Warning: Permanently added '[localhost]:34171' (ECDSA) to the list of known hosts. 2022/09/13 14:31:50 fuzzer started 2022/09/13 14:31:51 dialing manager at localhost:36597 syzkaller login: [ 45.138312] cgroup: Unknown subsys name 'net' [ 45.225886] cgroup: Unknown subsys name 'rlimit' 2022/09/13 14:32:05 syscalls: 2215 2022/09/13 14:32:05 code coverage: enabled 2022/09/13 14:32:05 comparison tracing: enabled 2022/09/13 14:32:05 extra coverage: enabled 2022/09/13 14:32:05 setuid sandbox: enabled 2022/09/13 14:32:05 namespace sandbox: enabled 2022/09/13 14:32:05 Android sandbox: enabled 2022/09/13 14:32:05 fault injection: enabled 2022/09/13 14:32:05 leak checking: enabled 2022/09/13 14:32:05 net packet injection: enabled 2022/09/13 14:32:05 net device setup: enabled 2022/09/13 14:32:05 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/13 14:32:05 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/13 14:32:05 USB emulation: enabled 2022/09/13 14:32:05 hci packet injection: enabled 2022/09/13 14:32:05 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220913) 2022/09/13 14:32:05 802.15.4 emulation: enabled 2022/09/13 14:32:05 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/13 14:32:05 fetching corpus: 50, signal 34380/37727 (executing program) 2022/09/13 14:32:05 fetching corpus: 100, signal 49684/54228 (executing program) 2022/09/13 14:32:05 fetching corpus: 150, signal 57991/63756 (executing program) 2022/09/13 14:32:06 fetching corpus: 200, signal 66735/73511 (executing program) 2022/09/13 14:32:06 fetching corpus: 250, signal 74814/82451 (executing program) 2022/09/13 14:32:06 fetching corpus: 300, signal 80093/88614 (executing program) 2022/09/13 14:32:06 fetching corpus: 350, signal 84617/93983 (executing program) 2022/09/13 14:32:06 fetching corpus: 400, signal 87931/98188 (executing program) 2022/09/13 14:32:06 fetching corpus: 450, signal 91104/102202 (executing program) 2022/09/13 14:32:06 fetching corpus: 500, signal 94276/106187 (executing program) 2022/09/13 14:32:07 fetching corpus: 550, signal 98906/111376 (executing program) 2022/09/13 14:32:07 fetching corpus: 600, signal 100603/113929 (executing program) 2022/09/13 14:32:07 fetching corpus: 650, signal 103082/117104 (executing program) 2022/09/13 14:32:07 fetching corpus: 700, signal 106856/121348 (executing program) 2022/09/13 14:32:07 fetching corpus: 750, signal 110404/125312 (executing program) 2022/09/13 14:32:07 fetching corpus: 800, signal 114205/129405 (executing program) 2022/09/13 14:32:08 fetching corpus: 850, signal 117036/132702 (executing program) 2022/09/13 14:32:08 fetching corpus: 900, signal 119640/135709 (executing program) 2022/09/13 14:32:08 fetching corpus: 950, signal 123341/139492 (executing program) 2022/09/13 14:32:08 fetching corpus: 1000, signal 125791/142228 (executing program) 2022/09/13 14:32:08 fetching corpus: 1050, signal 128093/144836 (executing program) 2022/09/13 14:32:08 fetching corpus: 1100, signal 129963/147050 (executing program) 2022/09/13 14:32:08 fetching corpus: 1150, signal 132255/149584 (executing program) 2022/09/13 14:32:09 fetching corpus: 1200, signal 133661/151327 (executing program) 2022/09/13 14:32:09 fetching corpus: 1250, signal 135332/153329 (executing program) 2022/09/13 14:32:09 fetching corpus: 1300, signal 136917/155209 (executing program) 2022/09/13 14:32:09 fetching corpus: 1350, signal 138692/157141 (executing program) 2022/09/13 14:32:09 fetching corpus: 1400, signal 139978/158707 (executing program) 2022/09/13 14:32:09 fetching corpus: 1450, signal 141979/160821 (executing program) 2022/09/13 14:32:09 fetching corpus: 1500, signal 143716/162673 (executing program) 2022/09/13 14:32:10 fetching corpus: 1550, signal 145807/164773 (executing program) 2022/09/13 14:32:10 fetching corpus: 1600, signal 148696/167332 (executing program) 2022/09/13 14:32:10 fetching corpus: 1650, signal 150242/168953 (executing program) 2022/09/13 14:32:10 fetching corpus: 1700, signal 151234/170188 (executing program) 2022/09/13 14:32:10 fetching corpus: 1750, signal 153147/171997 (executing program) 2022/09/13 14:32:10 fetching corpus: 1800, signal 154307/173238 (executing program) 2022/09/13 14:32:11 fetching corpus: 1850, signal 155742/174657 (executing program) 2022/09/13 14:32:11 fetching corpus: 1900, signal 156443/175560 (executing program) 2022/09/13 14:32:11 fetching corpus: 1950, signal 158142/177062 (executing program) 2022/09/13 14:32:11 fetching corpus: 2000, signal 159381/178319 (executing program) 2022/09/13 14:32:11 fetching corpus: 2050, signal 160426/179440 (executing program) 2022/09/13 14:32:11 fetching corpus: 2100, signal 162138/180908 (executing program) 2022/09/13 14:32:11 fetching corpus: 2150, signal 163357/182009 (executing program) 2022/09/13 14:32:12 fetching corpus: 2200, signal 165009/183357 (executing program) 2022/09/13 14:32:12 fetching corpus: 2250, signal 166295/184470 (executing program) 2022/09/13 14:32:12 fetching corpus: 2300, signal 167500/185533 (executing program) 2022/09/13 14:32:12 fetching corpus: 2350, signal 168825/186641 (executing program) 2022/09/13 14:32:12 fetching corpus: 2400, signal 169618/187430 (executing program) 2022/09/13 14:32:12 fetching corpus: 2450, signal 170977/188606 (executing program) 2022/09/13 14:32:12 fetching corpus: 2500, signal 172436/189668 (executing program) 2022/09/13 14:32:13 fetching corpus: 2550, signal 173698/190652 (executing program) 2022/09/13 14:32:13 fetching corpus: 2600, signal 174668/191499 (executing program) 2022/09/13 14:32:13 fetching corpus: 2650, signal 176757/192871 (executing program) 2022/09/13 14:32:13 fetching corpus: 2700, signal 177667/193602 (executing program) 2022/09/13 14:32:13 fetching corpus: 2750, signal 178404/194249 (executing program) 2022/09/13 14:32:13 fetching corpus: 2800, signal 179196/194922 (executing program) 2022/09/13 14:32:14 fetching corpus: 2850, signal 180264/195646 (executing program) 2022/09/13 14:32:14 fetching corpus: 2900, signal 181532/196503 (executing program) 2022/09/13 14:32:14 fetching corpus: 2950, signal 182510/197191 (executing program) 2022/09/13 14:32:14 fetching corpus: 3000, signal 183223/197754 (executing program) 2022/09/13 14:32:14 fetching corpus: 3050, signal 184094/198364 (executing program) 2022/09/13 14:32:14 fetching corpus: 3100, signal 184905/198914 (executing program) 2022/09/13 14:32:15 fetching corpus: 3150, signal 186224/199723 (executing program) 2022/09/13 14:32:15 fetching corpus: 3200, signal 187433/200381 (executing program) 2022/09/13 14:32:15 fetching corpus: 3250, signal 188120/200846 (executing program) 2022/09/13 14:32:15 fetching corpus: 3300, signal 188805/201341 (executing program) 2022/09/13 14:32:15 fetching corpus: 3350, signal 189766/201852 (executing program) 2022/09/13 14:32:15 fetching corpus: 3400, signal 190608/202311 (executing program) 2022/09/13 14:32:15 fetching corpus: 3450, signal 191301/202684 (executing program) 2022/09/13 14:32:16 fetching corpus: 3500, signal 192197/203131 (executing program) 2022/09/13 14:32:16 fetching corpus: 3550, signal 193522/203637 (executing program) 2022/09/13 14:32:16 fetching corpus: 3600, signal 194377/203989 (executing program) 2022/09/13 14:32:16 fetching corpus: 3650, signal 195037/204296 (executing program) 2022/09/13 14:32:16 fetching corpus: 3700, signal 195835/204631 (executing program) 2022/09/13 14:32:16 fetching corpus: 3750, signal 197061/205054 (executing program) 2022/09/13 14:32:16 fetching corpus: 3800, signal 198057/205433 (executing program) 2022/09/13 14:32:17 fetching corpus: 3850, signal 198988/205748 (executing program) 2022/09/13 14:32:17 fetching corpus: 3887, signal 199651/205970 (executing program) 2022/09/13 14:32:17 fetching corpus: 3887, signal 199651/206046 (executing program) 2022/09/13 14:32:17 fetching corpus: 3887, signal 199651/206119 (executing program) 2022/09/13 14:32:17 fetching corpus: 3887, signal 199651/206197 (executing program) 2022/09/13 14:32:17 fetching corpus: 3887, signal 199651/206261 (executing program) 2022/09/13 14:32:17 fetching corpus: 3887, signal 199651/206326 (executing program) 2022/09/13 14:32:17 fetching corpus: 3887, signal 199651/206388 (executing program) 2022/09/13 14:32:17 fetching corpus: 3887, signal 199651/206464 (executing program) 2022/09/13 14:32:17 fetching corpus: 3887, signal 199651/206553 (executing program) 2022/09/13 14:32:17 fetching corpus: 3887, signal 199651/206619 (executing program) 2022/09/13 14:32:17 fetching corpus: 3887, signal 199651/206701 (executing program) 2022/09/13 14:32:17 fetching corpus: 3887, signal 199651/206775 (executing program) 2022/09/13 14:32:17 fetching corpus: 3887, signal 199651/206840 (executing program) 2022/09/13 14:32:17 fetching corpus: 3887, signal 199651/206928 (executing program) 2022/09/13 14:32:17 fetching corpus: 3887, signal 199651/207005 (executing program) 2022/09/13 14:32:17 fetching corpus: 3887, signal 199651/207078 (executing program) 2022/09/13 14:32:17 fetching corpus: 3887, signal 199651/207162 (executing program) 2022/09/13 14:32:17 fetching corpus: 3887, signal 199651/207240 (executing program) 2022/09/13 14:32:17 fetching corpus: 3887, signal 199651/207323 (executing program) 2022/09/13 14:32:17 fetching corpus: 3887, signal 199651/207406 (executing program) 2022/09/13 14:32:17 fetching corpus: 3887, signal 199651/207479 (executing program) 2022/09/13 14:32:17 fetching corpus: 3887, signal 199651/207567 (executing program) 2022/09/13 14:32:17 fetching corpus: 3887, signal 199651/207651 (executing program) 2022/09/13 14:32:17 fetching corpus: 3887, signal 199651/207651 (executing program) 2022/09/13 14:32:20 starting 8 fuzzer processes 14:32:20 executing program 0: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in6=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@empty, 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'xcbc(aes)\x00'}}}]}, 0x138}}, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in6=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@empty}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) 14:32:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0x0) 14:32:20 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000008ac0), 0x40, 0x0) 14:32:20 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000040)=0x20000, 0x4) syz_emit_ethernet(0x15, &(0x7f0000000200)={@random="63c1996768a3", @random="72cf8684d2d2", @val={@void}, {@llc={0x4, {@llc={0x0, 0x0, "c3"}}}}}, 0x0) 14:32:20 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) bind$bt_hci(r1, &(0x7f0000000080)={0x1f, 0x8}, 0x6) [ 74.249697] audit: type=1400 audit(1663079540.393:6): avc: denied { execmem } for pid=287 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 14:32:20 executing program 5: syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3000000, &(0x7f0000000b80)) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 14:32:20 executing program 7: prlimit64(0x0, 0x7, &(0x7f0000000080)={0x4, 0x6}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) accept(r0, 0x0, 0x0) 14:32:20 executing program 6: keyctl$restrict_keyring(0x1d, 0xfffffffffffffffb, &(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)='$]):&\x00') [ 75.516045] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 75.517906] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 75.519627] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 75.520709] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 75.522119] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 75.523324] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 75.524565] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 75.525676] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 75.528493] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 75.530736] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 75.531838] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 75.559243] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 75.561560] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 75.565215] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 75.566776] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 75.568533] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 75.571351] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 75.576373] Bluetooth: hci0: HCI_REQ-0x0c1a [ 75.578478] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 75.582363] Bluetooth: hci3: HCI_REQ-0x0c1a [ 75.583629] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 75.589246] Bluetooth: hci1: HCI_REQ-0x0c1a [ 75.609692] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 75.611222] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 75.612212] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 75.613845] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 75.615254] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 75.616510] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 75.616533] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 75.618869] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 75.620668] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 75.622549] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 75.626777] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 75.628254] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 75.629545] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 75.630325] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 75.631915] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 75.632486] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 75.635056] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 75.635104] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 75.636126] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 75.638655] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 75.640370] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 75.646496] Bluetooth: hci5: HCI_REQ-0x0c1a [ 75.647670] Bluetooth: hci2: HCI_REQ-0x0c1a [ 75.649117] Bluetooth: hci6: HCI_REQ-0x0c1a [ 75.649924] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 75.654913] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 75.662870] Bluetooth: hci7: HCI_REQ-0x0c1a [ 77.582071] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 77.647287] Bluetooth: hci0: command 0x0409 tx timeout [ 77.647884] Bluetooth: hci1: command 0x0409 tx timeout [ 77.648338] Bluetooth: hci3: command 0x0409 tx timeout [ 77.711038] Bluetooth: hci5: command 0x0409 tx timeout [ 77.711468] Bluetooth: hci7: command 0x0409 tx timeout [ 77.711887] Bluetooth: hci6: command 0x0409 tx timeout [ 77.712316] Bluetooth: hci2: command 0x0409 tx timeout [ 79.694003] Bluetooth: hci3: command 0x041b tx timeout [ 79.694771] Bluetooth: hci1: command 0x041b tx timeout [ 79.695254] Bluetooth: hci0: command 0x041b tx timeout [ 79.758026] Bluetooth: hci2: command 0x041b tx timeout [ 79.758554] Bluetooth: hci6: command 0x041b tx timeout [ 79.759490] Bluetooth: hci7: command 0x041b tx timeout [ 79.759931] Bluetooth: hci5: command 0x041b tx timeout [ 80.579403] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 80.580484] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 80.582460] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 80.593312] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 80.594521] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 80.595309] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 80.597996] Bluetooth: hci4: HCI_REQ-0x0c1a [ 81.742068] Bluetooth: hci0: command 0x040f tx timeout [ 81.742802] Bluetooth: hci1: command 0x040f tx timeout [ 81.743281] Bluetooth: hci3: command 0x040f tx timeout [ 81.806010] Bluetooth: hci5: command 0x040f tx timeout [ 81.806511] Bluetooth: hci7: command 0x040f tx timeout [ 81.806976] Bluetooth: hci6: command 0x040f tx timeout [ 81.807405] Bluetooth: hci2: command 0x040f tx timeout [ 82.638337] Bluetooth: hci4: command 0x0409 tx timeout [ 83.790031] Bluetooth: hci3: command 0x0419 tx timeout [ 83.790542] Bluetooth: hci1: command 0x0419 tx timeout [ 83.791632] Bluetooth: hci0: command 0x0419 tx timeout [ 83.854080] Bluetooth: hci2: command 0x0419 tx timeout [ 83.854568] Bluetooth: hci6: command 0x0419 tx timeout [ 83.855024] Bluetooth: hci7: command 0x0419 tx timeout [ 83.855448] Bluetooth: hci5: command 0x0419 tx timeout [ 84.686036] Bluetooth: hci4: command 0x041b tx timeout [ 86.733993] Bluetooth: hci4: command 0x040f tx timeout [ 88.781993] Bluetooth: hci4: command 0x0419 tx timeout 14:33:08 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000040)=0x20000, 0x4) syz_emit_ethernet(0x15, &(0x7f0000000200)={@random="63c1996768a3", @random="72cf8684d2d2", @val={@void}, {@llc={0x4, {@llc={0x0, 0x0, "c3"}}}}}, 0x0) 14:33:08 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000040)=0x20000, 0x4) syz_emit_ethernet(0x15, &(0x7f0000000200)={@random="63c1996768a3", @random="72cf8684d2d2", @val={@void}, {@llc={0x4, {@llc={0x0, 0x0, "c3"}}}}}, 0x0) 14:33:08 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000040)=0x20000, 0x4) syz_emit_ethernet(0x15, &(0x7f0000000200)={@random="63c1996768a3", @random="72cf8684d2d2", @val={@void}, {@llc={0x4, {@llc={0x0, 0x0, "c3"}}}}}, 0x0) 14:33:09 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000040)=0x20000, 0x4) syz_emit_ethernet(0x15, &(0x7f0000000200)={@random="63c1996768a3", @random="72cf8684d2d2", @val={@void}, {@llc={0x4, {@llc={0x0, 0x0, "c3"}}}}}, 0x0) 14:33:09 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000040)=0x20000, 0x4) syz_emit_ethernet(0x15, &(0x7f0000000200)={@random="63c1996768a3", @random="72cf8684d2d2", @val={@void}, {@llc={0x4, {@llc={0x0, 0x0, "c3"}}}}}, 0x0) 14:33:09 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000040)=0x20000, 0x4) syz_emit_ethernet(0x15, &(0x7f0000000200)={@random="63c1996768a3", @random="72cf8684d2d2", @val={@void}, {@llc={0x4, {@llc={0x0, 0x0, "c3"}}}}}, 0x0) 14:33:09 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), 0xffffffffffffffff) 14:33:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$SO_COOKIE(r0, 0x1, 0x39, 0x0, &(0x7f0000001b80)) 14:33:12 executing program 0: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in6=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@empty, 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'xcbc(aes)\x00'}}}]}, 0x138}}, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in6=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@empty}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) 14:33:12 executing program 6: keyctl$restrict_keyring(0x1d, 0xfffffffffffffffb, &(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)='$]):&\x00') 14:33:12 executing program 7: prlimit64(0x0, 0x7, &(0x7f0000000080)={0x4, 0x6}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) accept(r0, 0x0, 0x0) 14:33:12 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) bind$bt_hci(r1, &(0x7f0000000080)={0x1f, 0x8}, 0x6) 14:33:12 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), 0xffffffffffffffff) 14:33:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$SO_COOKIE(r0, 0x1, 0x39, 0x0, &(0x7f0000001b80)) 14:33:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0x0) 14:33:12 executing program 5: syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3000000, &(0x7f0000000b80)) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 14:33:12 executing program 6: keyctl$restrict_keyring(0x1d, 0xfffffffffffffffb, &(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)='$]):&\x00') 14:33:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$SO_COOKIE(r0, 0x1, 0x39, 0x0, &(0x7f0000001b80)) 14:33:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0x0) 14:33:12 executing program 7: prlimit64(0x0, 0x7, &(0x7f0000000080)={0x4, 0x6}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) accept(r0, 0x0, 0x0) 14:33:12 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) bind$bt_hci(r1, &(0x7f0000000080)={0x1f, 0x8}, 0x6) 14:33:12 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), 0xffffffffffffffff) 14:33:12 executing program 5: syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3000000, &(0x7f0000000b80)) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 14:33:12 executing program 6: keyctl$restrict_keyring(0x1d, 0xfffffffffffffffb, &(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)='$]):&\x00') 14:33:12 executing program 0: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in6=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@empty, 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'xcbc(aes)\x00'}}}]}, 0x138}}, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in6=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@empty}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) 14:33:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0x0) 14:33:12 executing program 7: prlimit64(0x0, 0x7, &(0x7f0000000080)={0x4, 0x6}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) accept(r0, 0x0, 0x0) 14:33:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$SO_COOKIE(r0, 0x1, 0x39, 0x0, &(0x7f0000001b80)) 14:33:12 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), 0xffffffffffffffff) 14:33:12 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) bind$bt_hci(r1, &(0x7f0000000080)={0x1f, 0x8}, 0x6) 14:33:12 executing program 5: syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x3000000, &(0x7f0000000b80)) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 14:33:12 executing program 6: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in6=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@empty, 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'xcbc(aes)\x00'}}}]}, 0x138}}, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in6=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@empty}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) 14:33:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000b8c5c4d1b3cf4b38ab2e2967fb770ff3010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000d4f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2080}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x20000}], 0x0, &(0x7f0000012f00)) [ 126.481071] loop1: detected capacity change from 0 to 2048 [ 126.500195] audit: type=1400 audit(1663079592.643:7): avc: denied { open } for pid=4038 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 126.501755] audit: type=1400 audit(1663079592.644:8): avc: denied { kernel } for pid=4038 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 14:33:12 executing program 3: mount(&(0x7f0000000280)=ANY=[], &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='vfat\x00', 0x0, 0x0) 14:33:12 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf29, 0x30000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xef8, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:33:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x48, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) 14:33:12 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0xb, &(0x7f0000000200)={0x77359400}, 0x10) 14:33:12 executing program 3: mount(&(0x7f0000000280)=ANY=[], &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='vfat\x00', 0x0, 0x0) 14:33:12 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$getflags(r0, 0x401) 14:33:12 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf29, 0x30000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xef8, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 126.596439] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 126.598826] ext4 filesystem being mounted at /syzkaller-testdir862438872/syzkaller.c4akAY/4/file0 supports timestamps until 2038 (0x7fffffff) [ 126.636104] EXT4-fs (loop1): unmounting filesystem. [ 126.663604] ------------[ cut here ]------------ [ 126.663636] [ 126.663639] ====================================================== [ 126.663643] WARNING: possible circular locking dependency detected [ 126.663647] 6.0.0-rc5-next-20220913 #1 Not tainted [ 126.663654] ------------------------------------------------------ [ 126.663656] syz-executor.4/4055 is trying to acquire lock: [ 126.663663] ffffffff853fa878 ((console_sem).lock){-...}-{2:2}, at: down_trylock+0xe/0x70 [ 126.663699] [ 126.663699] but task is already holding lock: [ 126.663702] ffff88803edccc20 (&ctx->lock){-...}-{2:2}, at: event_function+0x182/0x3d0 [ 126.663731] [ 126.663731] which lock already depends on the new lock. [ 126.663731] [ 126.663733] [ 126.663733] the existing dependency chain (in reverse order) is: [ 126.663736] [ 126.663736] -> #3 (&ctx->lock){-...}-{2:2}: [ 126.663750] _raw_spin_lock+0x2a/0x40 [ 126.663766] __perf_event_task_sched_out+0x53b/0x18d0 [ 126.663778] __schedule+0xedd/0x2470 [ 126.663787] schedule+0xda/0x1b0 [ 126.663795] exit_to_user_mode_prepare+0x114/0x1a0 [ 126.663814] syscall_exit_to_user_mode+0x19/0x40 [ 126.663830] do_syscall_64+0x48/0x90 [ 126.663843] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.663862] [ 126.663862] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 126.663875] _raw_spin_lock_nested+0x30/0x40 [ 126.663888] raw_spin_rq_lock_nested+0x1e/0x30 [ 126.663900] task_fork_fair+0x63/0x4d0 [ 126.663916] sched_cgroup_fork+0x3d0/0x540 [ 126.663929] copy_process+0x3f9e/0x6df0 [ 126.663938] kernel_clone+0xe7/0x890 [ 126.663947] user_mode_thread+0xad/0xf0 [ 126.663956] rest_init+0x24/0x250 [ 126.663971] arch_call_rest_init+0xf/0x14 [ 126.663989] start_kernel+0x4c1/0x4e6 [ 126.664005] secondary_startup_64_no_verify+0xe0/0xeb [ 126.664019] [ 126.664019] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 126.664031] _raw_spin_lock_irqsave+0x39/0x60 [ 126.664045] try_to_wake_up+0xab/0x1920 [ 126.664057] up+0x75/0xb0 [ 126.664068] __up_console_sem+0x6e/0x80 [ 126.664083] console_unlock+0x46a/0x590 [ 126.664098] do_con_write+0xc05/0x1d50 [ 126.664108] con_write+0x21/0x40 [ 126.664117] n_tty_write+0x4d4/0xfe0 [ 126.664128] file_tty_write.constprop.0+0x49c/0x8f0 [ 126.664139] vfs_write+0x9c3/0xd90 [ 126.664156] ksys_write+0x127/0x250 [ 126.664172] do_syscall_64+0x3b/0x90 [ 126.664184] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.664199] [ 126.664199] -> #0 ((console_sem).lock){-...}-{2:2}: [ 126.664212] __lock_acquire+0x2a02/0x5e70 [ 126.664227] lock_acquire+0x1a2/0x530 [ 126.664242] _raw_spin_lock_irqsave+0x39/0x60 [ 126.664255] down_trylock+0xe/0x70 [ 126.664267] __down_trylock_console_sem+0x3b/0xd0 [ 126.664281] vprintk_emit+0x16b/0x560 [ 126.664297] vprintk+0x84/0xa0 [ 126.664312] _printk+0xba/0xf1 [ 126.664328] report_bug.cold+0x72/0xab [ 126.664339] handle_bug+0x3c/0x70 [ 126.664351] exc_invalid_op+0x14/0x50 [ 126.664363] asm_exc_invalid_op+0x16/0x20 [ 126.664377] perf_group_detach+0x99e/0x12f0 [ 126.664388] __perf_remove_from_context+0x71e/0xb20 [ 126.664399] event_function+0x297/0x3d0 [ 126.664413] remote_function+0x125/0x1b0 [ 126.664427] __flush_smp_call_function_queue+0x1df/0x5a0 [ 126.664439] __sysvec_call_function_single+0x92/0x3a0 [ 126.664456] sysvec_call_function_single+0x89/0xc0 [ 126.664471] asm_sysvec_call_function_single+0x16/0x20 [ 126.664487] lock_acquire+0x1db/0x530 [ 126.664502] _raw_spin_lock+0x2a/0x40 [ 126.664514] __d_instantiate+0x77/0x450 [ 126.664530] d_instantiate+0x6d/0x90 [ 126.664545] alloc_file_pseudo+0x157/0x250 [ 126.664554] sock_alloc_file+0x4f/0x1a0 [ 126.664570] __sys_socket+0x1a8/0x250 [ 126.664585] __x64_sys_socket+0x6f/0xb0 [ 126.664601] do_syscall_64+0x3b/0x90 [ 126.664612] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.664628] [ 126.664628] other info that might help us debug this: [ 126.664628] [ 126.664630] Chain exists of: [ 126.664630] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 126.664630] [ 126.664644] Possible unsafe locking scenario: [ 126.664644] [ 126.664646] CPU0 CPU1 [ 126.664654] ---- ---- [ 126.664656] lock(&ctx->lock); [ 126.664661] lock(&rq->__lock); [ 126.664667] lock(&ctx->lock); [ 126.664673] lock((console_sem).lock); [ 126.664678] [ 126.664678] *** DEADLOCK *** [ 126.664678] [ 126.664680] 4 locks held by syz-executor.4/4055: [ 126.664687] #0: ffff88801e695d60 (&sb->s_type->i_lock_key#8){+.+.}-{2:2}, at: d_instantiate+0x62/0x90 [ 126.664718] #1: ffff88801e637538 (&dentry->d_lock){+.+.}-{2:2}, at: __d_instantiate+0x77/0x450 [ 126.664749] #2: ffff88806cf3d120 (&cpuctx_lock){-...}-{2:2}, at: event_function+0x16f/0x3d0 [ 126.664779] #3: ffff88803edccc20 (&ctx->lock){-...}-{2:2}, at: event_function+0x182/0x3d0 [ 126.664807] [ 126.664807] stack backtrace: [ 126.664810] CPU: 1 PID: 4055 Comm: syz-executor.4 Not tainted 6.0.0-rc5-next-20220913 #1 [ 126.664821] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 126.664829] Call Trace: [ 126.664832] [ 126.664837] dump_stack_lvl+0x8b/0xb3 [ 126.664850] check_noncircular+0x263/0x2e0 [ 126.664865] ? format_decode+0x26c/0xb50 [ 126.664879] ? print_circular_bug+0x450/0x450 [ 126.664894] ? enable_ptr_key_workfn+0x20/0x20 [ 126.664908] ? format_decode+0x26c/0xb50 [ 126.664922] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 126.664938] __lock_acquire+0x2a02/0x5e70 [ 126.664959] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 126.664981] lock_acquire+0x1a2/0x530 [ 126.664996] ? down_trylock+0xe/0x70 [ 126.665009] ? rcu_read_unlock+0x40/0x40 [ 126.665027] ? mark_lock.part.0+0xef/0x2f70 [ 126.665043] ? vprintk+0x84/0xa0 [ 126.665059] _raw_spin_lock_irqsave+0x39/0x60 [ 126.665073] ? down_trylock+0xe/0x70 [ 126.665085] down_trylock+0xe/0x70 [ 126.665096] ? vprintk+0x84/0xa0 [ 126.665112] __down_trylock_console_sem+0x3b/0xd0 [ 126.665127] vprintk_emit+0x16b/0x560 [ 126.665144] vprintk+0x84/0xa0 [ 126.665160] _printk+0xba/0xf1 [ 126.665175] ? record_print_text.cold+0x16/0x16 [ 126.665193] ? __lock_acquire+0x164d/0x5e70 [ 126.665210] ? report_bug.cold+0x66/0xab [ 126.665223] ? perf_group_detach+0x99e/0x12f0 [ 126.665234] report_bug.cold+0x72/0xab [ 126.665248] handle_bug+0x3c/0x70 [ 126.665260] exc_invalid_op+0x14/0x50 [ 126.665273] asm_exc_invalid_op+0x16/0x20 [ 126.665288] RIP: 0010:perf_group_detach+0x99e/0x12f0 [ 126.665301] Code: 85 d5 f8 ff ff e8 22 57 ee ff 65 44 8b 25 96 b5 aa 7e 31 ff 44 89 e6 e8 c0 53 ee ff 45 85 e4 0f 84 0a 05 00 00 e8 02 57 ee ff <0f> 0b e9 a9 f8 ff ff e8 f6 56 ee ff 65 8b 1d 6b b5 aa 7e 31 ff 89 [ 126.665312] RSP: 0018:ffff88806cf09e60 EFLAGS: 00010046 [ 126.665320] RAX: 0000000080010004 RBX: ffff888040dda878 RCX: 0000000000000000 [ 126.665328] RDX: ffff888018a25040 RSI: ffffffff8157c03e RDI: 0000000000000005 [ 126.665335] RBP: ffff888040dda878 R08: 0000000000000005 R09: 0000000000000001 [ 126.665342] R10: 0000000000000000 R11: ffffffff865aa05b R12: 0000000000000000 [ 126.665349] R13: ffff888040dda908 R14: ffff88803edccc00 R15: ffff888040dda878 [ 126.665360] ? perf_group_detach+0x99e/0x12f0 [ 126.665375] ? event_sched_out+0xd8/0xcd0 [ 126.665387] __perf_remove_from_context+0x71e/0xb20 [ 126.665402] event_function+0x297/0x3d0 [ 126.665418] ? perf_output_read+0xf80/0xf80 [ 126.665435] remote_function+0x125/0x1b0 [ 126.665451] __flush_smp_call_function_queue+0x1df/0x5a0 [ 126.665463] ? perf_duration_warn+0x40/0x40 [ 126.665479] __sysvec_call_function_single+0x92/0x3a0 [ 126.665496] sysvec_call_function_single+0x89/0xc0 [ 126.665512] [ 126.665515] [ 126.665518] asm_sysvec_call_function_single+0x16/0x20 [ 126.665536] RIP: 0010:lock_acquire+0x1db/0x530 [ 126.665552] Code: 02 b8 ff ff ff ff 65 0f c1 05 c1 36 d8 7e 83 f8 01 0f 85 c8 02 00 00 48 83 7c 24 08 00 74 01 fb 48 b8 00 00 00 00 00 fc ff df <48> 01 c3 48 c7 03 00 00 00 00 48 c7 43 08 00 00 00 00 48 8b 84 24 [ 126.665562] RSP: 0018:ffff888040f37c38 EFLAGS: 00000206 [ 126.665570] RAX: dffffc0000000000 RBX: 1ffff110081e6f89 RCX: 00000000000054ef [ 126.665577] RDX: 1ffff11003144b36 RSI: 0000000000000002 RDI: 0000000000000000 [ 126.665584] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffff86cc97cf [ 126.665591] R10: fffffbfff0d992f9 R11: 0000000000000001 R12: 0000000000000000 [ 126.665598] R13: 0000000000000000 R14: ffff88801e637538 R15: 0000000000000000 [ 126.665611] ? lock_acquire+0x1b2/0x530 [ 126.665628] ? rcu_read_unlock+0x40/0x40 [ 126.665644] ? lock_acquire+0x1b2/0x530 [ 126.665661] ? rcu_read_unlock+0x40/0x40 [ 126.665677] ? selinux_file_lock+0x280/0x280 [ 126.665693] ? lockdep_init_map_type+0x2c7/0x7a0 [ 126.665710] ? do_raw_spin_lock+0x121/0x260 [ 126.665729] _raw_spin_lock+0x2a/0x40 [ 126.665743] ? __d_instantiate+0x77/0x450 [ 126.665759] __d_instantiate+0x77/0x450 [ 126.665777] d_instantiate+0x6d/0x90 [ 126.665793] alloc_file_pseudo+0x157/0x250 [ 126.665804] ? alloc_file+0x800/0x800 [ 126.665824] ? alloc_fd+0x2f0/0x700 [ 126.665840] sock_alloc_file+0x4f/0x1a0 [ 126.665856] __sys_socket+0x1a8/0x250 [ 126.665873] ? __sys_socket_file+0x1f0/0x1f0 [ 126.665892] ? syscall_enter_from_user_mode+0x1d/0x50 [ 126.665911] __x64_sys_socket+0x6f/0xb0 [ 126.665927] ? syscall_enter_from_user_mode+0x1d/0x50 [ 126.665944] do_syscall_64+0x3b/0x90 [ 126.665957] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.665974] RIP: 0033:0x7f08ddf11b19 [ 126.665983] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 126.665993] RSP: 002b:00007f08db487188 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 126.666003] RAX: ffffffffffffffda RBX: 00007f08de024f60 RCX: 00007f08ddf11b19 [ 126.666010] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000002 [ 126.666017] RBP: 00007f08ddf6bf6d R08: 0000000000000000 R09: 0000000000000000 [ 126.666023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 126.666030] R13: 00007ffe3fc87b2f R14: 00007f08db487300 R15: 0000000000022000 [ 126.666043] [ 126.737575] WARNING: CPU: 1 PID: 4055 at kernel/events/core.c:2047 perf_group_detach+0x99e/0x12f0 [ 126.738240] Modules linked in: [ 126.738484] CPU: 1 PID: 4055 Comm: syz-executor.4 Not tainted 6.0.0-rc5-next-20220913 #1 [ 126.739080] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 126.739913] RIP: 0010:perf_group_detach+0x99e/0x12f0 [ 126.740291] Code: 85 d5 f8 ff ff e8 22 57 ee ff 65 44 8b 25 96 b5 aa 7e 31 ff 44 89 e6 e8 c0 53 ee ff 45 85 e4 0f 84 0a 05 00 00 e8 02 57 ee ff <0f> 0b e9 a9 f8 ff ff e8 f6 56 ee ff 65 8b 1d 6b b5 aa 7e 31 ff 89 [ 126.741633] RSP: 0018:ffff88806cf09e60 EFLAGS: 00010046 [ 126.742033] RAX: 0000000080010004 RBX: ffff888040dda878 RCX: 0000000000000000 [ 126.742563] RDX: ffff888018a25040 RSI: ffffffff8157c03e RDI: 0000000000000005 [ 126.743094] RBP: ffff888040dda878 R08: 0000000000000005 R09: 0000000000000001 [ 126.743623] R10: 0000000000000000 R11: ffffffff865aa05b R12: 0000000000000000 [ 126.744156] R13: ffff888040dda908 R14: ffff88803edccc00 R15: ffff888040dda878 [ 126.744699] FS: 00007f08db487700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 126.745294] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 126.745724] CR2: 00007ffdfc99ffb8 CR3: 000000001ceb4000 CR4: 0000000000350ee0 [ 126.746261] Call Trace: [ 126.746458] [ 126.746626] ? event_sched_out+0xd8/0xcd0 [ 126.746963] __perf_remove_from_context+0x71e/0xb20 [ 126.747342] event_function+0x297/0x3d0 [ 126.747649] ? perf_output_read+0xf80/0xf80 [ 126.747976] remote_function+0x125/0x1b0 [ 126.748291] __flush_smp_call_function_queue+0x1df/0x5a0 [ 126.748702] ? perf_duration_warn+0x40/0x40 [ 126.749032] __sysvec_call_function_single+0x92/0x3a0 [ 126.749423] sysvec_call_function_single+0x89/0xc0 [ 126.749793] [ 126.749969] [ 126.750146] asm_sysvec_call_function_single+0x16/0x20 [ 126.750540] RIP: 0010:lock_acquire+0x1db/0x530 [ 126.750897] Code: 02 b8 ff ff ff ff 65 0f c1 05 c1 36 d8 7e 83 f8 01 0f 85 c8 02 00 00 48 83 7c 24 08 00 74 01 fb 48 b8 00 00 00 00 00 fc ff df <48> 01 c3 48 c7 03 00 00 00 00 48 c7 43 08 00 00 00 00 48 8b 84 24 [ 126.752263] RSP: 0018:ffff888040f37c38 EFLAGS: 00000206 [ 126.752672] RAX: dffffc0000000000 RBX: 1ffff110081e6f89 RCX: 00000000000054ef [ 126.753206] RDX: 1ffff11003144b36 RSI: 0000000000000002 RDI: 0000000000000000 [ 126.753732] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffff86cc97cf [ 126.754281] R10: fffffbfff0d992f9 R11: 0000000000000001 R12: 0000000000000000 [ 126.754807] R13: 0000000000000000 R14: ffff88801e637538 R15: 0000000000000000 [ 126.755344] ? lock_acquire+0x1b2/0x530 [ 126.755658] ? rcu_read_unlock+0x40/0x40 [ 126.755975] ? lock_acquire+0x1b2/0x530 [ 126.756284] ? rcu_read_unlock+0x40/0x40 [ 126.756598] ? selinux_file_lock+0x280/0x280 [ 126.756943] ? lockdep_init_map_type+0x2c7/0x7a0 [ 126.757309] ? do_raw_spin_lock+0x121/0x260 [ 126.757652] _raw_spin_lock+0x2a/0x40 [ 126.757950] ? __d_instantiate+0x77/0x450 [ 126.758267] __d_instantiate+0x77/0x450 [ 126.758569] d_instantiate+0x6d/0x90 [ 126.758853] alloc_file_pseudo+0x157/0x250 [ 126.759177] ? alloc_file+0x800/0x800 [ 126.759476] ? alloc_fd+0x2f0/0x700 [ 126.759766] sock_alloc_file+0x4f/0x1a0 [ 126.760080] __sys_socket+0x1a8/0x250 [ 126.760378] ? __sys_socket_file+0x1f0/0x1f0 [ 126.760728] ? syscall_enter_from_user_mode+0x1d/0x50 [ 126.761126] __x64_sys_socket+0x6f/0xb0 [ 126.761431] ? syscall_enter_from_user_mode+0x1d/0x50 [ 126.761822] do_syscall_64+0x3b/0x90 [ 126.762104] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.762500] RIP: 0033:0x7f08ddf11b19 [ 126.762780] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 126.764126] RSP: 002b:00007f08db487188 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 126.764696] RAX: ffffffffffffffda RBX: 00007f08de024f60 RCX: 00007f08ddf11b19 [ 126.765232] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000002 [ 126.765771] RBP: 00007f08ddf6bf6d R08: 0000000000000000 R09: 0000000000000000 [ 126.766313] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 126.766840] R13: 00007ffe3fc87b2f R14: 00007f08db487300 R15: 0000000000022000 [ 126.767382] [ 126.767563] irq event stamp: 592 [ 126.767820] hardirqs last enabled at (591): [] mod_objcg_state+0x3ab/0x9e0 [ 126.768465] hardirqs last disabled at (592): [] sysvec_call_function_single+0xb/0xc0 [ 126.769177] softirqs last enabled at (374): [] sk_setsockopt+0x368/0x3650 [ 126.769806] softirqs last disabled at (372): [] release_sock+0x1b/0x1b0 [ 126.770434] ---[ end trace 0000000000000000 ]--- 14:33:12 executing program 0: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in6=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@empty, 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'xcbc(aes)\x00'}}}]}, 0x138}}, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in6=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@empty}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) 14:33:12 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf29, 0x30000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xef8, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:33:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000b8c5c4d1b3cf4b38ab2e2967fb770ff3010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000d4f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2080}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x20000}], 0x0, &(0x7f0000012f00)) 14:33:12 executing program 3: mount(&(0x7f0000000280)=ANY=[], &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='vfat\x00', 0x0, 0x0) 14:33:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x48, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) 14:33:12 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$getflags(r0, 0x401) 14:33:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$getflags(r0, 0x401) 14:33:12 executing program 6: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in6=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@empty, 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'xcbc(aes)\x00'}}}]}, 0x138}}, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in6=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@empty}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) [ 126.862279] loop1: detected capacity change from 0 to 2048 14:33:13 executing program 3: mount(&(0x7f0000000280)=ANY=[], &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='vfat\x00', 0x0, 0x0) 14:33:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$getflags(r0, 0x401) [ 126.892718] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 126.896117] ext4 filesystem being mounted at /syzkaller-testdir862438872/syzkaller.c4akAY/5/file0 supports timestamps until 2038 (0x7fffffff) 14:33:13 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf29, 0x30000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xef8, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:33:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x48, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) 14:33:13 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$getflags(r0, 0x401) [ 126.940215] EXT4-fs (loop1): unmounting filesystem. 14:33:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000b8c5c4d1b3cf4b38ab2e2967fb770ff3010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000d4f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2080}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x20000}], 0x0, &(0x7f0000012f00)) 14:33:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x48, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) 14:33:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$getflags(r0, 0x401) [ 127.018602] loop1: detected capacity change from 0 to 2048 [ 127.046343] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 127.047372] ext4 filesystem being mounted at /syzkaller-testdir862438872/syzkaller.c4akAY/6/file0 supports timestamps until 2038 (0x7fffffff) [ 127.078138] EXT4-fs (loop1): unmounting filesystem. 14:33:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000b8c5c4d1b3cf4b38ab2e2967fb770ff3010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000d4f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2080}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x20000}], 0x0, &(0x7f0000012f00)) 14:33:13 executing program 6: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in6=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@empty, 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'xcbc(aes)\x00'}}}]}, 0x138}}, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in6=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@empty}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) 14:33:13 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) 14:33:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000140)='./file0\x00', r1, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r0, 0x6628) 14:33:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2}, 0x10}}, 0x0) 14:33:13 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) io_submit(r0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000001c0)="0a64c8716b203053fc54e7491aa00a3e1d051b888b5740f00737cb0e42db455a392813b7130b6a0d792d5e5a2c03799b80b2bc4b836790e05e6739915a09db97762936f4c49f9de4c82ca1c691628be42492f9f1b1bf63906e02cd551feed4b8f616a7b7b1b8c06fa9c396c580e88a6757fbd1858fdfb08cdfd49a62fe1f2395dc2525518f2343817d3314653cf98daeff4526ba174e32e99369e99c81cc191cd0c6cd9c6a318b608676f0cff38fccf3696c5faff7fda22edc5007fa69fc2bc5ae9fab42d7869d03ec3240cf2592f8e0a550ff8efb91190470", 0xd9, 0x2901, 0x0, 0x1, r3}]) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000004c0)=ANY=[@ANYBLOB="000000b655b4822e00000000000000000011ed11b755fc2ae53ac89a03d67d66e7936459f558c703b9605192bcbbedb893d05660135158933298fff359b5e49367b0b29b2889b32df55742d6687292e71e9d9088a07fbae8cf55a0276dddeb292501c5b3c9876850cad1cb0d7231a9cfbdee84c622d4f0fe12318c0faeaa264141af4979e3a1dd387da85b6ea7ca8e84c323014d320a0518da8f2a9c4800ca5430046449d86449f0b2988485b8eeec6e03af09a238344cb7ed10144d1377f5108a1e75f8782f76b7aba1c4413d2ac86483fc2861181b7b531f34008cea0d332197d5f8efbd8bb18cba80f8ffe50479421a7564c6f5465f1e6719e774bc642c73c1c8719ac87c4ff1d3bcb06c798499cab0e309328a072521ed68b8a590fbf4b1fa609c65500c8f0f78b986eba86a8fbb0763da7fccffb819726aad5f0316f076dc02cfc5d8ee82b76ce361e5181d", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x101100, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x2) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xd, "ddab93e1adcbd470"}) ioctl$KDENABIO(r4, 0x4b36) ioctl$VT_DISALLOCATE(r4, 0x5608) 14:33:13 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$getflags(r0, 0x401) 14:33:13 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 127.134003] loop1: detected capacity change from 0 to 2048 14:33:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2}, 0x10}}, 0x0) [ 127.154104] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 127.154988] ext4 filesystem being mounted at /syzkaller-testdir862438872/syzkaller.c4akAY/7/file0 supports timestamps until 2038 (0x7fffffff) 14:33:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000140)='./file0\x00', r1, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r0, 0x6628) 14:33:13 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) 14:33:13 executing program 7: mknod(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) link(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='./file0\x00') unlink(&(0x7f00000001c0)='./file1\x00') 14:33:13 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) io_submit(r0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000001c0)="0a64c8716b203053fc54e7491aa00a3e1d051b888b5740f00737cb0e42db455a392813b7130b6a0d792d5e5a2c03799b80b2bc4b836790e05e6739915a09db97762936f4c49f9de4c82ca1c691628be42492f9f1b1bf63906e02cd551feed4b8f616a7b7b1b8c06fa9c396c580e88a6757fbd1858fdfb08cdfd49a62fe1f2395dc2525518f2343817d3314653cf98daeff4526ba174e32e99369e99c81cc191cd0c6cd9c6a318b608676f0cff38fccf3696c5faff7fda22edc5007fa69fc2bc5ae9fab42d7869d03ec3240cf2592f8e0a550ff8efb91190470", 0xd9, 0x2901, 0x0, 0x1, r3}]) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x101100, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x2) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xd, "ddab93e1adcbd470"}) ioctl$KDENABIO(r4, 0x4b36) ioctl$VT_DISALLOCATE(r4, 0x5608) [ 127.208648] EXT4-fs (loop1): unmounting filesystem. [ 128.002963] hrtimer: interrupt took 19477 ns 14:33:14 executing program 7: mknod(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) link(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='./file0\x00') unlink(&(0x7f00000001c0)='./file1\x00') 14:33:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000140)='./file0\x00', r1, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r0, 0x6628) 14:33:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2}, 0x10}}, 0x0) 14:33:14 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) io_submit(r0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000001c0)="0a64c8716b203053fc54e7491aa00a3e1d051b888b5740f00737cb0e42db455a392813b7130b6a0d792d5e5a2c03799b80b2bc4b836790e05e6739915a09db97762936f4c49f9de4c82ca1c691628be42492f9f1b1bf63906e02cd551feed4b8f616a7b7b1b8c06fa9c396c580e88a6757fbd1858fdfb08cdfd49a62fe1f2395dc2525518f2343817d3314653cf98daeff4526ba174e32e99369e99c81cc191cd0c6cd9c6a318b608676f0cff38fccf3696c5faff7fda22edc5007fa69fc2bc5ae9fab42d7869d03ec3240cf2592f8e0a550ff8efb91190470", 0xd9, 0x2901, 0x0, 0x1, r3}]) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x101100, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x2) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xd, "ddab93e1adcbd470"}) ioctl$KDENABIO(r4, 0x4b36) ioctl$VT_DISALLOCATE(r4, 0x5608) 14:33:14 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) 14:33:14 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:33:14 executing program 6: mknod(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) link(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='./file0\x00') unlink(&(0x7f00000001c0)='./file1\x00') 14:33:14 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) 14:33:14 executing program 7: mknod(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) link(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='./file0\x00') unlink(&(0x7f00000001c0)='./file1\x00') 14:33:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000140)='./file0\x00', r1, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r0, 0x6628) 14:33:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2}, 0x10}}, 0x0) 14:33:14 executing program 6: mknod(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) link(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='./file0\x00') unlink(&(0x7f00000001c0)='./file1\x00') 14:33:14 executing program 7: mknod(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) link(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='./file0\x00') unlink(&(0x7f00000001c0)='./file1\x00') 14:33:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) io_submit(r0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000001c0)="0a64c8716b203053fc54e7491aa00a3e1d051b888b5740f00737cb0e42db455a392813b7130b6a0d792d5e5a2c03799b80b2bc4b836790e05e6739915a09db97762936f4c49f9de4c82ca1c691628be42492f9f1b1bf63906e02cd551feed4b8f616a7b7b1b8c06fa9c396c580e88a6757fbd1858fdfb08cdfd49a62fe1f2395dc2525518f2343817d3314653cf98daeff4526ba174e32e99369e99c81cc191cd0c6cd9c6a318b608676f0cff38fccf3696c5faff7fda22edc5007fa69fc2bc5ae9fab42d7869d03ec3240cf2592f8e0a550ff8efb91190470", 0xd9, 0x2901, 0x0, 0x1, r3}]) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x101100, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x2) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xd, "ddab93e1adcbd470"}) ioctl$KDENABIO(r4, 0x4b36) ioctl$VT_DISALLOCATE(r4, 0x5608) 14:33:15 executing program 6: mknod(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) link(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='./file0\x00') unlink(&(0x7f00000001c0)='./file1\x00') 14:33:15 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:33:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:33:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) io_submit(r0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000001c0)="0a64c8716b203053fc54e7491aa00a3e1d051b888b5740f00737cb0e42db455a392813b7130b6a0d792d5e5a2c03799b80b2bc4b836790e05e6739915a09db97762936f4c49f9de4c82ca1c691628be42492f9f1b1bf63906e02cd551feed4b8f616a7b7b1b8c06fa9c396c580e88a6757fbd1858fdfb08cdfd49a62fe1f2395dc2525518f2343817d3314653cf98daeff4526ba174e32e99369e99c81cc191cd0c6cd9c6a318b608676f0cff38fccf3696c5faff7fda22edc5007fa69fc2bc5ae9fab42d7869d03ec3240cf2592f8e0a550ff8efb91190470", 0xd9, 0x2901, 0x0, 0x1, r3}]) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x101100, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x2) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xd, "ddab93e1adcbd470"}) ioctl$KDENABIO(r4, 0x4b36) ioctl$VT_DISALLOCATE(r4, 0x5608) 14:33:15 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) io_submit(r0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000001c0)="0a64c8716b203053fc54e7491aa00a3e1d051b888b5740f00737cb0e42db455a392813b7130b6a0d792d5e5a2c03799b80b2bc4b836790e05e6739915a09db97762936f4c49f9de4c82ca1c691628be42492f9f1b1bf63906e02cd551feed4b8f616a7b7b1b8c06fa9c396c580e88a6757fbd1858fdfb08cdfd49a62fe1f2395dc2525518f2343817d3314653cf98daeff4526ba174e32e99369e99c81cc191cd0c6cd9c6a318b608676f0cff38fccf3696c5faff7fda22edc5007fa69fc2bc5ae9fab42d7869d03ec3240cf2592f8e0a550ff8efb91190470", 0xd9, 0x2901, 0x0, 0x1, r3}]) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x101100, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x2) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xd, "ddab93e1adcbd470"}) ioctl$KDENABIO(r4, 0x4b36) ioctl$VT_DISALLOCATE(r4, 0x5608) 14:33:15 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:33:15 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:33:15 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) io_submit(r0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000001c0)="0a64c8716b203053fc54e7491aa00a3e1d051b888b5740f00737cb0e42db455a392813b7130b6a0d792d5e5a2c03799b80b2bc4b836790e05e6739915a09db97762936f4c49f9de4c82ca1c691628be42492f9f1b1bf63906e02cd551feed4b8f616a7b7b1b8c06fa9c396c580e88a6757fbd1858fdfb08cdfd49a62fe1f2395dc2525518f2343817d3314653cf98daeff4526ba174e32e99369e99c81cc191cd0c6cd9c6a318b608676f0cff38fccf3696c5faff7fda22edc5007fa69fc2bc5ae9fab42d7869d03ec3240cf2592f8e0a550ff8efb91190470", 0xd9, 0x2901, 0x0, 0x1, r3}]) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x101100, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x2) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xd, "ddab93e1adcbd470"}) ioctl$KDENABIO(r4, 0x4b36) ioctl$VT_DISALLOCATE(r4, 0x5608) 14:33:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) io_submit(r0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000001c0)="0a64c8716b203053fc54e7491aa00a3e1d051b888b5740f00737cb0e42db455a392813b7130b6a0d792d5e5a2c03799b80b2bc4b836790e05e6739915a09db97762936f4c49f9de4c82ca1c691628be42492f9f1b1bf63906e02cd551feed4b8f616a7b7b1b8c06fa9c396c580e88a6757fbd1858fdfb08cdfd49a62fe1f2395dc2525518f2343817d3314653cf98daeff4526ba174e32e99369e99c81cc191cd0c6cd9c6a318b608676f0cff38fccf3696c5faff7fda22edc5007fa69fc2bc5ae9fab42d7869d03ec3240cf2592f8e0a550ff8efb91190470", 0xd9, 0x2901, 0x0, 0x1, r3}]) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x101100, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x2) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xd, "ddab93e1adcbd470"}) ioctl$KDENABIO(r4, 0x4b36) ioctl$VT_DISALLOCATE(r4, 0x5608) 14:33:15 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) io_submit(r0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000001c0)="0a64c8716b203053fc54e7491aa00a3e1d051b888b5740f00737cb0e42db455a392813b7130b6a0d792d5e5a2c03799b80b2bc4b836790e05e6739915a09db97762936f4c49f9de4c82ca1c691628be42492f9f1b1bf63906e02cd551feed4b8f616a7b7b1b8c06fa9c396c580e88a6757fbd1858fdfb08cdfd49a62fe1f2395dc2525518f2343817d3314653cf98daeff4526ba174e32e99369e99c81cc191cd0c6cd9c6a318b608676f0cff38fccf3696c5faff7fda22edc5007fa69fc2bc5ae9fab42d7869d03ec3240cf2592f8e0a550ff8efb91190470", 0xd9, 0x2901, 0x0, 0x1, r3}]) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x101100, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x2) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xd, "ddab93e1adcbd470"}) ioctl$KDENABIO(r4, 0x4b36) ioctl$VT_DISALLOCATE(r4, 0x5608) 14:33:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) io_submit(r0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000001c0)="0a64c8716b203053fc54e7491aa00a3e1d051b888b5740f00737cb0e42db455a392813b7130b6a0d792d5e5a2c03799b80b2bc4b836790e05e6739915a09db97762936f4c49f9de4c82ca1c691628be42492f9f1b1bf63906e02cd551feed4b8f616a7b7b1b8c06fa9c396c580e88a6757fbd1858fdfb08cdfd49a62fe1f2395dc2525518f2343817d3314653cf98daeff4526ba174e32e99369e99c81cc191cd0c6cd9c6a318b608676f0cff38fccf3696c5faff7fda22edc5007fa69fc2bc5ae9fab42d7869d03ec3240cf2592f8e0a550ff8efb91190470", 0xd9, 0x2901, 0x0, 0x1, r3}]) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000004c0)=ANY=[@ANYBLOB="000000b655b4822e00000000000000000011ed11b755fc2ae53ac89a03d67d66e7936459f558c703b9605192bcbbedb893d05660135158933298fff359b5e49367b0b29b2889b32df55742d6687292e71e9d9088a07fbae8cf55a0276dddeb292501c5b3c9876850cad1cb0d7231a9cfbdee84c622d4f0fe12318c0faeaa264141af4979e3a1dd387da85b6ea7ca8e84c323014d320a0518da8f2a9c4800ca5430046449d86449f0b2988485b8eeec6e03af09a238344cb7ed10144d1377f5108a1e75f8782f76b7aba1c4413d2ac86483fc2861181b7b531f34008cea0d332197d5f8efbd8bb18cba80f8ffe50479421a7564c6f5465f1e6719e774bc642c73c1c8719ac87c4ff1d3bcb06c798499cab0e309328a072521ed68b8a590fbf4b1fa609c65500c8f0f78b986eba86a8fbb0763da7fccffb819726aad5f0316f076dc02cfc5d8ee82b76ce361e5181d", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x101100, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x2) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xd, "ddab93e1adcbd470"}) ioctl$KDENABIO(r4, 0x4b36) ioctl$VT_DISALLOCATE(r4, 0x5608) 14:33:15 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) io_submit(r0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000001c0)="0a64c8716b203053fc54e7491aa00a3e1d051b888b5740f00737cb0e42db455a392813b7130b6a0d792d5e5a2c03799b80b2bc4b836790e05e6739915a09db97762936f4c49f9de4c82ca1c691628be42492f9f1b1bf63906e02cd551feed4b8f616a7b7b1b8c06fa9c396c580e88a6757fbd1858fdfb08cdfd49a62fe1f2395dc2525518f2343817d3314653cf98daeff4526ba174e32e99369e99c81cc191cd0c6cd9c6a318b608676f0cff38fccf3696c5faff7fda22edc5007fa69fc2bc5ae9fab42d7869d03ec3240cf2592f8e0a550ff8efb91190470", 0xd9, 0x2901, 0x0, 0x1, r3}]) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x101100, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x2) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xd, "ddab93e1adcbd470"}) ioctl$KDENABIO(r4, 0x4b36) ioctl$VT_DISALLOCATE(r4, 0x5608) 14:33:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) io_submit(r0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000001c0)="0a64c8716b203053fc54e7491aa00a3e1d051b888b5740f00737cb0e42db455a392813b7130b6a0d792d5e5a2c03799b80b2bc4b836790e05e6739915a09db97762936f4c49f9de4c82ca1c691628be42492f9f1b1bf63906e02cd551feed4b8f616a7b7b1b8c06fa9c396c580e88a6757fbd1858fdfb08cdfd49a62fe1f2395dc2525518f2343817d3314653cf98daeff4526ba174e32e99369e99c81cc191cd0c6cd9c6a318b608676f0cff38fccf3696c5faff7fda22edc5007fa69fc2bc5ae9fab42d7869d03ec3240cf2592f8e0a550ff8efb91190470", 0xd9, 0x2901, 0x0, 0x1, r3}]) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000004c0)=ANY=[@ANYBLOB="000000b655b4822e00000000000000000011ed11b755fc2ae53ac89a03d67d66e7936459f558c703b9605192bcbbedb893d05660135158933298fff359b5e49367b0b29b2889b32df55742d6687292e71e9d9088a07fbae8cf55a0276dddeb292501c5b3c9876850cad1cb0d7231a9cfbdee84c622d4f0fe12318c0faeaa264141af4979e3a1dd387da85b6ea7ca8e84c323014d320a0518da8f2a9c4800ca5430046449d86449f0b2988485b8eeec6e03af09a238344cb7ed10144d1377f5108a1e75f8782f76b7aba1c4413d2ac86483fc2861181b7b531f34008cea0d332197d5f8efbd8bb18cba80f8ffe50479421a7564c6f5465f1e6719e774bc642c73c1c8719ac87c4ff1d3bcb06c798499cab0e309328a072521ed68b8a590fbf4b1fa609c65500c8f0f78b986eba86a8fbb0763da7fccffb819726aad5f0316f076dc02cfc5d8ee82b76ce361e5181d", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x101100, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x2) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xd, "ddab93e1adcbd470"}) ioctl$KDENABIO(r4, 0x4b36) ioctl$VT_DISALLOCATE(r4, 0x5608) 14:33:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) io_submit(r0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000001c0)="0a64c8716b203053fc54e7491aa00a3e1d051b888b5740f00737cb0e42db455a392813b7130b6a0d792d5e5a2c03799b80b2bc4b836790e05e6739915a09db97762936f4c49f9de4c82ca1c691628be42492f9f1b1bf63906e02cd551feed4b8f616a7b7b1b8c06fa9c396c580e88a6757fbd1858fdfb08cdfd49a62fe1f2395dc2525518f2343817d3314653cf98daeff4526ba174e32e99369e99c81cc191cd0c6cd9c6a318b608676f0cff38fccf3696c5faff7fda22edc5007fa69fc2bc5ae9fab42d7869d03ec3240cf2592f8e0a550ff8efb91190470", 0xd9, 0x2901, 0x0, 0x1, r3}]) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x101100, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x2) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xd, "ddab93e1adcbd470"}) ioctl$KDENABIO(r4, 0x4b36) ioctl$VT_DISALLOCATE(r4, 0x5608) 14:33:15 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) io_submit(r0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000001c0)="0a64c8716b203053fc54e7491aa00a3e1d051b888b5740f00737cb0e42db455a392813b7130b6a0d792d5e5a2c03799b80b2bc4b836790e05e6739915a09db97762936f4c49f9de4c82ca1c691628be42492f9f1b1bf63906e02cd551feed4b8f616a7b7b1b8c06fa9c396c580e88a6757fbd1858fdfb08cdfd49a62fe1f2395dc2525518f2343817d3314653cf98daeff4526ba174e32e99369e99c81cc191cd0c6cd9c6a318b608676f0cff38fccf3696c5faff7fda22edc5007fa69fc2bc5ae9fab42d7869d03ec3240cf2592f8e0a550ff8efb91190470", 0xd9, 0x2901, 0x0, 0x1, r3}]) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x101100, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x2) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xd, "ddab93e1adcbd470"}) ioctl$KDENABIO(r4, 0x4b36) ioctl$VT_DISALLOCATE(r4, 0x5608) 14:33:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) io_submit(r0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000001c0)="0a64c8716b203053fc54e7491aa00a3e1d051b888b5740f00737cb0e42db455a392813b7130b6a0d792d5e5a2c03799b80b2bc4b836790e05e6739915a09db97762936f4c49f9de4c82ca1c691628be42492f9f1b1bf63906e02cd551feed4b8f616a7b7b1b8c06fa9c396c580e88a6757fbd1858fdfb08cdfd49a62fe1f2395dc2525518f2343817d3314653cf98daeff4526ba174e32e99369e99c81cc191cd0c6cd9c6a318b608676f0cff38fccf3696c5faff7fda22edc5007fa69fc2bc5ae9fab42d7869d03ec3240cf2592f8e0a550ff8efb91190470", 0xd9, 0x2901, 0x0, 0x1, r3}]) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000004c0)=ANY=[@ANYBLOB="000000b655b4822e00000000000000000011ed11b755fc2ae53ac89a03d67d66e7936459f558c703b9605192bcbbedb893d05660135158933298fff359b5e49367b0b29b2889b32df55742d6687292e71e9d9088a07fbae8cf55a0276dddeb292501c5b3c9876850cad1cb0d7231a9cfbdee84c622d4f0fe12318c0faeaa264141af4979e3a1dd387da85b6ea7ca8e84c323014d320a0518da8f2a9c4800ca5430046449d86449f0b2988485b8eeec6e03af09a238344cb7ed10144d1377f5108a1e75f8782f76b7aba1c4413d2ac86483fc2861181b7b531f34008cea0d332197d5f8efbd8bb18cba80f8ffe50479421a7564c6f5465f1e6719e774bc642c73c1c8719ac87c4ff1d3bcb06c798499cab0e309328a072521ed68b8a590fbf4b1fa609c65500c8f0f78b986eba86a8fbb0763da7fccffb819726aad5f0316f076dc02cfc5d8ee82b76ce361e5181d", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x101100, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x2) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xd, "ddab93e1adcbd470"}) ioctl$KDENABIO(r4, 0x4b36) ioctl$VT_DISALLOCATE(r4, 0x5608) 14:33:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) io_submit(r0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000001c0)="0a64c8716b203053fc54e7491aa00a3e1d051b888b5740f00737cb0e42db455a392813b7130b6a0d792d5e5a2c03799b80b2bc4b836790e05e6739915a09db97762936f4c49f9de4c82ca1c691628be42492f9f1b1bf63906e02cd551feed4b8f616a7b7b1b8c06fa9c396c580e88a6757fbd1858fdfb08cdfd49a62fe1f2395dc2525518f2343817d3314653cf98daeff4526ba174e32e99369e99c81cc191cd0c6cd9c6a318b608676f0cff38fccf3696c5faff7fda22edc5007fa69fc2bc5ae9fab42d7869d03ec3240cf2592f8e0a550ff8efb91190470", 0xd9, 0x2901, 0x0, 0x1, r3}]) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x101100, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x2) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xd, "ddab93e1adcbd470"}) ioctl$KDENABIO(r4, 0x4b36) ioctl$VT_DISALLOCATE(r4, 0x5608) 14:33:15 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:33:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) io_submit(r0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000001c0)="0a64c8716b203053fc54e7491aa00a3e1d051b888b5740f00737cb0e42db455a392813b7130b6a0d792d5e5a2c03799b80b2bc4b836790e05e6739915a09db97762936f4c49f9de4c82ca1c691628be42492f9f1b1bf63906e02cd551feed4b8f616a7b7b1b8c06fa9c396c580e88a6757fbd1858fdfb08cdfd49a62fe1f2395dc2525518f2343817d3314653cf98daeff4526ba174e32e99369e99c81cc191cd0c6cd9c6a318b608676f0cff38fccf3696c5faff7fda22edc5007fa69fc2bc5ae9fab42d7869d03ec3240cf2592f8e0a550ff8efb91190470", 0xd9, 0x2901, 0x0, 0x1, r3}]) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x101100, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x2) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xd, "ddab93e1adcbd470"}) ioctl$KDENABIO(r4, 0x4b36) ioctl$VT_DISALLOCATE(r4, 0x5608) 14:33:15 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) io_submit(r0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000001c0)="0a64c8716b203053fc54e7491aa00a3e1d051b888b5740f00737cb0e42db455a392813b7130b6a0d792d5e5a2c03799b80b2bc4b836790e05e6739915a09db97762936f4c49f9de4c82ca1c691628be42492f9f1b1bf63906e02cd551feed4b8f616a7b7b1b8c06fa9c396c580e88a6757fbd1858fdfb08cdfd49a62fe1f2395dc2525518f2343817d3314653cf98daeff4526ba174e32e99369e99c81cc191cd0c6cd9c6a318b608676f0cff38fccf3696c5faff7fda22edc5007fa69fc2bc5ae9fab42d7869d03ec3240cf2592f8e0a550ff8efb91190470", 0xd9, 0x2901, 0x0, 0x1, r3}]) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x101100, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x2) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xd, "ddab93e1adcbd470"}) ioctl$KDENABIO(r4, 0x4b36) ioctl$VT_DISALLOCATE(r4, 0x5608) 14:33:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:33:17 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:33:17 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) io_submit(r0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000001c0)="0a64c8716b203053fc54e7491aa00a3e1d051b888b5740f00737cb0e42db455a392813b7130b6a0d792d5e5a2c03799b80b2bc4b836790e05e6739915a09db97762936f4c49f9de4c82ca1c691628be42492f9f1b1bf63906e02cd551feed4b8f616a7b7b1b8c06fa9c396c580e88a6757fbd1858fdfb08cdfd49a62fe1f2395dc2525518f2343817d3314653cf98daeff4526ba174e32e99369e99c81cc191cd0c6cd9c6a318b608676f0cff38fccf3696c5faff7fda22edc5007fa69fc2bc5ae9fab42d7869d03ec3240cf2592f8e0a550ff8efb91190470", 0xd9, 0x2901, 0x0, 0x1, r3}]) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x101100, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x2) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xd, "ddab93e1adcbd470"}) ioctl$KDENABIO(r4, 0x4b36) ioctl$VT_DISALLOCATE(r4, 0x5608) 14:33:17 executing program 6: r0 = request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='{\x19-[\x00', 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffc, 0x0) r1 = request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='-]$\x00', r0) r2 = request_key(&(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='\xcc(@(\x00', r0) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r0, 0x0) r3 = add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="b6d6ed7372d7da3a031494563bdb5c064a47bf2b16a283c86be201ecd0da094d33581933594bf30edce5e9993dfb95207ce04d1ed4888a6356f37ab7f122938cd873072a698f61912acd479f45b70d149ba94a5e1230c4a2cc159e8eb87dde06397989fa63e6c43b625ee486d7ec25d62874b318a01d86b1e1732064d28d", 0x7e, r1) keyctl$set_timeout(0xf, r3, 0x0) keyctl$invalidate(0x15, r1) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, r0) r5 = getuid() keyctl$chown(0x4, r4, r5, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r2) r7 = add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r6, r7, r4, 0x1) r8 = add_key$keyring(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r6) keyctl$search(0xa, r8, &(0x7f0000000540)='.dead\x00', &(0x7f0000000580)={'syz', 0x0}, r6) keyctl$invalidate(0x15, r3) 14:33:17 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) setrlimit(0x0, &(0x7f0000002000)) 14:33:17 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) 14:33:17 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:33:17 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:33:17 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:33:17 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) 14:33:17 executing program 6: r0 = request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='{\x19-[\x00', 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffc, 0x0) r1 = request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='-]$\x00', r0) r2 = request_key(&(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='\xcc(@(\x00', r0) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r0, 0x0) r3 = add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="b6d6ed7372d7da3a031494563bdb5c064a47bf2b16a283c86be201ecd0da094d33581933594bf30edce5e9993dfb95207ce04d1ed4888a6356f37ab7f122938cd873072a698f61912acd479f45b70d149ba94a5e1230c4a2cc159e8eb87dde06397989fa63e6c43b625ee486d7ec25d62874b318a01d86b1e1732064d28d", 0x7e, r1) keyctl$set_timeout(0xf, r3, 0x0) keyctl$invalidate(0x15, r1) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, r0) r5 = getuid() keyctl$chown(0x4, r4, r5, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r2) r7 = add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r6, r7, r4, 0x1) r8 = add_key$keyring(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r6) keyctl$search(0xa, r8, &(0x7f0000000540)='.dead\x00', &(0x7f0000000580)={'syz', 0x0}, r6) keyctl$invalidate(0x15, r3) 14:33:17 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) setrlimit(0x0, &(0x7f0000002000)) 14:33:17 executing program 6: r0 = request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='{\x19-[\x00', 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffc, 0x0) r1 = request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='-]$\x00', r0) r2 = request_key(&(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='\xcc(@(\x00', r0) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r0, 0x0) r3 = add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="b6d6ed7372d7da3a031494563bdb5c064a47bf2b16a283c86be201ecd0da094d33581933594bf30edce5e9993dfb95207ce04d1ed4888a6356f37ab7f122938cd873072a698f61912acd479f45b70d149ba94a5e1230c4a2cc159e8eb87dde06397989fa63e6c43b625ee486d7ec25d62874b318a01d86b1e1732064d28d", 0x7e, r1) keyctl$set_timeout(0xf, r3, 0x0) keyctl$invalidate(0x15, r1) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, r0) r5 = getuid() keyctl$chown(0x4, r4, r5, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r2) r7 = add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r6, r7, r4, 0x1) r8 = add_key$keyring(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r6) keyctl$search(0xa, r8, &(0x7f0000000540)='.dead\x00', &(0x7f0000000580)={'syz', 0x0}, r6) keyctl$invalidate(0x15, r3) 14:33:17 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) 14:33:17 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) setrlimit(0x0, &(0x7f0000002000)) 14:33:17 executing program 3: r0 = request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='{\x19-[\x00', 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffc, 0x0) r1 = request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='-]$\x00', r0) r2 = request_key(&(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='\xcc(@(\x00', r0) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r0, 0x0) r3 = add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="b6d6ed7372d7da3a031494563bdb5c064a47bf2b16a283c86be201ecd0da094d33581933594bf30edce5e9993dfb95207ce04d1ed4888a6356f37ab7f122938cd873072a698f61912acd479f45b70d149ba94a5e1230c4a2cc159e8eb87dde06397989fa63e6c43b625ee486d7ec25d62874b318a01d86b1e1732064d28d", 0x7e, r1) keyctl$set_timeout(0xf, r3, 0x0) keyctl$invalidate(0x15, r1) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, r0) r5 = getuid() keyctl$chown(0x4, r4, r5, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r2) r7 = add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r6, r7, r4, 0x1) r8 = add_key$keyring(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r6) keyctl$search(0xa, r8, &(0x7f0000000540)='.dead\x00', &(0x7f0000000580)={'syz', 0x0}, r6) keyctl$invalidate(0x15, r3) 14:33:17 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) setrlimit(0x0, &(0x7f0000002000)) 14:33:18 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:33:18 executing program 2: r0 = request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='{\x19-[\x00', 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffc, 0x0) r1 = request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='-]$\x00', r0) r2 = request_key(&(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='\xcc(@(\x00', r0) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r0, 0x0) r3 = add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="b6d6ed7372d7da3a031494563bdb5c064a47bf2b16a283c86be201ecd0da094d33581933594bf30edce5e9993dfb95207ce04d1ed4888a6356f37ab7f122938cd873072a698f61912acd479f45b70d149ba94a5e1230c4a2cc159e8eb87dde06397989fa63e6c43b625ee486d7ec25d62874b318a01d86b1e1732064d28d", 0x7e, r1) keyctl$set_timeout(0xf, r3, 0x0) keyctl$invalidate(0x15, r1) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, r0) r5 = getuid() keyctl$chown(0x4, r4, r5, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r2) r7 = add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r6, r7, r4, 0x1) r8 = add_key$keyring(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r6) keyctl$search(0xa, r8, &(0x7f0000000540)='.dead\x00', &(0x7f0000000580)={'syz', 0x0}, r6) keyctl$invalidate(0x15, r3) 14:33:18 executing program 6: r0 = request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='{\x19-[\x00', 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffc, 0x0) r1 = request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='-]$\x00', r0) r2 = request_key(&(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='\xcc(@(\x00', r0) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r0, 0x0) r3 = add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="b6d6ed7372d7da3a031494563bdb5c064a47bf2b16a283c86be201ecd0da094d33581933594bf30edce5e9993dfb95207ce04d1ed4888a6356f37ab7f122938cd873072a698f61912acd479f45b70d149ba94a5e1230c4a2cc159e8eb87dde06397989fa63e6c43b625ee486d7ec25d62874b318a01d86b1e1732064d28d", 0x7e, r1) keyctl$set_timeout(0xf, r3, 0x0) keyctl$invalidate(0x15, r1) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, r0) r5 = getuid() keyctl$chown(0x4, r4, r5, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r2) r7 = add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r6, r7, r4, 0x1) r8 = add_key$keyring(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r6) keyctl$search(0xa, r8, &(0x7f0000000540)='.dead\x00', &(0x7f0000000580)={'syz', 0x0}, r6) keyctl$invalidate(0x15, r3) 14:33:18 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) 14:33:18 executing program 3: r0 = request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='{\x19-[\x00', 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffc, 0x0) r1 = request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='-]$\x00', r0) r2 = request_key(&(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='\xcc(@(\x00', r0) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r0, 0x0) r3 = add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="b6d6ed7372d7da3a031494563bdb5c064a47bf2b16a283c86be201ecd0da094d33581933594bf30edce5e9993dfb95207ce04d1ed4888a6356f37ab7f122938cd873072a698f61912acd479f45b70d149ba94a5e1230c4a2cc159e8eb87dde06397989fa63e6c43b625ee486d7ec25d62874b318a01d86b1e1732064d28d", 0x7e, r1) keyctl$set_timeout(0xf, r3, 0x0) keyctl$invalidate(0x15, r1) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, r0) r5 = getuid() keyctl$chown(0x4, r4, r5, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r2) r7 = add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r6, r7, r4, 0x1) r8 = add_key$keyring(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r6) keyctl$search(0xa, r8, &(0x7f0000000540)='.dead\x00', &(0x7f0000000580)={'syz', 0x0}, r6) keyctl$invalidate(0x15, r3) 14:33:18 executing program 4: r0 = request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='{\x19-[\x00', 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffc, 0x0) r1 = request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='-]$\x00', r0) r2 = request_key(&(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='\xcc(@(\x00', r0) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r0, 0x0) r3 = add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="b6d6ed7372d7da3a031494563bdb5c064a47bf2b16a283c86be201ecd0da094d33581933594bf30edce5e9993dfb95207ce04d1ed4888a6356f37ab7f122938cd873072a698f61912acd479f45b70d149ba94a5e1230c4a2cc159e8eb87dde06397989fa63e6c43b625ee486d7ec25d62874b318a01d86b1e1732064d28d", 0x7e, r1) keyctl$set_timeout(0xf, r3, 0x0) keyctl$invalidate(0x15, r1) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, r0) r5 = getuid() keyctl$chown(0x4, r4, r5, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r2) r7 = add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r6, r7, r4, 0x1) r8 = add_key$keyring(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r6) keyctl$search(0xa, r8, &(0x7f0000000540)='.dead\x00', &(0x7f0000000580)={'syz', 0x0}, r6) keyctl$invalidate(0x15, r3) 14:33:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10, &(0x7f0000000080)=0x3f, 0x4) 14:33:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fsmount(0xffffffffffffffff, 0x1, 0x4) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f00000004c0)={0x1d9, 0x0, &(0x7f0000000480)}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000180)={0xffffffffffffffff, 0xfffffffffffffff8, 0x2, 0xfffffffffffffff7}) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x6d, 0x20, 0x2, 0x1f, 0x0, 0x5, 0x40100, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0x1}, 0x4, 0x100000000, 0x3, 0xc, 0x4, 0x5, 0x8, 0x0, 0x7f, 0x0, 0x400}, 0x0, 0xa, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000100000018000000", @ANYBLOB="6ce187b6f02e152eade3f045321e46048a41034805501d23e534d5cb3f21bb783bb119d88d58d2f703deb066a20bdce18f5365b1d4cd977527cd903fb72524466af0deef70cc6c7480f509000000f08c19fbbaa79cc4c6a9bfaa34e42249d3c698468ee6529bdfc643deed30a6bf6a65fcb9022094805bca832c3850b49c48234eaef6b69ae8f57c7f46951af3d4229a8367341d525a6bdea6", @ANYBLOB="40001ce2f40000000070cd2e2f66696c37e89b2b12913beda5d40d9c7701ff4e5c812812b75b0c30e0201827e45759eea74367fd9dfdba39cfc1c5b3f275afc72b73ee4038afc5d975bcb7c01a7e0ca7732a4ce9c1b1ffb0be01eb445bae62eecd6d37cd008ea342f13420b81081d78b2af50e48fffeb411643f1f359bbe0a739667e655"]) fallocate(r2, 0x0, 0x0, 0x87ffffc) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) openat(r2, &(0x7f0000000000)='./file1\x00', 0x200002, 0x1e1) syz_io_uring_setup(0x1, &(0x7f0000000080), &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 14:33:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000780)=[{&(0x7f0000010000)="200000004000000003000000320000000f000000000000000200000002000000008000000080000020000000e1f4655fe1f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000001000028020000028400001b80", 0x66, 0x400}, {0x0, 0x0, 0x80000004e0}, {&(0x7f0000000340)="02000000030000000400000032000f000300040000000000000000000f002f7c", 0x20, 0x1000}, {&(0x7f0000012500)="584100000010796a88b6655fe1f4655fe1f4655f000700000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000013800)=ANY=[]) 14:33:18 executing program 4: r0 = request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='{\x19-[\x00', 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffc, 0x0) r1 = request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='-]$\x00', r0) r2 = request_key(&(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='\xcc(@(\x00', r0) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r0, 0x0) r3 = add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="b6d6ed7372d7da3a031494563bdb5c064a47bf2b16a283c86be201ecd0da094d33581933594bf30edce5e9993dfb95207ce04d1ed4888a6356f37ab7f122938cd873072a698f61912acd479f45b70d149ba94a5e1230c4a2cc159e8eb87dde06397989fa63e6c43b625ee486d7ec25d62874b318a01d86b1e1732064d28d", 0x7e, r1) keyctl$set_timeout(0xf, r3, 0x0) keyctl$invalidate(0x15, r1) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, r0) r5 = getuid() keyctl$chown(0x4, r4, r5, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r2) r7 = add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r6, r7, r4, 0x1) r8 = add_key$keyring(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r6) keyctl$search(0xa, r8, &(0x7f0000000540)='.dead\x00', &(0x7f0000000580)={'syz', 0x0}, r6) keyctl$invalidate(0x15, r3) 14:33:18 executing program 3: r0 = request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='{\x19-[\x00', 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffc, 0x0) r1 = request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='-]$\x00', r0) r2 = request_key(&(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='\xcc(@(\x00', r0) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r0, 0x0) r3 = add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="b6d6ed7372d7da3a031494563bdb5c064a47bf2b16a283c86be201ecd0da094d33581933594bf30edce5e9993dfb95207ce04d1ed4888a6356f37ab7f122938cd873072a698f61912acd479f45b70d149ba94a5e1230c4a2cc159e8eb87dde06397989fa63e6c43b625ee486d7ec25d62874b318a01d86b1e1732064d28d", 0x7e, r1) keyctl$set_timeout(0xf, r3, 0x0) keyctl$invalidate(0x15, r1) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, r0) r5 = getuid() keyctl$chown(0x4, r4, r5, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r2) r7 = add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r6, r7, r4, 0x1) r8 = add_key$keyring(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r6) keyctl$search(0xa, r8, &(0x7f0000000540)='.dead\x00', &(0x7f0000000580)={'syz', 0x0}, r6) keyctl$invalidate(0x15, r3) [ 132.170076] loop5: detected capacity change from 0 to 131076 [ 132.181125] audit: type=1400 audit(1663079598.325:9): avc: denied { write } for pid=4285 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 14:33:18 executing program 6: r0 = semget$private(0x0, 0x4, 0x0) semctl$SETVAL(r0, 0x4, 0x10, 0x0) 14:33:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10, &(0x7f0000000080)=0x3f, 0x4) 14:33:18 executing program 2: r0 = request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='{\x19-[\x00', 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffc, 0x0) r1 = request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='-]$\x00', r0) r2 = request_key(&(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='\xcc(@(\x00', r0) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r0, 0x0) r3 = add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="b6d6ed7372d7da3a031494563bdb5c064a47bf2b16a283c86be201ecd0da094d33581933594bf30edce5e9993dfb95207ce04d1ed4888a6356f37ab7f122938cd873072a698f61912acd479f45b70d149ba94a5e1230c4a2cc159e8eb87dde06397989fa63e6c43b625ee486d7ec25d62874b318a01d86b1e1732064d28d", 0x7e, r1) keyctl$set_timeout(0xf, r3, 0x0) keyctl$invalidate(0x15, r1) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, r0) r5 = getuid() keyctl$chown(0x4, r4, r5, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r2) r7 = add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r6, r7, r4, 0x1) r8 = add_key$keyring(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r6) keyctl$search(0xa, r8, &(0x7f0000000540)='.dead\x00', &(0x7f0000000580)={'syz', 0x0}, r6) keyctl$invalidate(0x15, r3) 14:33:18 executing program 4: r0 = request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='{\x19-[\x00', 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffc, 0x0) r1 = request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='-]$\x00', r0) r2 = request_key(&(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='\xcc(@(\x00', r0) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r0, 0x0) r3 = add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="b6d6ed7372d7da3a031494563bdb5c064a47bf2b16a283c86be201ecd0da094d33581933594bf30edce5e9993dfb95207ce04d1ed4888a6356f37ab7f122938cd873072a698f61912acd479f45b70d149ba94a5e1230c4a2cc159e8eb87dde06397989fa63e6c43b625ee486d7ec25d62874b318a01d86b1e1732064d28d", 0x7e, r1) keyctl$set_timeout(0xf, r3, 0x0) keyctl$invalidate(0x15, r1) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, r0) r5 = getuid() keyctl$chown(0x4, r4, r5, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r2) r7 = add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r6, r7, r4, 0x1) r8 = add_key$keyring(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r6) keyctl$search(0xa, r8, &(0x7f0000000540)='.dead\x00', &(0x7f0000000580)={'syz', 0x0}, r6) keyctl$invalidate(0x15, r3) 14:33:18 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000001480)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @empty}}) [ 132.239686] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 132.277022] EXT4-fs (loop5): unmounting filesystem. 14:33:19 executing program 2: r0 = request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='{\x19-[\x00', 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0xfffffffffffffffc, 0x0) r1 = request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='-]$\x00', r0) r2 = request_key(&(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='\xcc(@(\x00', r0) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r0, 0x0) r3 = add_key$user(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="b6d6ed7372d7da3a031494563bdb5c064a47bf2b16a283c86be201ecd0da094d33581933594bf30edce5e9993dfb95207ce04d1ed4888a6356f37ab7f122938cd873072a698f61912acd479f45b70d149ba94a5e1230c4a2cc159e8eb87dde06397989fa63e6c43b625ee486d7ec25d62874b318a01d86b1e1732064d28d", 0x7e, r1) keyctl$set_timeout(0xf, r3, 0x0) keyctl$invalidate(0x15, r1) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, r0) r5 = getuid() keyctl$chown(0x4, r4, r5, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r2) r7 = add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r6, r7, r4, 0x1) r8 = add_key$keyring(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r6) keyctl$search(0xa, r8, &(0x7f0000000540)='.dead\x00', &(0x7f0000000580)={'syz', 0x0}, r6) keyctl$invalidate(0x15, r3) 14:33:19 executing program 5: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000005, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockname$inet6(r0, 0x0, &(0x7f0000000040)) 14:33:19 executing program 6: r0 = semget$private(0x0, 0x4, 0x0) semctl$SETVAL(r0, 0x4, 0x10, 0x0) 14:33:19 executing program 4: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_STAT(r0, 0x2, 0x0) 14:33:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10, &(0x7f0000000080)=0x3f, 0x4) 14:33:19 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000001480)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @empty}}) 14:33:19 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r2, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r4, 0x0) lstat(&(0x7f0000000580)='./file1/file0\x00', &(0x7f00000005c0)) syz_mount_image$nfs(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0xfffffffffffffff7, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="c4bf1bb6858b67daf940c255057af45d483c40ff11bf7a01c3d421163a375c163cf59c84d790362d764405b8dfe9229e85f48c15a2de2a9ff465461818451f07805a64a3f0b64e4b9ba13b93d990dd1f1a6ad4441b7e8e64ab3448aa4a89bcc2eb6a0ec9211ab9e4a031747a80b9862413068a52f87e29caa6dfe43b5f77e4458e67cd767b9a20f37aaa337fec3f4377dd70fa65a8ef4b39370367c598f3592d7248ee07eaf270dcc91a2e17", 0xac, 0x3}], 0x0, &(0x7f0000000640)={[{'//'}], [{@dont_measure}, {@euid_gt={'euid>', r3}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@euid_lt={'euid<', r4}}, {@euid_gt}]}) r5 = openat$cgroup_subtree(r1, &(0x7f0000000000), 0x2, 0x0) ioctl$PTP_SYS_OFFSET_PRECISE(r2, 0xc0403d08, &(0x7f00000003c0)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB="0000080015001d012a2fb66e6665312f66696c003000"]) syz_open_dev$tty20(0xc, 0x4, 0x1) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x7ffffffff000}]) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') fcntl$dupfd(r2, 0x0, r0) 14:33:19 executing program 7: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0xffffffff00000000, 0x0) msgsnd(r0, &(0x7f0000000000)={0x2}, 0x8, 0x0) 14:33:19 executing program 6: r0 = semget$private(0x0, 0x4, 0x0) semctl$SETVAL(r0, 0x4, 0x10, 0x0) 14:33:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10, &(0x7f0000000080)=0x3f, 0x4) 14:33:19 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000001480)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @empty}}) 14:33:19 executing program 5: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000005, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockname$inet6(r0, 0x0, &(0x7f0000000040)) 14:33:19 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r2, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r4, 0x0) lstat(&(0x7f0000000580)='./file1/file0\x00', &(0x7f00000005c0)) syz_mount_image$nfs(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0xfffffffffffffff7, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="c4bf1bb6858b67daf940c255057af45d483c40ff11bf7a01c3d421163a375c163cf59c84d790362d764405b8dfe9229e85f48c15a2de2a9ff465461818451f07805a64a3f0b64e4b9ba13b93d990dd1f1a6ad4441b7e8e64ab3448aa4a89bcc2eb6a0ec9211ab9e4a031747a80b9862413068a52f87e29caa6dfe43b5f77e4458e67cd767b9a20f37aaa337fec3f4377dd70fa65a8ef4b39370367c598f3592d7248ee07eaf270dcc91a2e17", 0xac, 0x3}], 0x0, &(0x7f0000000640)={[{'//'}], [{@dont_measure}, {@euid_gt={'euid>', r3}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@euid_lt={'euid<', r4}}, {@euid_gt}]}) r5 = openat$cgroup_subtree(r1, &(0x7f0000000000), 0x2, 0x0) ioctl$PTP_SYS_OFFSET_PRECISE(r2, 0xc0403d08, &(0x7f00000003c0)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB="0000080015001d012a2fb66e6665312f66696c003000"]) syz_open_dev$tty20(0xc, 0x4, 0x1) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x7ffffffff000}]) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') fcntl$dupfd(r2, 0x0, r0) 14:33:19 executing program 0: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0xffffffff00000000, 0x0) msgsnd(r0, &(0x7f0000000000)={0x2}, 0x8, 0x0) 14:33:19 executing program 7: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0xffffffff00000000, 0x0) msgsnd(r0, &(0x7f0000000000)={0x2}, 0x8, 0x0) 14:33:19 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x15b74) 14:33:19 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000001480)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @empty}}) 14:33:19 executing program 6: r0 = semget$private(0x0, 0x4, 0x0) semctl$SETVAL(r0, 0x4, 0x10, 0x0) 14:33:19 executing program 2: kexec_load(0x0, 0x1, &(0x7f0000001340)=[{0x0}], 0x0) 14:33:19 executing program 5: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000005, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockname$inet6(r0, 0x0, &(0x7f0000000040)) 14:33:19 executing program 5: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000005, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockname$inet6(r0, 0x0, &(0x7f0000000040)) 14:33:19 executing program 6: socket$inet6_udp(0xa, 0x2, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000080), 0x0) fsopen(&(0x7f0000000180)='ramfs\x00', 0x0) 14:33:19 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r2, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r4, 0x0) lstat(&(0x7f0000000580)='./file1/file0\x00', &(0x7f00000005c0)) syz_mount_image$nfs(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0xfffffffffffffff7, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="c4bf1bb6858b67daf940c255057af45d483c40ff11bf7a01c3d421163a375c163cf59c84d790362d764405b8dfe9229e85f48c15a2de2a9ff465461818451f07805a64a3f0b64e4b9ba13b93d990dd1f1a6ad4441b7e8e64ab3448aa4a89bcc2eb6a0ec9211ab9e4a031747a80b9862413068a52f87e29caa6dfe43b5f77e4458e67cd767b9a20f37aaa337fec3f4377dd70fa65a8ef4b39370367c598f3592d7248ee07eaf270dcc91a2e17", 0xac, 0x3}], 0x0, &(0x7f0000000640)={[{'//'}], [{@dont_measure}, {@euid_gt={'euid>', r3}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@euid_lt={'euid<', r4}}, {@euid_gt}]}) r5 = openat$cgroup_subtree(r1, &(0x7f0000000000), 0x2, 0x0) ioctl$PTP_SYS_OFFSET_PRECISE(r2, 0xc0403d08, &(0x7f00000003c0)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB="0000080015001d012a2fb66e6665312f66696c003000"]) syz_open_dev$tty20(0xc, 0x4, 0x1) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x7ffffffff000}]) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') fcntl$dupfd(r2, 0x0, r0) 14:33:19 executing program 0: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0xffffffff00000000, 0x0) msgsnd(r0, &(0x7f0000000000)={0x2}, 0x8, 0x0) 14:33:19 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), r0) syz_genetlink_get_family_id$team(&(0x7f0000000340), 0xffffffffffffffff) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000e80), 0x4a01) syz_genetlink_get_family_id$team(&(0x7f0000000f00), 0xffffffffffffffff) 14:33:19 executing program 6: socket$inet6_udp(0xa, 0x2, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000080), 0x0) fsopen(&(0x7f0000000180)='ramfs\x00', 0x0) 14:33:19 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x15b74) 14:33:19 executing program 2: futex(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:19 executing program 7: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0xffffffff00000000, 0x0) msgsnd(r0, &(0x7f0000000000)={0x2}, 0x8, 0x0) 14:33:19 executing program 3: syz_emit_ethernet(0x6e, &(0x7f00000001c0)={@random="5398acdc7185", @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ddc20", 0x38, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "f2e2a6", 0x0, 0x3a, 0x0, @private2, @loopback, [], "52168a0f02b79fbf"}}}}}}}, 0x0) 14:33:20 executing program 2: futex(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:20 executing program 3: syz_emit_ethernet(0x6e, &(0x7f00000001c0)={@random="5398acdc7185", @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ddc20", 0x38, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "f2e2a6", 0x0, 0x3a, 0x0, @private2, @loopback, [], "52168a0f02b79fbf"}}}}}}}, 0x0) 14:33:20 executing program 6: socket$inet6_udp(0xa, 0x2, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000080), 0x0) fsopen(&(0x7f0000000180)='ramfs\x00', 0x0) 14:33:20 executing program 7: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0xffffffff00000000, 0x0) msgsnd(r0, &(0x7f0000000000)={0x2}, 0x8, 0x0) 14:33:20 executing program 0: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0xffffffff00000000, 0x0) msgsnd(r0, &(0x7f0000000000)={0x2}, 0x8, 0x0) 14:33:20 executing program 2: futex(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:20 executing program 3: syz_emit_ethernet(0x6e, &(0x7f00000001c0)={@random="5398acdc7185", @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ddc20", 0x38, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "f2e2a6", 0x0, 0x3a, 0x0, @private2, @loopback, [], "52168a0f02b79fbf"}}}}}}}, 0x0) 14:33:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), r0) syz_genetlink_get_family_id$team(&(0x7f0000000340), 0xffffffffffffffff) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000e80), 0x4a01) syz_genetlink_get_family_id$team(&(0x7f0000000f00), 0xffffffffffffffff) 14:33:20 executing program 6: socket$inet6_udp(0xa, 0x2, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000080), 0x0) fsopen(&(0x7f0000000180)='ramfs\x00', 0x0) 14:33:20 executing program 3: syz_emit_ethernet(0x6e, &(0x7f00000001c0)={@random="5398acdc7185", @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ddc20", 0x38, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "f2e2a6", 0x0, 0x3a, 0x0, @private2, @loopback, [], "52168a0f02b79fbf"}}}}}}}, 0x0) 14:33:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), r0) syz_genetlink_get_family_id$team(&(0x7f0000000340), 0xffffffffffffffff) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000e80), 0x4a01) syz_genetlink_get_family_id$team(&(0x7f0000000f00), 0xffffffffffffffff) 14:33:20 executing program 2: futex(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 14:33:20 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/consoles\x00', 0x0, 0x0) 14:33:20 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r2, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) newfstatat(0xffffffffffffff9c, &(0x7f0000 VM DIAGNOSIS: 14:33:13 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=1ffff110081d0f44 RCX=0000000000000000 RDX=ffff888040e19ac0 RSI=ffffffff813bc113 RDI=0000000000000005 RBP=ffff888040e87ad8 RSP=ffff888040e87a00 R8 =0000000000000005 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=0000000000000001 R13=0000000000000000 R14=0000000000000000 R15=0000000000000200 RIP=ffffffff813bc115 RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555557258400 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f08db466718 CR3=000000001ceb4000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f08ddff87c0 00007f08ddff87c8 YMM02=0000000000000000 0000000000000000 00007f08ddff87e0 00007f08ddff87c0 YMM03=0000000000000000 0000000000000000 00007f08ddff87c8 00007f08ddff87c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=000000000000003a RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b25c1 RDI=ffffffff8763fae0 RBP=ffffffff8763faa0 RSP=ffff88806cf098b8 R8 =0000000000000001 R9 =000000000000000a R10=000000000000003a R11=0000000000000001 R12=000000000000003a R13=ffffffff8763faa0 R14=0000000000000010 R15=ffffffff822b25b0 RIP=ffffffff822b2619 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f08db487700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffdfc99ffb8 CR3=000000001ceb4000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f08ddff87c0 00007f08ddff87c8 YMM02=0000000000000000 0000000000000000 00007f08ddff87e0 00007f08ddff87c0 YMM03=0000000000000000 0000000000000000 00007f08ddff87c8 00007f08ddff87c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000