare+0x114/0x1a0 [ 127.046982] syscall_exit_to_user_mode+0x19/0x40 [ 127.047001] do_syscall_64+0x48/0x90 [ 127.047015] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 127.047033] RIP: 0033:0x7f9b6fd4bb19 [ 127.047041] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 127.047052] RSP: 002b:00007f9b6d2c1218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 127.047062] RAX: 0000000000000001 RBX: 00007f9b6fe5ef68 RCX: 00007f9b6fd4bb19 [ 127.047070] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f9b6fe5ef6c [ 127.047077] RBP: 00007f9b6fe5ef60 R08: 000000000000000e R09: 0000000000000000 [ 127.047085] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f9b6fe5ef6c [ 127.047092] R13: 00007fff053aeadf R14: 00007f9b6d2c1300 R15: 0000000000022000 [ 127.047106] [ 127.103348] WARNING: CPU: 1 PID: 3716 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 127.104037] Modules linked in: [ 127.104282] CPU: 1 PID: 3716 Comm: syz-executor.6 Not tainted 6.0.0-rc5-next-20220913 #1 [ 127.104872] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 127.105695] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 127.106100] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 127.107428] RSP: 0018:ffff88801a097c48 EFLAGS: 00010006 [ 127.107830] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 127.108357] RDX: ffff88800f2f8000 RSI: ffffffff81566027 RDI: 0000000000000005 [ 127.108885] RBP: ffff88803e760000 R08: 0000000000000005 R09: 0000000000000001 [ 127.109414] R10: 0000000000000000 R11: ffffffff865aa05b R12: ffff88800d08f400 [ 127.109949] R13: ffff88806cf3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 127.110485] FS: 00007f9b6d2c1700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 127.111076] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 127.111506] CR2: 00007f3d65d19710 CR3: 000000000e068000 CR4: 0000000000350ee0 [ 127.112045] Call Trace: [ 127.112240] [ 127.112412] ctx_sched_out+0x8f1/0xc10 [ 127.112705] __perf_event_task_sched_out+0x6d0/0x18d0 [ 127.113099] ? lock_is_held_type+0xd7/0x130 [ 127.113425] ? __perf_cgroup_move+0x160/0x160 [ 127.113762] ? set_next_entity+0x304/0x550 [ 127.114081] ? update_curr+0x267/0x740 [ 127.114381] ? lock_is_held_type+0xd7/0x130 [ 127.114714] __schedule+0xedd/0x2470 [ 127.115000] ? io_schedule_timeout+0x150/0x150 [ 127.115339] ? __x64_sys_futex_time32+0x480/0x480 [ 127.115703] schedule+0xda/0x1b0 [ 127.115973] exit_to_user_mode_prepare+0x114/0x1a0 [ 127.116348] syscall_exit_to_user_mode+0x19/0x40 [ 127.116705] do_syscall_64+0x48/0x90 [ 127.116996] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 127.117387] RIP: 0033:0x7f9b6fd4bb19 [ 127.117674] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 127.119002] RSP: 002b:00007f9b6d2c1218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 127.119556] RAX: 0000000000000001 RBX: 00007f9b6fe5ef68 RCX: 00007f9b6fd4bb19 [ 127.120091] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f9b6fe5ef6c [ 127.120620] RBP: 00007f9b6fe5ef60 R08: 000000000000000e R09: 0000000000000000 [ 127.121145] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f9b6fe5ef6c [ 127.121671] R13: 00007fff053aeadf R14: 00007f9b6d2c1300 R15: 0000000000022000 [ 127.122205] [ 127.122386] irq event stamp: 1082 [ 127.122650] hardirqs last enabled at (1081): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 127.123352] hardirqs last disabled at (1082): [] __schedule+0x1225/0x2470 [ 127.123964] softirqs last enabled at (868): [] __irq_exit_rcu+0x11b/0x180 [ 127.124589] softirqs last disabled at (727): [] __irq_exit_rcu+0x11b/0x180 [ 127.125209] ---[ end trace 0000000000000000 ]--- 14:13:46 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000000)) 14:13:46 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) 14:13:46 executing program 7: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r1, r0, r2, 0x0) 14:13:46 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x105c80, 0x0) 14:13:46 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[@pktinfo={{0x24, 0x29, 0x32, {@private0, r3}}}], 0x28}}], 0x2, 0x0) 14:13:46 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) faccessat(r0, &(0x7f0000000080)='./file1\x00', 0x0) 14:13:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000001, 0x32, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000), 0x0) 14:13:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/205, 0xcd}], 0x1, 0xffffffff, 0x0) 14:13:46 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x105c80, 0x0) 14:13:46 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) 14:13:46 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) faccessat(r0, &(0x7f0000000080)='./file1\x00', 0x0) 14:13:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/205, 0xcd}], 0x1, 0xffffffff, 0x0) 14:13:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000001, 0x32, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000), 0x0) 14:13:46 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000000)) 14:13:46 executing program 7: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r1, r0, r2, 0x0) 14:13:46 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[@pktinfo={{0x24, 0x29, 0x32, {@private0, r3}}}], 0x28}}], 0x2, 0x0) [ 129.873777] hrtimer: interrupt took 18945 ns 14:13:46 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x105c80, 0x0) 14:13:46 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) faccessat(r0, &(0x7f0000000080)='./file1\x00', 0x0) 14:13:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000001, 0x32, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000000), 0x0) 14:13:46 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000000)) 14:13:46 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) 14:13:46 executing program 7: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r1, r0, r2, 0x0) 14:13:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/205, 0xcd}], 0x1, 0xffffffff, 0x0) 14:13:46 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[@pktinfo={{0x24, 0x29, 0x32, {@private0, r3}}}], 0x28}}], 0x2, 0x0) 14:13:46 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/205, 0xcd}], 0x1, 0xffffffff, 0x0) 14:13:46 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) faccessat(r0, &(0x7f0000000080)='./file1\x00', 0x0) 14:13:46 executing program 4: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r1, r0, r2, 0x0) 14:13:46 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) 14:13:46 executing program 4: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r1, r0, r2, 0x0) 14:13:46 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) faccessat(r0, &(0x7f0000000080)='./file1\x00', 0x0) 14:13:46 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) 14:13:46 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ftruncate(r0, 0x0) 14:13:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000001180)='-', 0x1}], 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000800)='./file1\x00', 0x42, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x13, r1, 0x0) syz_io_uring_submit(r2, 0x0, 0x0, 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x15) creat(&(0x7f0000000180)='./file1\x00', 0x0) 14:13:46 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='personality\x00') r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r3, 0x1, 0x6}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) [ 130.450420] device syz_tun entered promiscuous mode [ 130.464092] device syz_tun left promiscuous mode 14:13:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x17, &(0x7f0000000080), 0x4) 14:13:46 executing program 4: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r1, r0, r2, 0x0) 14:13:46 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) faccessat(r0, &(0x7f0000000080)='./file1\x00', 0x0) 14:13:46 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='personality\x00') r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r3, 0x1, 0x6}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 14:13:46 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='personality\x00') r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r3, 0x1, 0x6}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 14:13:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000001180)='-', 0x1}], 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000800)='./file1\x00', 0x42, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x13, r1, 0x0) syz_io_uring_submit(r2, 0x0, 0x0, 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x15) creat(&(0x7f0000000180)='./file1\x00', 0x0) 14:13:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000001180)='-', 0x1}], 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000800)='./file1\x00', 0x42, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x13, r1, 0x0) syz_io_uring_submit(r2, 0x0, 0x0, 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x15) creat(&(0x7f0000000180)='./file1\x00', 0x0) 14:13:46 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) 14:13:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x17, &(0x7f0000000080), 0x4) 14:13:46 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/205, 0xcd}], 0x1, 0xffffffff, 0x0) [ 130.643006] device syz_tun entered promiscuous mode [ 130.652812] device syz_tun entered promiscuous mode [ 130.657125] device syz_tun left promiscuous mode [ 130.667135] device syz_tun left promiscuous mode 14:13:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x17, &(0x7f0000000080), 0x4) 14:13:47 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='personality\x00') r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r3, 0x1, 0x6}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) [ 130.765690] device syz_tun entered promiscuous mode [ 130.772067] device syz_tun left promiscuous mode 14:13:47 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='personality\x00') r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r3, 0x1, 0x6}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) [ 130.820783] device syz_tun entered promiscuous mode [ 130.830177] device syz_tun left promiscuous mode 14:13:47 executing program 5: clone3(&(0x7f0000000440)={0x8809100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:13:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000001180)='-', 0x1}], 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000800)='./file1\x00', 0x42, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x13, r1, 0x0) syz_io_uring_submit(r2, 0x0, 0x0, 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x15) creat(&(0x7f0000000180)='./file1\x00', 0x0) 14:13:47 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='personality\x00') r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r3, 0x1, 0x6}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 14:13:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x17, &(0x7f0000000080), 0x4) 14:13:47 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup2(r0, r0) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000fc0), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x3}}, 0x1c) sendmsg$inet(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) 14:13:47 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/205, 0xcd}], 0x1, 0xffffffff, 0x0) 14:13:47 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='personality\x00') r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r3, 0x1, 0x6}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 14:13:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000001180)='-', 0x1}], 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000800)='./file1\x00', 0x42, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x13, r1, 0x0) syz_io_uring_submit(r2, 0x0, 0x0, 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x15) creat(&(0x7f0000000180)='./file1\x00', 0x0) [ 130.901735] device syz_tun entered promiscuous mode [ 130.916054] device syz_tun left promiscuous mode [ 130.931514] device syz_tun entered promiscuous mode [ 130.940391] device syz_tun left promiscuous mode 14:13:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000001180)='-', 0x1}], 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000800)='./file1\x00', 0x42, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x13, r1, 0x0) syz_io_uring_submit(r2, 0x0, 0x0, 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x15) creat(&(0x7f0000000180)='./file1\x00', 0x0) 14:13:47 executing program 5: clone3(&(0x7f0000000440)={0x8809100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:13:47 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup2(r0, r0) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000fc0), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x3}}, 0x1c) sendmsg$inet(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) 14:13:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000001180)='-', 0x1}], 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000800)='./file1\x00', 0x42, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x13, r1, 0x0) syz_io_uring_submit(r2, 0x0, 0x0, 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x15) creat(&(0x7f0000000180)='./file1\x00', 0x0) 14:13:47 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup2(r0, r0) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000fc0), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x3}}, 0x1c) sendmsg$inet(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) 14:13:47 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x4, &(0x7f00000000c0)={@remote}, 0x20) 14:13:47 executing program 7: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3) mlock(&(0x7f0000fed000/0x13000)=nil, 0x13000) 14:13:47 executing program 5: clone3(&(0x7f0000000440)={0x8809100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:13:47 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 14:13:47 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup2(r0, r0) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000fc0), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x3}}, 0x1c) sendmsg$inet(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) 14:13:47 executing program 7: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3) mlock(&(0x7f0000fed000/0x13000)=nil, 0x13000) 14:13:47 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8929, &(0x7f0000000000)={'sit0\x00'}) 14:13:47 executing program 4: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3) mlock(&(0x7f0000fed000/0x13000)=nil, 0x13000) 14:13:47 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup2(r0, r0) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000fc0), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x3}}, 0x1c) sendmsg$inet(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) 14:13:47 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8929, &(0x7f0000000000)={'sit0\x00'}) 14:13:47 executing program 4: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3) mlock(&(0x7f0000fed000/0x13000)=nil, 0x13000) 14:13:47 executing program 5: clone3(&(0x7f0000000440)={0x8809100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:13:47 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup2(r0, r0) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000fc0), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x3}}, 0x1c) sendmsg$inet(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) 14:13:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040)}, 0x0, 0x3, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x29, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devpts\x00', 0x0, 0x0) utime(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x20, 0x3ff}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x500) umount2(&(0x7f0000000000)='./file0\x00', 0x0) r0 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x2, 0x2004, @fd_index=0x8, 0x3ff, &(0x7f00000002c0)=""/82, 0x52, 0x0, 0x0, {0x0, r0}}, 0x5) 14:13:47 executing program 7: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3) mlock(&(0x7f0000fed000/0x13000)=nil, 0x13000) 14:13:47 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup2(r0, r0) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000fc0), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x3}}, 0x1c) sendmsg$inet(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) 14:13:47 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8929, &(0x7f0000000000)={'sit0\x00'}) 14:13:47 executing program 4: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3) mlock(&(0x7f0000fed000/0x13000)=nil, 0x13000) 14:13:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040)}, 0x0, 0x3, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x29, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devpts\x00', 0x0, 0x0) utime(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x20, 0x3ff}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x500) umount2(&(0x7f0000000000)='./file0\x00', 0x0) r0 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x2, 0x2004, @fd_index=0x8, 0x3ff, &(0x7f00000002c0)=""/82, 0x52, 0x0, 0x0, {0x0, r0}}, 0x5) 14:13:48 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8929, &(0x7f0000000000)={'sit0\x00'}) 14:13:48 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 14:13:48 executing program 7: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3) mlock(&(0x7f0000fed000/0x13000)=nil, 0x13000) 14:13:48 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 14:13:48 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 14:13:48 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 14:13:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040)}, 0x0, 0x3, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x29, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devpts\x00', 0x0, 0x0) utime(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x20, 0x3ff}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x500) umount2(&(0x7f0000000000)='./file0\x00', 0x0) r0 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x2, 0x2004, @fd_index=0x8, 0x3ff, &(0x7f00000002c0)=""/82, 0x52, 0x0, 0x0, {0x0, r0}}, 0x5) 14:13:48 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 14:13:48 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 14:13:48 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 14:13:48 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 14:13:48 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 14:13:48 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 14:13:48 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 14:13:48 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x7, 0x0, &(0x7f00000000c0)) 14:13:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040)}, 0x0, 0x3, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x29, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devpts\x00', 0x0, 0x0) utime(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x20, 0x3ff}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x500) umount2(&(0x7f0000000000)='./file0\x00', 0x0) r0 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x2, 0x2004, @fd_index=0x8, 0x3ff, &(0x7f00000002c0)=""/82, 0x52, 0x0, 0x0, {0x0, r0}}, 0x5) 14:13:49 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 14:13:49 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) write$bt_hci(r1, 0x0, 0x0) 14:13:49 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 14:13:49 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040)}, 0x0, 0x3, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x29, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devpts\x00', 0x0, 0x0) utime(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x20, 0x3ff}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x500) umount2(&(0x7f0000000000)='./file0\x00', 0x0) r0 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x2, 0x2004, @fd_index=0x8, 0x3ff, &(0x7f00000002c0)=""/82, 0x52, 0x0, 0x0, {0x0, r0}}, 0x5) 14:13:49 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 14:13:49 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2201, 0x0) 14:13:49 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040)}, 0x0, 0x3, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x29, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devpts\x00', 0x0, 0x0) utime(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x20, 0x3ff}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x500) umount2(&(0x7f0000000000)='./file0\x00', 0x0) r0 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x2, 0x2004, @fd_index=0x8, 0x3ff, &(0x7f00000002c0)=""/82, 0x52, 0x0, 0x0, {0x0, r0}}, 0x5) 14:13:49 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x7, 0x0, &(0x7f00000000c0)) 14:13:49 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x7, 0x0, &(0x7f00000000c0)) 14:13:49 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 14:13:49 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) write$bt_hci(r1, 0x0, 0x0) 14:13:49 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2201, 0x0) 14:13:49 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) write$bt_hci(r1, 0x0, 0x0) 14:13:49 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2201, 0x0) 14:13:49 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x7, 0x0, &(0x7f00000000c0)) 14:13:49 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) write$bt_hci(r1, 0x0, 0x0) 14:13:49 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0xf, &(0x7f00000000c0)={@multicast1, @remote}, 0xc) 14:13:49 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2201, 0x0) 14:13:49 executing program 7: r0 = fsopen(&(0x7f0000000080)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) mknodat$null(r1, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) move_mount(r1, &(0x7f00000007c0)='./file0\x00', r1, &(0x7f0000000800)='./file0\x00', 0x0) 14:13:49 executing program 4: r0 = syz_io_uring_setup(0xfa7, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)={&(0x7f0000000180)=@ax25={{0x3, @rose}, [@netrom, @remote, @default, @rose, @bcast, @default, @rose, @null]}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000200)=""/12, 0xc}, {&(0x7f0000000280)=""/53, 0x35}, {&(0x7f0000000300)=""/78, 0x4e}, {&(0x7f0000000380)=""/228, 0xe4}, {&(0x7f0000000480)=""/4, 0x4}, {&(0x7f00000004c0)}, {&(0x7f0000000500)=""/209, 0xd1}], 0x100000000000027f, &(0x7f0000000680)=""/165, 0xb5}}, 0x0) io_uring_enter(r0, 0x100001, 0x0, 0x0, 0x0, 0x0) 14:13:49 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040)}, 0x0, 0x3, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x29, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devpts\x00', 0x0, 0x0) utime(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x20, 0x3ff}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x500) umount2(&(0x7f0000000000)='./file0\x00', 0x0) r0 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x2, 0x2004, @fd_index=0x8, 0x3ff, &(0x7f00000002c0)=""/82, 0x52, 0x0, 0x0, {0x0, r0}}, 0x5) 14:13:49 executing program 6: syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000600)={[{@fat=@nocase}]}) 14:13:49 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000000000/0x2000)=nil, 0x2000) get_mempolicy(&(0x7f0000000140), 0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil, 0x2) 14:13:49 executing program 1: r0 = semget$private(0x0, 0x3, 0x0) semtimedop(r0, &(0x7f0000000200)=[{}, {0x0, 0xd3fa}], 0x2, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0x3}, {}], 0x2, &(0x7f0000000140)) [ 133.491012] FAT-fs (loop6): bogus number of reserved sectors [ 133.491991] FAT-fs (loop6): Can't find a valid FAT filesystem [ 133.514962] FAT-fs (loop6): bogus number of reserved sectors [ 133.516123] FAT-fs (loop6): Can't find a valid FAT filesystem 14:13:49 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_UNREGISTER_BUFFERS(0xffffffffffffffff, 0x1, 0x1000000, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="140000000200007f9b29e800000000e9b66d0c163b4de64a782271eb"], 0x0) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0xd2, 0x6, 0x8, 0xf7, 0x0, 0x2, 0x200, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x80000000, 0xffffffffffff532d}, 0x210, 0x40025cb, 0x4, 0x0, 0x6, 0x2, 0x0, 0x0, 0xfffff000, 0x0, 0x200}, 0x0, 0xb, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x37bc, 0x0, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f00000006c0)) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000004c0)) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, r1, 0x0) syz_io_uring_setup(0xaaf, &(0x7f0000000100)={0x0, 0x0, 0x10, 0x4, 0x17, 0x0, r1}, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000fef000/0x11000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) 14:13:49 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000000000/0x2000)=nil, 0x2000) get_mempolicy(&(0x7f0000000140), 0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil, 0x2) 14:13:49 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000140)=@ethtool_link_settings={0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) 14:13:49 executing program 4: r0 = syz_io_uring_setup(0xfa7, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)={&(0x7f0000000180)=@ax25={{0x3, @rose}, [@netrom, @remote, @default, @rose, @bcast, @default, @rose, @null]}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000200)=""/12, 0xc}, {&(0x7f0000000280)=""/53, 0x35}, {&(0x7f0000000300)=""/78, 0x4e}, {&(0x7f0000000380)=""/228, 0xe4}, {&(0x7f0000000480)=""/4, 0x4}, {&(0x7f00000004c0)}, {&(0x7f0000000500)=""/209, 0xd1}], 0x100000000000027f, &(0x7f0000000680)=""/165, 0xb5}}, 0x0) io_uring_enter(r0, 0x100001, 0x0, 0x0, 0x0, 0x0) 14:13:49 executing program 7: r0 = fsopen(&(0x7f0000000080)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) mknodat$null(r1, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) move_mount(r1, &(0x7f00000007c0)='./file0\x00', r1, &(0x7f0000000800)='./file0\x00', 0x0) 14:13:49 executing program 6: syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000600)={[{@fat=@nocase}]}) 14:13:50 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000140)=@ethtool_link_settings={0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) [ 133.690828] FAT-fs (loop6): bogus number of reserved sectors [ 133.691686] FAT-fs (loop6): Can't find a valid FAT filesystem [ 134.085994] audit: type=1400 audit(1663078430.446:9): avc: denied { write } for pid=4238 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 14:13:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000000000/0x2000)=nil, 0x2000) get_mempolicy(&(0x7f0000000140), 0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil, 0x2) 14:13:50 executing program 4: r0 = syz_io_uring_setup(0xfa7, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)={&(0x7f0000000180)=@ax25={{0x3, @rose}, [@netrom, @remote, @default, @rose, @bcast, @default, @rose, @null]}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000200)=""/12, 0xc}, {&(0x7f0000000280)=""/53, 0x35}, {&(0x7f0000000300)=""/78, 0x4e}, {&(0x7f0000000380)=""/228, 0xe4}, {&(0x7f0000000480)=""/4, 0x4}, {&(0x7f00000004c0)}, {&(0x7f0000000500)=""/209, 0xd1}], 0x100000000000027f, &(0x7f0000000680)=""/165, 0xb5}}, 0x0) io_uring_enter(r0, 0x100001, 0x0, 0x0, 0x0, 0x0) 14:13:50 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000140)=@ethtool_link_settings={0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) 14:13:50 executing program 7: r0 = fsopen(&(0x7f0000000080)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) mknodat$null(r1, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) move_mount(r1, &(0x7f00000007c0)='./file0\x00', r1, &(0x7f0000000800)='./file0\x00', 0x0) 14:13:50 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) select(0x0, 0x0, 0x0, 0x0, 0x0) 14:13:50 executing program 6: syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000600)={[{@fat=@nocase}]}) 14:13:50 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_UNREGISTER_BUFFERS(0xffffffffffffffff, 0x1, 0x1000000, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="140000000200007f9b29e800000000e9b66d0c163b4de64a782271eb"], 0x0) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0xd2, 0x6, 0x8, 0xf7, 0x0, 0x2, 0x200, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x80000000, 0xffffffffffff532d}, 0x210, 0x40025cb, 0x4, 0x0, 0x6, 0x2, 0x0, 0x0, 0xfffff000, 0x0, 0x200}, 0x0, 0xb, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x37bc, 0x0, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f00000006c0)) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000004c0)) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, r1, 0x0) syz_io_uring_setup(0xaaf, &(0x7f0000000100)={0x0, 0x0, 0x10, 0x4, 0x17, 0x0, r1}, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000fef000/0x11000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) 14:13:50 executing program 1: r0 = semget$private(0x0, 0x3, 0x0) semtimedop(r0, &(0x7f0000000200)=[{}, {0x0, 0xd3fa}], 0x2, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0x3}, {}], 0x2, &(0x7f0000000140)) [ 134.396387] FAT-fs (loop6): bogus number of reserved sectors [ 134.397174] FAT-fs (loop6): Can't find a valid FAT filesystem 14:13:50 executing program 6: syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000600)={[{@fat=@nocase}]}) 14:13:50 executing program 7: r0 = fsopen(&(0x7f0000000080)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) mknodat$null(r1, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) move_mount(r1, &(0x7f00000007c0)='./file0\x00', r1, &(0x7f0000000800)='./file0\x00', 0x0) [ 134.451720] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s 14:13:50 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000140)=@ethtool_link_settings={0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) [ 134.453041] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 134.454345] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 134.455232] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 40 00 [ 134.456235] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 30 prio class 2 [ 134.458100] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 134.458511] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 134.459351] Buffer I/O error on dev sr0, logical block 0, async page read [ 134.460013] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 134.460375] I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 134.460942] Buffer I/O error on dev sr0, logical block 1, async page read [ 134.461584] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 134.462314] I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 134.462883] Buffer I/O error on dev sr0, logical block 2, async page read [ 134.463588] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 134.464017] I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 134.464615] Buffer I/O error on dev sr0, logical block 3, async page read [ 134.465862] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 134.466225] I/O error, dev sr0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 134.466858] Buffer I/O error on dev sr0, logical block 4, async page read [ 134.467507] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 134.467910] I/O error, dev sr0, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 134.468464] Buffer I/O error on dev sr0, logical block 5, async page read [ 134.471294] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 134.471668] I/O error, dev sr0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 134.472234] Buffer I/O error on dev sr0, logical block 6, async page read [ 134.475492] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 134.475943] I/O error, dev sr0, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 134.476493] Buffer I/O error on dev sr0, logical block 7, async page read [ 134.477447] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 134.477830] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 134.478382] Buffer I/O error on dev sr0, logical block 0, async page read [ 134.479108] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 134.479474] Buffer I/O error on dev sr0, logical block 1, async page read 14:13:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000000000/0x2000)=nil, 0x2000) get_mempolicy(&(0x7f0000000140), 0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil, 0x2) 14:13:50 executing program 4: r0 = syz_io_uring_setup(0xfa7, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)={&(0x7f0000000180)=@ax25={{0x3, @rose}, [@netrom, @remote, @default, @rose, @bcast, @default, @rose, @null]}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000200)=""/12, 0xc}, {&(0x7f0000000280)=""/53, 0x35}, {&(0x7f0000000300)=""/78, 0x4e}, {&(0x7f0000000380)=""/228, 0xe4}, {&(0x7f0000000480)=""/4, 0x4}, {&(0x7f00000004c0)}, {&(0x7f0000000500)=""/209, 0xd1}], 0x100000000000027f, &(0x7f0000000680)=""/165, 0xb5}}, 0x0) io_uring_enter(r0, 0x100001, 0x0, 0x0, 0x0, 0x0) [ 134.537213] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 134.552731] FAT-fs (loop6): bogus number of reserved sectors [ 134.553717] FAT-fs (loop6): Can't find a valid FAT filesystem [ 134.589197] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 134.593754] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 134.594473] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 134.595111] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 134.595675] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 14:13:51 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) 14:13:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) select(0x0, 0x0, 0x0, 0x0, 0x0) 14:13:51 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000020c0)='ns/net\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002100)) 14:13:51 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_UNREGISTER_BUFFERS(0xffffffffffffffff, 0x1, 0x1000000, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="140000000200007f9b29e800000000e9b66d0c163b4de64a782271eb"], 0x0) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0xd2, 0x6, 0x8, 0xf7, 0x0, 0x2, 0x200, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x80000000, 0xffffffffffff532d}, 0x210, 0x40025cb, 0x4, 0x0, 0x6, 0x2, 0x0, 0x0, 0xfffff000, 0x0, 0x200}, 0x0, 0xb, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x37bc, 0x0, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f00000006c0)) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000004c0)) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, r1, 0x0) syz_io_uring_setup(0xaaf, &(0x7f0000000100)={0x0, 0x0, 0x10, 0x4, 0x17, 0x0, r1}, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000fef000/0x11000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) 14:13:51 executing program 6: mbind(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) 14:13:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000270008000f801", 0x17}], 0x0, &(0x7f00000006c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x8000, 0x102) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x20000190, 0x0) ioctl$AUTOFS_IOC_PROTOVER(0xffffffffffffffff, 0x80049363, &(0x7f0000000300)) perf_event_open(&(0x7f0000000280)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f00000001c0)=0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) write$binfmt_aout(r3, &(0x7f00000003c0)=ANY=[], 0x820) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1/file0\x00', 0x0, 0x153) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x7fffffff) 14:13:51 executing program 1: r0 = semget$private(0x0, 0x3, 0x0) semtimedop(r0, &(0x7f0000000200)=[{}, {0x0, 0xd3fa}], 0x2, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0x3}, {}], 0x2, &(0x7f0000000140)) 14:13:51 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000003b00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) linkat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0, 0x1400) [ 135.321482] loop4: detected capacity change from 0 to 264192 14:13:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x22, &(0x7f0000000500)={[{}]}) 14:13:51 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x4}, 0x0, 0xfffffffffffff7ff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, &(0x7f0000000240)={0x0, 0x8, [0x1, 0xebb, 0x7fffffff, 0x6, 0x0, 0x3]}) io_setup(0x3ff, &(0x7f0000000140)=0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') io_submit(r1, 0x1, &(0x7f0000001340)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x200000}]) 14:13:51 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r0, 0x5437, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) 14:13:51 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000003b00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) linkat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0, 0x1400) [ 135.388270] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 135.389514] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 135.390035] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 135.390516] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 40 00 [ 135.391867] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.392461] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.393119] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.393746] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.394381] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.395119] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.395710] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.396406] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.397335] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.398026] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.398639] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.399324] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.399981] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.400615] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.401294] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.402541] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 14:13:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x22, &(0x7f0000000500)={[{}]}) 14:13:51 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_UNREGISTER_BUFFERS(0xffffffffffffffff, 0x1, 0x1000000, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="140000000200007f9b29e800000000e9b66d0c163b4de64a782271eb"], 0x0) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0xd2, 0x6, 0x8, 0xf7, 0x0, 0x2, 0x200, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x80000000, 0xffffffffffff532d}, 0x210, 0x40025cb, 0x4, 0x0, 0x6, 0x2, 0x0, 0x0, 0xfffff000, 0x0, 0x200}, 0x0, 0xb, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x37bc, 0x0, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f00000006c0)) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000004c0)) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, r1, 0x0) syz_io_uring_setup(0xaaf, &(0x7f0000000100)={0x0, 0x0, 0x10, 0x4, 0x17, 0x0, r1}, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000fef000/0x11000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) 14:13:51 executing program 2: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000009, 0x32, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) 14:13:51 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r0, 0x5437, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) 14:13:51 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000003b00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) linkat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0, 0x1400) [ 135.539271] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 135.540310] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 135.540980] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 135.541601] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 40 00 [ 135.543138] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.544052] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.545079] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.545700] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.546414] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.547118] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.547868] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.548546] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.549424] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.550138] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.550953] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.551585] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.552343] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.553045] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.553726] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.554422] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.555272] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.555970] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.556640] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.557309] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.558049] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.558662] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.559409] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.560632] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.561570] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.562252] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.566427] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.567124] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.569065] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.570962] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.571658] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.572717] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 14:13:52 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x22, &(0x7f0000000500)={[{}]}) 14:13:52 executing program 1: r0 = semget$private(0x0, 0x3, 0x0) semtimedop(r0, &(0x7f0000000200)=[{}, {0x0, 0xd3fa}], 0x2, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0x3}, {}], 0x2, &(0x7f0000000140)) 14:13:52 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) select(0x0, 0x0, 0x0, 0x0, 0x0) 14:13:52 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000003b00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) linkat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0, 0x1400) 14:13:52 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r0, 0x5437, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) 14:13:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000270008000f801", 0x17}], 0x0, &(0x7f00000006c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x8000, 0x102) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x20000190, 0x0) ioctl$AUTOFS_IOC_PROTOVER(0xffffffffffffffff, 0x80049363, &(0x7f0000000300)) perf_event_open(&(0x7f0000000280)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f00000001c0)=0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) write$binfmt_aout(r3, &(0x7f00000003c0)=ANY=[], 0x820) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1/file0\x00', 0x0, 0x153) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x7fffffff) 14:13:52 executing program 2: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000009, 0x32, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) 14:13:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000270008000f801", 0x17}], 0x0, &(0x7f00000006c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x8000, 0x102) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x20000190, 0x0) ioctl$AUTOFS_IOC_PROTOVER(0xffffffffffffffff, 0x80049363, &(0x7f0000000300)) perf_event_open(&(0x7f0000000280)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f00000001c0)=0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) write$binfmt_aout(r3, &(0x7f00000003c0)=ANY=[], 0x820) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1/file0\x00', 0x0, 0x153) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x7fffffff) [ 136.209908] loop5: detected capacity change from 0 to 264192 [ 136.216660] loop4: detected capacity change from 0 to 264192 14:13:52 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r0, 0x5437, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) 14:13:52 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r0, 0x5437, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) 14:13:52 executing program 2: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000009, 0x32, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) 14:13:52 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x22, &(0x7f0000000500)={[{}]}) 14:13:52 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r0, 0x5437, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) 14:13:52 executing program 7: r0 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_PROBE(r0, 0x8, &(0x7f0000000080), 0x0) 14:13:52 executing program 2: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000009, 0x32, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) 14:13:52 executing program 7: r0 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_PROBE(r0, 0x8, &(0x7f0000000080), 0x0) 14:13:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000270008000f801", 0x17}], 0x0, &(0x7f00000006c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x8000, 0x102) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x20000190, 0x0) ioctl$AUTOFS_IOC_PROTOVER(0xffffffffffffffff, 0x80049363, &(0x7f0000000300)) perf_event_open(&(0x7f0000000280)={0x1, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f00000001c0)=0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) write$binfmt_aout(r3, &(0x7f00000003c0)=ANY=[], 0x820) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1/file0\x00', 0x0, 0x153) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x7fffffff) [ 136.445391] loop4: detected capacity change from 0 to 264192 VM DIAGNOSIS: 14:13:43 Registers: info registers vcpu 0 RAX=dffffc0000000000 RBX=ffffe8ffffc20dc8 RCX=1ffffd1ffff841b9 RDX=0000000000000006 RSI=1ffffffff0a2b514 RDI=ffffffff8530afe0 RBP=ffff888015daf820 RSP=ffff888015daf738 R8 =0000000000000000 R9 =0000000000000001 R10=fffffbfff0b60462 R11=0000000000000001 R12=ffffed1002bb5eef R13=ffffffff8530af60 R14=ffffffff854ced78 R15=ffff888015daf7f8 RIP=ffffffff8128958e RFL=00000082 [--S----] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f2e316e98c0 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ff7b02006f4 CR3=000000000f5c2000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM02=0000000000000000 0000000000000000 7269762f73656369 7665642f7379732f YMM03=0000000000000000 0000000000000000 747269762f736563 697665642f737973 YMM04=0000000000000000 0000000000000000 2f2f2f2f2f2f2f2f 2f2f2f2f2f2f2f2f YMM05=0000000000000000 0000000000000000 0000563f94e977f0 0000563f94ec51c0 YMM06=0000000000000000 0000000000000000 0000563f94eea7d0 0000000300000004 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 2f63697361622f63 72732f2e2e000d0a YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000074 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b25c1 RDI=ffffffff8763fae0 RBP=ffffffff8763faa0 RSP=ffff88801a097698 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000074 R11=0000000000000001 R12=0000000000000074 R13=ffffffff8763faa0 R14=0000000000000010 R15=ffffffff822b25b0 RIP=ffffffff822b2619 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f9b6d2c1700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f3d65d19710 CR3=000000000e068000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f9b6fe327c0 00007f9b6fe327c8 YMM02=0000000000000000 0000000000000000 00007f9b6fe327e0 00007f9b6fe327c0 YMM03=0000000000000000 0000000000000000 00007f9b6fe327c8 00007f9b6fe327c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000