Warning: Permanently added '[localhost]:25973' (ECDSA) to the list of known hosts. 2022/09/13 16:55:04 fuzzer started 2022/09/13 16:55:05 dialing manager at localhost:36597 syzkaller login: [ 44.383397] cgroup: Unknown subsys name 'net' [ 44.510006] cgroup: Unknown subsys name 'rlimit' 2022/09/13 16:55:17 syscalls: 2215 2022/09/13 16:55:17 code coverage: enabled 2022/09/13 16:55:17 comparison tracing: enabled 2022/09/13 16:55:17 extra coverage: enabled 2022/09/13 16:55:17 setuid sandbox: enabled 2022/09/13 16:55:17 namespace sandbox: enabled 2022/09/13 16:55:17 Android sandbox: enabled 2022/09/13 16:55:17 fault injection: enabled 2022/09/13 16:55:17 leak checking: enabled 2022/09/13 16:55:17 net packet injection: enabled 2022/09/13 16:55:17 net device setup: enabled 2022/09/13 16:55:17 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/13 16:55:17 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/13 16:55:17 USB emulation: enabled 2022/09/13 16:55:17 hci packet injection: enabled 2022/09/13 16:55:17 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220913) 2022/09/13 16:55:17 802.15.4 emulation: enabled 2022/09/13 16:55:17 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/13 16:55:18 fetching corpus: 50, signal 32922/36399 (executing program) 2022/09/13 16:55:18 fetching corpus: 100, signal 44055/49045 (executing program) 2022/09/13 16:55:18 fetching corpus: 150, signal 52912/59286 (executing program) 2022/09/13 16:55:18 fetching corpus: 200, signal 60380/68085 (executing program) 2022/09/13 16:55:18 fetching corpus: 250, signal 69027/77886 (executing program) 2022/09/13 16:55:18 fetching corpus: 300, signal 76667/86578 (executing program) 2022/09/13 16:55:18 fetching corpus: 350, signal 83141/94103 (executing program) 2022/09/13 16:55:19 fetching corpus: 400, signal 88169/100145 (executing program) 2022/09/13 16:55:19 fetching corpus: 450, signal 92905/105838 (executing program) 2022/09/13 16:55:19 fetching corpus: 500, signal 95527/109503 (executing program) 2022/09/13 16:55:19 fetching corpus: 550, signal 99857/114745 (executing program) 2022/09/13 16:55:19 fetching corpus: 600, signal 102817/118703 (executing program) 2022/09/13 16:55:19 fetching corpus: 650, signal 106284/123037 (executing program) 2022/09/13 16:55:19 fetching corpus: 700, signal 109973/127488 (executing program) 2022/09/13 16:55:19 fetching corpus: 750, signal 113165/131473 (executing program) 2022/09/13 16:55:20 fetching corpus: 800, signal 115403/134549 (executing program) 2022/09/13 16:55:20 fetching corpus: 850, signal 118028/137965 (executing program) 2022/09/13 16:55:20 fetching corpus: 900, signal 119729/140496 (executing program) 2022/09/13 16:55:20 fetching corpus: 950, signal 122522/143982 (executing program) 2022/09/13 16:55:20 fetching corpus: 1000, signal 125301/147341 (executing program) 2022/09/13 16:55:20 fetching corpus: 1050, signal 128523/151000 (executing program) 2022/09/13 16:55:20 fetching corpus: 1100, signal 131685/154597 (executing program) 2022/09/13 16:55:20 fetching corpus: 1150, signal 133696/157233 (executing program) 2022/09/13 16:55:21 fetching corpus: 1200, signal 137380/161190 (executing program) 2022/09/13 16:55:21 fetching corpus: 1250, signal 139299/163641 (executing program) 2022/09/13 16:55:21 fetching corpus: 1300, signal 140290/165405 (executing program) 2022/09/13 16:55:21 fetching corpus: 1350, signal 142417/168054 (executing program) 2022/09/13 16:55:21 fetching corpus: 1400, signal 145713/171550 (executing program) 2022/09/13 16:55:21 fetching corpus: 1450, signal 147493/173804 (executing program) 2022/09/13 16:55:21 fetching corpus: 1500, signal 149510/176229 (executing program) 2022/09/13 16:55:22 fetching corpus: 1550, signal 151837/178886 (executing program) 2022/09/13 16:55:22 fetching corpus: 1600, signal 153052/180661 (executing program) 2022/09/13 16:55:22 fetching corpus: 1650, signal 154146/182346 (executing program) 2022/09/13 16:55:22 fetching corpus: 1700, signal 155739/184350 (executing program) 2022/09/13 16:55:22 fetching corpus: 1750, signal 158076/186907 (executing program) 2022/09/13 16:55:22 fetching corpus: 1800, signal 160105/189203 (executing program) 2022/09/13 16:55:22 fetching corpus: 1850, signal 161231/190782 (executing program) 2022/09/13 16:55:23 fetching corpus: 1900, signal 162757/192622 (executing program) 2022/09/13 16:55:23 fetching corpus: 1950, signal 163947/194174 (executing program) 2022/09/13 16:55:23 fetching corpus: 2000, signal 165001/195680 (executing program) 2022/09/13 16:55:23 fetching corpus: 2050, signal 166228/197235 (executing program) 2022/09/13 16:55:23 fetching corpus: 2100, signal 167801/199016 (executing program) 2022/09/13 16:55:23 fetching corpus: 2150, signal 169032/200580 (executing program) 2022/09/13 16:55:23 fetching corpus: 2200, signal 170725/202389 (executing program) 2022/09/13 16:55:24 fetching corpus: 2250, signal 171658/203693 (executing program) 2022/09/13 16:55:24 fetching corpus: 2300, signal 172550/204915 (executing program) 2022/09/13 16:55:24 fetching corpus: 2350, signal 173230/206069 (executing program) 2022/09/13 16:55:24 fetching corpus: 2400, signal 174499/207552 (executing program) 2022/09/13 16:55:24 fetching corpus: 2450, signal 175723/208993 (executing program) 2022/09/13 16:55:24 fetching corpus: 2500, signal 176519/210155 (executing program) 2022/09/13 16:55:25 fetching corpus: 2550, signal 177626/211456 (executing program) 2022/09/13 16:55:25 fetching corpus: 2600, signal 178512/212611 (executing program) 2022/09/13 16:55:25 fetching corpus: 2650, signal 180046/214125 (executing program) 2022/09/13 16:55:25 fetching corpus: 2700, signal 182705/216297 (executing program) 2022/09/13 16:55:25 fetching corpus: 2750, signal 183898/217564 (executing program) 2022/09/13 16:55:25 fetching corpus: 2800, signal 185013/218810 (executing program) 2022/09/13 16:55:25 fetching corpus: 2850, signal 186221/220080 (executing program) 2022/09/13 16:55:26 fetching corpus: 2900, signal 187291/221194 (executing program) 2022/09/13 16:55:26 fetching corpus: 2950, signal 188262/222295 (executing program) 2022/09/13 16:55:26 fetching corpus: 3000, signal 189480/223508 (executing program) 2022/09/13 16:55:26 fetching corpus: 3050, signal 190421/224584 (executing program) 2022/09/13 16:55:26 fetching corpus: 3100, signal 191318/225575 (executing program) 2022/09/13 16:55:26 fetching corpus: 3150, signal 192595/226761 (executing program) 2022/09/13 16:55:27 fetching corpus: 3200, signal 193456/227751 (executing program) 2022/09/13 16:55:27 fetching corpus: 3250, signal 194750/228893 (executing program) 2022/09/13 16:55:27 fetching corpus: 3300, signal 195488/229756 (executing program) 2022/09/13 16:55:27 fetching corpus: 3350, signal 196573/230827 (executing program) 2022/09/13 16:55:27 fetching corpus: 3400, signal 197258/231673 (executing program) 2022/09/13 16:55:27 fetching corpus: 3450, signal 198827/232925 (executing program) 2022/09/13 16:55:27 fetching corpus: 3500, signal 199310/233602 (executing program) 2022/09/13 16:55:28 fetching corpus: 3550, signal 200164/234482 (executing program) 2022/09/13 16:55:28 fetching corpus: 3600, signal 201041/235388 (executing program) 2022/09/13 16:55:28 fetching corpus: 3650, signal 202094/236352 (executing program) 2022/09/13 16:55:28 fetching corpus: 3700, signal 202959/237220 (executing program) 2022/09/13 16:55:28 fetching corpus: 3750, signal 204116/238189 (executing program) 2022/09/13 16:55:28 fetching corpus: 3800, signal 204936/238944 (executing program) 2022/09/13 16:55:28 fetching corpus: 3850, signal 205386/239556 (executing program) 2022/09/13 16:55:28 fetching corpus: 3900, signal 206427/240388 (executing program) 2022/09/13 16:55:29 fetching corpus: 3950, signal 207086/241042 (executing program) 2022/09/13 16:55:29 fetching corpus: 4000, signal 208135/241892 (executing program) 2022/09/13 16:55:29 fetching corpus: 4050, signal 208913/242597 (executing program) 2022/09/13 16:55:29 fetching corpus: 4100, signal 210020/243461 (executing program) 2022/09/13 16:55:29 fetching corpus: 4150, signal 210552/244042 (executing program) 2022/09/13 16:55:29 fetching corpus: 4200, signal 211027/244623 (executing program) 2022/09/13 16:55:29 fetching corpus: 4250, signal 211470/245162 (executing program) 2022/09/13 16:55:30 fetching corpus: 4300, signal 212267/245809 (executing program) 2022/09/13 16:55:30 fetching corpus: 4350, signal 213038/246421 (executing program) 2022/09/13 16:55:30 fetching corpus: 4400, signal 214880/247400 (executing program) 2022/09/13 16:55:30 fetching corpus: 4450, signal 215490/247950 (executing program) 2022/09/13 16:55:30 fetching corpus: 4500, signal 216354/248570 (executing program) 2022/09/13 16:55:30 fetching corpus: 4550, signal 217072/249135 (executing program) 2022/09/13 16:55:30 fetching corpus: 4600, signal 217871/249680 (executing program) 2022/09/13 16:55:31 fetching corpus: 4650, signal 218526/250192 (executing program) 2022/09/13 16:55:31 fetching corpus: 4700, signal 219931/250867 (executing program) 2022/09/13 16:55:31 fetching corpus: 4750, signal 220718/251375 (executing program) 2022/09/13 16:55:31 fetching corpus: 4800, signal 221224/251831 (executing program) 2022/09/13 16:55:31 fetching corpus: 4850, signal 221708/252296 (executing program) 2022/09/13 16:55:31 fetching corpus: 4900, signal 222435/252805 (executing program) 2022/09/13 16:55:31 fetching corpus: 4950, signal 223505/253378 (executing program) 2022/09/13 16:55:32 fetching corpus: 5000, signal 224160/253840 (executing program) 2022/09/13 16:55:32 fetching corpus: 5050, signal 224879/254248 (executing program) 2022/09/13 16:55:32 fetching corpus: 5100, signal 225637/254651 (executing program) 2022/09/13 16:55:32 fetching corpus: 5150, signal 226355/255087 (executing program) 2022/09/13 16:55:32 fetching corpus: 5200, signal 227084/255488 (executing program) 2022/09/13 16:55:32 fetching corpus: 5250, signal 227998/255915 (executing program) 2022/09/13 16:55:32 fetching corpus: 5300, signal 228631/256288 (executing program) 2022/09/13 16:55:33 fetching corpus: 5350, signal 229054/256603 (executing program) 2022/09/13 16:55:33 fetching corpus: 5400, signal 229688/256952 (executing program) 2022/09/13 16:55:33 fetching corpus: 5450, signal 230785/257356 (executing program) 2022/09/13 16:55:33 fetching corpus: 5500, signal 231437/257664 (executing program) 2022/09/13 16:55:33 fetching corpus: 5550, signal 232165/257988 (executing program) 2022/09/13 16:55:33 fetching corpus: 5600, signal 232859/258282 (executing program) 2022/09/13 16:55:33 fetching corpus: 5650, signal 233463/258597 (executing program) 2022/09/13 16:55:34 fetching corpus: 5700, signal 234423/258919 (executing program) 2022/09/13 16:55:34 fetching corpus: 5750, signal 234984/259234 (executing program) 2022/09/13 16:55:34 fetching corpus: 5800, signal 235955/259542 (executing program) 2022/09/13 16:55:34 fetching corpus: 5850, signal 236442/259792 (executing program) 2022/09/13 16:55:34 fetching corpus: 5900, signal 236860/260016 (executing program) 2022/09/13 16:55:34 fetching corpus: 5950, signal 237405/260262 (executing program) 2022/09/13 16:55:34 fetching corpus: 6000, signal 237809/260492 (executing program) 2022/09/13 16:55:35 fetching corpus: 6050, signal 238697/260711 (executing program) 2022/09/13 16:55:35 fetching corpus: 6100, signal 239082/260902 (executing program) 2022/09/13 16:55:35 fetching corpus: 6150, signal 239590/261195 (executing program) 2022/09/13 16:55:35 fetching corpus: 6200, signal 240056/261393 (executing program) 2022/09/13 16:55:35 fetching corpus: 6250, signal 240531/261581 (executing program) 2022/09/13 16:55:35 fetching corpus: 6300, signal 241126/261768 (executing program) 2022/09/13 16:55:35 fetching corpus: 6350, signal 241836/261904 (executing program) 2022/09/13 16:55:36 fetching corpus: 6400, signal 242258/261922 (executing program) 2022/09/13 16:55:36 fetching corpus: 6450, signal 242912/261928 (executing program) 2022/09/13 16:55:36 fetching corpus: 6500, signal 243422/261933 (executing program) 2022/09/13 16:55:36 fetching corpus: 6550, signal 243868/261935 (executing program) 2022/09/13 16:55:36 fetching corpus: 6600, signal 244231/261945 (executing program) 2022/09/13 16:55:36 fetching corpus: 6650, signal 244594/261949 (executing program) 2022/09/13 16:55:36 fetching corpus: 6700, signal 245197/261982 (executing program) 2022/09/13 16:55:36 fetching corpus: 6750, signal 245696/262039 (executing program) 2022/09/13 16:55:36 fetching corpus: 6800, signal 246337/262047 (executing program) 2022/09/13 16:55:37 fetching corpus: 6850, signal 246956/262058 (executing program) 2022/09/13 16:55:37 fetching corpus: 6900, signal 247440/262059 (executing program) 2022/09/13 16:55:37 fetching corpus: 6950, signal 247956/262062 (executing program) 2022/09/13 16:55:37 fetching corpus: 7000, signal 248361/262064 (executing program) 2022/09/13 16:55:37 fetching corpus: 7050, signal 248849/262067 (executing program) 2022/09/13 16:55:37 fetching corpus: 7100, signal 249472/262085 (executing program) 2022/09/13 16:55:37 fetching corpus: 7150, signal 249812/262108 (executing program) 2022/09/13 16:55:38 fetching corpus: 7200, signal 250266/262237 (executing program) 2022/09/13 16:55:38 fetching corpus: 7250, signal 250717/262239 (executing program) 2022/09/13 16:55:38 fetching corpus: 7300, signal 251376/262246 (executing program) 2022/09/13 16:55:38 fetching corpus: 7350, signal 251963/262248 (executing program) 2022/09/13 16:55:38 fetching corpus: 7400, signal 252427/262265 (executing program) 2022/09/13 16:55:38 fetching corpus: 7439, signal 252858/262285 (executing program) 2022/09/13 16:55:38 fetching corpus: 7439, signal 252858/262285 (executing program) 2022/09/13 16:55:41 starting 8 fuzzer processes 16:55:41 executing program 0: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 16:55:41 executing program 1: syz_open_procfs(0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) pwrite64(r0, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) fcntl$addseals(r0, 0x409, 0x0) [ 80.759458] audit: type=1400 audit(1663088141.590:6): avc: denied { execmem } for pid=287 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 16:55:41 executing program 2: getpgrp(0xffffffffffffffff) 16:55:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="db", 0x1}], 0x1, 0x8001, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) read(r1, &(0x7f0000000180)=""/136, 0x88) sendfile(r1, r1, 0x0, 0x100000) 16:55:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0xb8}}, 0x0) 16:55:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r0, 0x0, 0x32, 0x0, &(0x7f0000000d00)) 16:55:41 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="1300000065ffff"], 0x13) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000025c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 16:55:41 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r1 = syz_io_uring_setup(0x516b, &(0x7f0000000440), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000004c0), &(0x7f0000000500)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000540)=[r0], 0x1) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff]}, 0x1) [ 82.024196] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 82.025219] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 82.026872] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 82.029065] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 82.030524] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 82.031428] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 82.036172] Bluetooth: hci0: HCI_REQ-0x0c1a [ 82.074220] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 82.075922] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 82.077713] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 82.078703] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 82.086599] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 82.087994] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 82.094434] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 82.106574] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 82.107333] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 82.109084] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 82.109667] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 82.110680] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 82.115849] Bluetooth: hci1: HCI_REQ-0x0c1a [ 82.121592] Bluetooth: hci2: HCI_REQ-0x0c1a [ 82.193215] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 82.194975] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 82.196856] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 82.198370] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 82.201220] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 82.203150] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 82.204520] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 82.209305] Bluetooth: hci5: HCI_REQ-0x0c1a [ 82.233987] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 82.236096] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 82.245203] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 82.255479] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 82.261286] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 82.262629] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 82.263898] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 82.270856] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 82.272621] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 82.275982] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 82.278610] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 82.280608] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 82.288083] Bluetooth: hci6: HCI_REQ-0x0c1a [ 82.309102] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 82.322125] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 82.329696] Bluetooth: hci4: HCI_REQ-0x0c1a [ 82.382896] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 82.384609] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 82.385326] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 82.405184] Bluetooth: hci7: HCI_REQ-0x0c1a [ 84.103336] Bluetooth: hci0: command 0x0409 tx timeout [ 84.167236] Bluetooth: hci2: command 0x0409 tx timeout [ 84.167668] Bluetooth: hci1: command 0x0409 tx timeout [ 84.168159] Bluetooth: hci3: Opcode 0x c03 failed: -110 [ 84.231838] Bluetooth: hci5: command 0x0409 tx timeout [ 84.295024] Bluetooth: hci6: command 0x0409 tx timeout [ 84.359790] Bluetooth: hci4: command 0x0409 tx timeout [ 84.423936] Bluetooth: hci7: command 0x0409 tx timeout [ 86.152072] Bluetooth: hci0: command 0x041b tx timeout [ 86.214913] Bluetooth: hci1: command 0x041b tx timeout [ 86.215401] Bluetooth: hci2: command 0x041b tx timeout [ 86.278861] Bluetooth: hci5: command 0x041b tx timeout [ 86.342806] Bluetooth: hci6: command 0x041b tx timeout [ 86.406838] Bluetooth: hci4: command 0x041b tx timeout [ 86.470801] Bluetooth: hci7: command 0x041b tx timeout [ 87.179687] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 87.181005] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 87.182096] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 87.184159] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 87.185273] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 87.186241] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 87.190529] Bluetooth: hci3: HCI_REQ-0x0c1a [ 88.198909] Bluetooth: hci0: command 0x040f tx timeout [ 88.262854] Bluetooth: hci2: command 0x040f tx timeout [ 88.263606] Bluetooth: hci1: command 0x040f tx timeout [ 88.326884] Bluetooth: hci5: command 0x040f tx timeout [ 88.390896] Bluetooth: hci6: command 0x040f tx timeout [ 88.454819] Bluetooth: hci4: command 0x040f tx timeout [ 88.518931] Bluetooth: hci7: command 0x040f tx timeout [ 89.223209] Bluetooth: hci3: command 0x0409 tx timeout [ 90.247062] Bluetooth: hci0: command 0x0419 tx timeout [ 90.310885] Bluetooth: hci1: command 0x0419 tx timeout [ 90.311683] Bluetooth: hci2: command 0x0419 tx timeout [ 90.374883] Bluetooth: hci5: command 0x0419 tx timeout [ 90.438913] Bluetooth: hci6: command 0x0419 tx timeout [ 90.502895] Bluetooth: hci4: command 0x0419 tx timeout [ 90.566879] Bluetooth: hci7: command 0x0419 tx timeout [ 91.270861] Bluetooth: hci3: command 0x041b tx timeout [ 93.318809] Bluetooth: hci3: command 0x040f tx timeout [ 95.366804] Bluetooth: hci3: command 0x0419 tx timeout 16:56:38 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x6) [ 137.696626] program syz-executor.4 is using a deprecated SCSI ioctl, please convert it to SG_IO 16:56:38 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x6) [ 137.816285] program syz-executor.4 is using a deprecated SCSI ioctl, please convert it to SG_IO 16:56:38 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x6) [ 137.938247] program syz-executor.4 is using a deprecated SCSI ioctl, please convert it to SG_IO 16:56:38 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x6) [ 138.042348] program syz-executor.4 is using a deprecated SCSI ioctl, please convert it to SG_IO 16:56:38 executing program 4: socketpair(0xa, 0x3, 0x7, &(0x7f0000002700)) 16:56:39 executing program 4: socketpair(0xa, 0x3, 0x7, &(0x7f0000002700)) 16:56:39 executing program 4: socketpair(0xa, 0x3, 0x7, &(0x7f0000002700)) 16:56:39 executing program 4: socketpair(0xa, 0x3, 0x7, &(0x7f0000002700)) [ 139.930670] loop0: detected capacity change from 0 to 5 [ 139.944219] ======================================================= [ 139.944219] WARNING: The mand mount option has been deprecated and [ 139.944219] and is ignored by this kernel. Remove the mand [ 139.944219] option from the mount to silence this warning. [ 139.944219] ======================================================= [ 139.966390] audit: type=1400 audit(1663088200.797:7): avc: denied { open } for pid=3874 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 139.967876] audit: type=1400 audit(1663088200.797:8): avc: denied { kernel } for pid=3874 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 139.978410] ------------[ cut here ]------------ [ 139.978430] [ 139.978433] ====================================================== [ 139.978437] WARNING: possible circular locking dependency detected [ 139.978441] 6.0.0-rc5-next-20220913 #1 Not tainted [ 139.978447] ------------------------------------------------------ [ 139.978451] syz-executor.0/3875 is trying to acquire lock: [ 139.978457] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 139.978498] [ 139.978498] but task is already holding lock: [ 139.978500] ffff888041b23c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 139.978528] [ 139.978528] which lock already depends on the new lock. [ 139.978528] [ 139.978531] [ 139.978531] the existing dependency chain (in reverse order) is: [ 139.978534] [ 139.978534] -> #3 (&ctx->lock){....}-{2:2}: [ 139.978548] _raw_spin_lock+0x2a/0x40 [ 139.978565] __perf_event_task_sched_out+0x53b/0x18d0 [ 139.978577] __schedule+0xedd/0x2470 [ 139.978588] schedule+0xda/0x1b0 [ 139.978597] exit_to_user_mode_prepare+0x114/0x1a0 [ 139.978616] syscall_exit_to_user_mode+0x19/0x40 [ 139.978634] do_syscall_64+0x48/0x90 [ 139.978647] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 139.978664] [ 139.978664] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 139.978678] _raw_spin_lock_nested+0x30/0x40 [ 139.978692] raw_spin_rq_lock_nested+0x1e/0x30 [ 139.978706] task_fork_fair+0x63/0x4d0 [ 139.978722] sched_cgroup_fork+0x3d0/0x540 [ 139.978739] copy_process+0x3f9e/0x6df0 [ 139.978749] kernel_clone+0xe7/0x890 [ 139.978759] user_mode_thread+0xad/0xf0 [ 139.978769] rest_init+0x24/0x250 [ 139.978785] arch_call_rest_init+0xf/0x14 [ 139.978804] start_kernel+0x4c1/0x4e6 [ 139.978821] secondary_startup_64_no_verify+0xe0/0xeb [ 139.978835] [ 139.978835] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 139.978849] _raw_spin_lock_irqsave+0x39/0x60 [ 139.978863] try_to_wake_up+0xab/0x1920 [ 139.978876] up+0x75/0xb0 [ 139.978887] __up_console_sem+0x6e/0x80 [ 139.978903] console_unlock+0x46a/0x590 [ 139.978918] do_con_write+0xc05/0x1d50 [ 139.978929] con_write+0x21/0x40 [ 139.978938] n_tty_write+0x4d4/0xfe0 [ 139.978951] file_tty_write.constprop.0+0x49c/0x8f0 [ 139.978963] vfs_write+0x9c3/0xd90 [ 139.978982] ksys_write+0x127/0x250 [ 139.978998] do_syscall_64+0x3b/0x90 [ 139.979011] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 139.979027] [ 139.979027] -> #0 ((console_sem).lock){....}-{2:2}: [ 139.979041] __lock_acquire+0x2a02/0x5e70 [ 139.979057] lock_acquire+0x1a2/0x530 [ 139.979072] _raw_spin_lock_irqsave+0x39/0x60 [ 139.979086] down_trylock+0xe/0x70 [ 139.979098] __down_trylock_console_sem+0x3b/0xd0 [ 139.979114] vprintk_emit+0x16b/0x560 [ 139.979130] vprintk+0x84/0xa0 [ 139.979145] _printk+0xba/0xf1 [ 139.979162] report_bug.cold+0x72/0xab [ 139.979174] handle_bug+0x3c/0x70 [ 139.979186] exc_invalid_op+0x14/0x50 [ 139.979199] asm_exc_invalid_op+0x16/0x20 [ 139.979215] group_sched_out.part.0+0x2c7/0x460 [ 139.979225] ctx_sched_out+0x8f1/0xc10 [ 139.979235] __perf_event_task_sched_out+0x6d0/0x18d0 [ 139.979247] __schedule+0xedd/0x2470 [ 139.979256] schedule+0xda/0x1b0 [ 139.979265] exit_to_user_mode_prepare+0x114/0x1a0 [ 139.979284] syscall_exit_to_user_mode+0x19/0x40 [ 139.979300] do_syscall_64+0x48/0x90 [ 139.979312] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 139.979329] [ 139.979329] other info that might help us debug this: [ 139.979329] [ 139.979331] Chain exists of: [ 139.979331] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 139.979331] [ 139.979346] Possible unsafe locking scenario: [ 139.979346] [ 139.979349] CPU0 CPU1 [ 139.979351] ---- ---- [ 139.979354] lock(&ctx->lock); [ 139.979359] lock(&rq->__lock); [ 139.979366] lock(&ctx->lock); [ 139.979372] lock((console_sem).lock); [ 139.979378] [ 139.979378] *** DEADLOCK *** [ 139.979378] [ 139.979380] 2 locks held by syz-executor.0/3875: [ 139.979387] #0: ffff88806cf37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 139.979412] #1: ffff888041b23c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 139.979439] [ 139.979439] stack backtrace: [ 139.979443] CPU: 1 PID: 3875 Comm: syz-executor.0 Not tainted 6.0.0-rc5-next-20220913 #1 [ 139.979456] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 139.979464] Call Trace: [ 139.979467] [ 139.979471] dump_stack_lvl+0x8b/0xb3 [ 139.979486] check_noncircular+0x263/0x2e0 [ 139.979502] ? format_decode+0x26c/0xb50 [ 139.979517] ? print_circular_bug+0x450/0x450 [ 139.979534] ? enable_ptr_key_workfn+0x20/0x20 [ 139.979548] ? format_decode+0x26c/0xb50 [ 139.979563] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 139.979581] __lock_acquire+0x2a02/0x5e70 [ 139.979601] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 139.979623] lock_acquire+0x1a2/0x530 [ 139.979639] ? down_trylock+0xe/0x70 [ 139.979654] ? rcu_read_unlock+0x40/0x40 [ 139.979674] ? vprintk+0x84/0xa0 [ 139.979691] _raw_spin_lock_irqsave+0x39/0x60 [ 139.979706] ? down_trylock+0xe/0x70 [ 139.979719] down_trylock+0xe/0x70 [ 139.979748] ? vprintk+0x84/0xa0 [ 139.979764] __down_trylock_console_sem+0x3b/0xd0 [ 139.979781] vprintk_emit+0x16b/0x560 [ 139.979800] vprintk+0x84/0xa0 [ 139.979817] _printk+0xba/0xf1 [ 139.979833] ? record_print_text.cold+0x16/0x16 [ 139.979854] ? report_bug.cold+0x66/0xab [ 139.979868] ? group_sched_out.part.0+0x2c7/0x460 [ 139.979880] report_bug.cold+0x72/0xab [ 139.979894] handle_bug+0x3c/0x70 [ 139.979907] exc_invalid_op+0x14/0x50 [ 139.979921] asm_exc_invalid_op+0x16/0x20 [ 139.979938] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 139.979951] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 139.979963] RSP: 0018:ffff8880423f7c48 EFLAGS: 00010006 [ 139.979972] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 139.979979] RDX: ffff888041999ac0 RSI: ffffffff81566027 RDI: 0000000000000005 [ 139.979987] RBP: ffff888042278000 R08: 0000000000000005 R09: 0000000000000001 [ 139.979995] R10: 0000000000000000 R11: ffffffff865aa05b R12: ffff888041b23c00 [ 139.980003] R13: ffff88806cf3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 139.980014] ? group_sched_out.part.0+0x2c7/0x460 [ 139.980027] ? group_sched_out.part.0+0x2c7/0x460 [ 139.980039] ctx_sched_out+0x8f1/0xc10 [ 139.980052] __perf_event_task_sched_out+0x6d0/0x18d0 [ 139.980067] ? lock_is_held_type+0xd7/0x130 [ 139.980085] ? __perf_cgroup_move+0x160/0x160 [ 139.980097] ? set_next_entity+0x304/0x550 [ 139.980114] ? update_curr+0x267/0x740 [ 139.980132] ? lock_is_held_type+0xd7/0x130 [ 139.980149] __schedule+0xedd/0x2470 [ 139.980162] ? io_schedule_timeout+0x150/0x150 [ 139.980175] ? rcu_read_lock_sched_held+0x3e/0x80 [ 139.980195] schedule+0xda/0x1b0 [ 139.980206] exit_to_user_mode_prepare+0x114/0x1a0 [ 139.980226] syscall_exit_to_user_mode+0x19/0x40 [ 139.980243] do_syscall_64+0x48/0x90 [ 139.980257] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 139.980274] RIP: 0033:0x7fec168f3b19 [ 139.980283] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 139.980294] RSP: 002b:00007fec13e69218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 139.980304] RAX: 0000000000000001 RBX: 00007fec16a06f68 RCX: 00007fec168f3b19 [ 139.980312] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fec16a06f6c [ 139.980320] RBP: 00007fec16a06f60 R08: 000000000000000e R09: 0000000000000000 [ 139.980327] R10: 0000000000000003 R11: 0000000000000246 R12: 00007fec16a06f6c [ 139.980335] R13: 00007ffc37f6b1bf R14: 00007fec13e69300 R15: 0000000000022000 [ 139.980347] [ 140.036155] WARNING: CPU: 1 PID: 3875 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 140.036841] Modules linked in: [ 140.037084] CPU: 1 PID: 3875 Comm: syz-executor.0 Not tainted 6.0.0-rc5-next-20220913 #1 [ 140.037676] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 140.038510] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 140.038909] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 140.040241] RSP: 0018:ffff8880423f7c48 EFLAGS: 00010006 [ 140.040637] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 140.041165] RDX: ffff888041999ac0 RSI: ffffffff81566027 RDI: 0000000000000005 [ 140.041696] RBP: ffff888042278000 R08: 0000000000000005 R09: 0000000000000001 [ 140.042211] R10: 0000000000000000 R11: ffffffff865aa05b R12: ffff888041b23c00 [ 140.042734] R13: ffff88806cf3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 140.043262] FS: 00007fec13e69700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 140.043861] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 140.044292] CR2: 00007fc4c16ee020 CR3: 000000000d3ca000 CR4: 0000000000350ee0 [ 140.044832] Call Trace: [ 140.045029] [ 140.045206] ctx_sched_out+0x8f1/0xc10 [ 140.045505] __perf_event_task_sched_out+0x6d0/0x18d0 [ 140.045906] ? lock_is_held_type+0xd7/0x130 [ 140.046241] ? __perf_cgroup_move+0x160/0x160 [ 140.046573] ? set_next_entity+0x304/0x550 [ 140.046888] ? update_curr+0x267/0x740 [ 140.047185] ? lock_is_held_type+0xd7/0x130 [ 140.047505] __schedule+0xedd/0x2470 [ 140.047791] ? io_schedule_timeout+0x150/0x150 [ 140.048133] ? rcu_read_lock_sched_held+0x3e/0x80 [ 140.048504] schedule+0xda/0x1b0 [ 140.048766] exit_to_user_mode_prepare+0x114/0x1a0 [ 140.049139] syscall_exit_to_user_mode+0x19/0x40 [ 140.049492] do_syscall_64+0x48/0x90 [ 140.049771] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 140.050157] RIP: 0033:0x7fec168f3b19 [ 140.050436] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 140.051789] RSP: 002b:00007fec13e69218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 140.052350] RAX: 0000000000000001 RBX: 00007fec16a06f68 RCX: 00007fec168f3b19 [ 140.052878] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fec16a06f6c [ 140.053411] RBP: 00007fec16a06f60 R08: 000000000000000e R09: 0000000000000000 [ 140.053939] R10: 0000000000000003 R11: 0000000000000246 R12: 00007fec16a06f6c [ 140.054462] R13: 00007ffc37f6b1bf R14: 00007fec13e69300 R15: 0000000000022000 [ 140.055001] [ 140.055183] irq event stamp: 3010 [ 140.055440] hardirqs last enabled at (3009): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 140.056157] hardirqs last disabled at (3010): [] __schedule+0x1225/0x2470 [ 140.056777] softirqs last enabled at (2436): [] __irq_exit_rcu+0x11b/0x180 [ 140.057420] softirqs last disabled at (2325): [] __irq_exit_rcu+0x11b/0x180 [ 140.058077] ---[ end trace 0000000000000000 ]--- [ 140.261322] loop0: detected capacity change from 0 to 5 16:56:42 executing program 0: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 16:56:42 executing program 7: futex(&(0x7f0000007c00), 0xd, 0x0, &(0x7f0000007c40)={0x0, 0x989680}, 0x0, 0x0) 16:56:42 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2, &(0x7f00000000c0)={0x9, {{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x0, @private}}}, 0x108) sendmsg$inet(r0, &(0x7f0000000500)={&(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000000440)=[{&(0x7f0000000040)="3672faef82a2a711f86b3b9c0c66409e", 0x10}, {&(0x7f0000000200)="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", 0xfa}, {&(0x7f0000000300)="8fcc564dba6ffccef739d40812ccdce22ff72db806a11fa734052438d2c65a459a7f972355fe942275c7ede4d039c6e449a8295b", 0x34}, {&(0x7f0000000340)="4e5f2fc0df50fe9194bc221965c40657f01a09c20edb47628c0ff437fd7c9ea0ea2a12b59477a79e91b2825784ffc5526d4b6458370c5afa07d76ae79fc1a7ed38603221fe23aba660f0246beda3b8a809d06dee60caeeb5dd4007fc9dd40fe5cbe48385621c11ba93a3a774d7939f497f311255cf48c30efc4571465fbbf977691abef62b27193996c416bc3d2f44e035e0da934a1e56410bdf018588002b8e6c93acdab74abb436ad4926bcaab36042ba7ddc19727bd8bf4b8cd63796e04e0667e99189dc36e7b54249c490b36d1bc978c65ffb70972", 0xd7}], 0x4, &(0x7f0000000480)}, 0x1) sendmsg$inet(r0, &(0x7f00000007c0)={&(0x7f0000000080)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000740)=[{&(0x7f00000004c0)='TQ', 0x2}], 0x1}, 0x0) syz_open_dev$vcsu(&(0x7f00000017c0), 0x408e6fc8, 0x42001) 16:56:42 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @any, 0x0, 0x2}, 0xe) listen(r0, 0x0) 16:56:42 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) read(r0, 0x0, 0x0) 16:56:42 executing program 4: tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1f) 16:56:42 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x3, 0x80, 0x2, 0x0, 0x81, 0x2, 0x0, 0x0, 0x100a1, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x4, 0x2}, 0x8, 0x4, 0xffff, 0x4, 0x40, 0x401, 0xe000, 0x0, 0x9, 0x0, 0x7}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000011c0)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x7, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x118) fallocate(r3, 0x0, 0x0, 0x87ffffc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r2) 16:56:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001180)={0x130, r1, 0x2f581cf9885e0c23, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_IE={0x108, 0x2a, [@perr={0x84, 0x102, {0x0, 0x10, [@not_ext, @ext, @ext={{}, @device_b, 0x0, @device_b}, @ext={{}, @broadcast}, @ext={{}, @device_b, 0x0, @device_b}, @ext={{}, @broadcast}, @not_ext={{}, @device_b}, @not_ext={{}, @broadcast}, @ext={{}, @device_a, 0x0, @broadcast}, @not_ext, @ext={{}, @device_a, 0x0, @broadcast}, @not_ext, @ext={{}, @device_b}, @not_ext, @not_ext={{}, @broadcast}, @not_ext={{}, @broadcast}]}}]}]}, 0x130}}, 0x0) 16:56:42 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 142.047424] loop0: detected capacity change from 0 to 5 [ 142.070328] hrtimer: interrupt took 24346 ns [ 142.088215] loop4: detected capacity change from 0 to 5 16:56:42 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 16:56:42 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @any, 0x0, 0x2}, 0xe) listen(r0, 0x0) 16:56:42 executing program 2: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 16:56:42 executing program 7: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 142.114839] loop5: detected capacity change from 0 to 5 16:56:42 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x3, 0x80, 0x2, 0x0, 0x81, 0x2, 0x0, 0x0, 0x100a1, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x4, 0x2}, 0x8, 0x4, 0xffff, 0x4, 0x40, 0x401, 0xe000, 0x0, 0x9, 0x0, 0x7}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000011c0)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x7, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x118) fallocate(r3, 0x0, 0x0, 0x87ffffc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r2) 16:56:42 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 142.163038] loop7: detected capacity change from 0 to 5 16:56:43 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 142.200786] loop2: detected capacity change from 0 to 5 [ 142.219248] loop4: detected capacity change from 0 to 5 [ 142.233086] loop1: detected capacity change from 0 to 5 16:56:43 executing program 0: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 16:56:43 executing program 2: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 16:56:43 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 142.479660] loop1: detected capacity change from 0 to 5 [ 142.481222] loop7: detected capacity change from 0 to 5 16:56:43 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x3, 0x80, 0x2, 0x0, 0x81, 0x2, 0x0, 0x0, 0x100a1, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x4, 0x2}, 0x8, 0x4, 0xffff, 0x4, 0x40, 0x401, 0xe000, 0x0, 0x9, 0x0, 0x7}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000011c0)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x7, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x118) fallocate(r3, 0x0, 0x0, 0x87ffffc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r2) 16:56:43 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 16:56:43 executing program 7: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 16:56:43 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @any, 0x0, 0x2}, 0xe) listen(r0, 0x0) 16:56:43 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 142.492255] loop4: detected capacity change from 0 to 5 [ 142.493434] loop5: detected capacity change from 0 to 5 [ 142.504522] loop0: detected capacity change from 0 to 5 [ 142.528883] loop2: detected capacity change from 0 to 5 16:56:43 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 16:56:43 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x3, 0x80, 0x2, 0x0, 0x81, 0x2, 0x0, 0x0, 0x100a1, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x4, 0x2}, 0x8, 0x4, 0xffff, 0x4, 0x40, 0x401, 0xe000, 0x0, 0x9, 0x0, 0x7}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) preadv(r1, &(0x7f00000011c0)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x7, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x118) fallocate(r3, 0x0, 0x0, 0x87ffffc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r2) 16:56:43 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @any, 0x0, 0x2}, 0xe) listen(r0, 0x0) [ 142.608677] loop5: detected capacity change from 0 to 5 16:56:43 executing program 7: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 142.671316] loop7: detected capacity change from 0 to 5 16:56:43 executing program 0: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 142.792430] loop0: detected capacity change from 0 to 5 16:56:43 executing program 3: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 16:56:43 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup2(r0, r1) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r2}}) 16:56:43 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 16:56:43 executing program 2: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 142.812569] loop1: detected capacity change from 0 to 5 [ 142.824023] loop2: detected capacity change from 0 to 5 [ 142.829046] loop3: detected capacity change from 0 to 5 16:56:43 executing program 4: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syncfs(0xffffffffffffffff) r1 = gettid() migrate_pages(r1, 0x9, &(0x7f0000000000)=0x23, &(0x7f0000000180)=0x10001) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0), 0x40102, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r2, 0x941c, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000002580)='./file1\x00', 0x141042, 0x20) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/loop6', 0x0, 0x10) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000001d0069ff000000000000000007"], 0x1c}], 0x1}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r3) sendmsg$NL80211_CMD_FLUSH_PMKSA(r5, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="000125bd70040000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0x4008040}, 0x4008090) pwritev(r3, &(0x7f0000000880)=[{&(0x7f0000000300)="c21f5f59fcffb00e3f91241286314fe21fa8f5f5338647c5f7e542d05bf650bd29d797c6d6e9a9a65ede89b25d045d75f500c06eb7abc2036de1c85b39f2de0ed0d0d33472fa9357517ca3e0e482fb697718a2e23a26a2a8c560312a203df6087872597f46b8380969b729c75583bb7e1f9cc883f6c66d6e6d34c11a5a8312671b3bb5fd372f3fc80c5ea8af255a02d926079cf519f45c6ab5c79000927f7fbdc0273099bfb8c6cb8c3c9d301c992594cfefa4c879ceacce65e1841304f4b5264bda55", 0xc3}, {0x0}, {&(0x7f0000000600)}, {0x0}, {&(0x7f0000000780)="e300e3d0f16d85f4ea9ae5cc9f0af6180c5f6485d3a54caba91debe6bb131c805efba8d46929051c2741a3582301d9b4fc1a730902eec16fd064ddd5b9f4bb5be7ae1cf0da69dd174f9f9bcd782e1f57cc3a9b1a30aaab2b2fe512d50ba5804892fd79b83ce8f59db82b90e553f2d6c4fc1dba589b17386e3060565a1f2f2871e7f9d46abcabfc6b8e0e6442bf6a3fe00249a6ad2da9a8ff05910a52a6ca0697c3a6ccad0d4e61d859b20ee68224d5fbdb966a7f93d871e4bf1fd757c390be2ef54d4e0000", 0xc5}], 0x5, 0xfd, 0x0) clone3(&(0x7f00000023c0)={0x4000000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x80000000}, 0x0, 0x0, &(0x7f0000002340)=""/10, &(0x7f0000002380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, {r4}}, 0x58) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) 16:56:43 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syncfs(0xffffffffffffffff) r0 = gettid() migrate_pages(r0, 0x9, &(0x7f0000000000)=0x23, &(0x7f0000000180)=0x10001) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0), 0x40102, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r1, 0x941c, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000002580)='./file1\x00', 0x141042, 0x20) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/loop6', 0x0, 0x10) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r2) [ 142.936129] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=4046 comm=syz-executor.4 [ 142.992294] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=4050 comm=syz-executor.4 16:56:43 executing program 7: r0 = syz_io_uring_setup(0x5823, &(0x7f0000000440), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000004c0), &(0x7f0000000500)) r1 = memfd_create(&(0x7f0000000040)='/dev/vcsa\x00', 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x401a012, r1, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x11, &(0x7f0000000540)=[0xffffffffffffffff], 0x4000000000000071) 16:56:43 executing program 0: io_setup(0x5, &(0x7f0000000000)=0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(r0, 0x2, &(0x7f0000000340)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0, 0x0, 0xffffffffffffffff}]) 16:56:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) mount_setattr(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)={0x0, 0x0, 0x20000}, 0x20) 16:56:43 executing program 0: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x20) 16:56:43 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x31, &(0x7f00000000c0)={@remote}, 0x20) 16:56:43 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syncfs(0xffffffffffffffff) r0 = gettid() migrate_pages(r0, 0x9, &(0x7f0000000000)=0x23, &(0x7f0000000180)=0x10001) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0), 0x40102, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r1, 0x941c, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000002580)='./file1\x00', 0x141042, 0x20) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/loop6', 0x0, 0x10) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r2) 16:56:43 executing program 4: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syncfs(0xffffffffffffffff) r1 = gettid() migrate_pages(r1, 0x9, &(0x7f0000000000)=0x23, &(0x7f0000000180)=0x10001) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0), 0x40102, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r2, 0x941c, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000002580)='./file1\x00', 0x141042, 0x20) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/loop6', 0x0, 0x10) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000001d0069ff000000000000000007"], 0x1c}], 0x1}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r3) sendmsg$NL80211_CMD_FLUSH_PMKSA(r5, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="000125bd70040000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0x4008040}, 0x4008090) pwritev(r3, &(0x7f0000000880)=[{&(0x7f0000000300)="c21f5f59fcffb00e3f91241286314fe21fa8f5f5338647c5f7e542d05bf650bd29d797c6d6e9a9a65ede89b25d045d75f500c06eb7abc2036de1c85b39f2de0ed0d0d33472fa9357517ca3e0e482fb697718a2e23a26a2a8c560312a203df6087872597f46b8380969b729c75583bb7e1f9cc883f6c66d6e6d34c11a5a8312671b3bb5fd372f3fc80c5ea8af255a02d926079cf519f45c6ab5c79000927f7fbdc0273099bfb8c6cb8c3c9d301c992594cfefa4c879ceacce65e1841304f4b5264bda55", 0xc3}, {0x0}, {&(0x7f0000000600)}, {0x0}, {&(0x7f0000000780)="e300e3d0f16d85f4ea9ae5cc9f0af6180c5f6485d3a54caba91debe6bb131c805efba8d46929051c2741a3582301d9b4fc1a730902eec16fd064ddd5b9f4bb5be7ae1cf0da69dd174f9f9bcd782e1f57cc3a9b1a30aaab2b2fe512d50ba5804892fd79b83ce8f59db82b90e553f2d6c4fc1dba589b17386e3060565a1f2f2871e7f9d46abcabfc6b8e0e6442bf6a3fe00249a6ad2da9a8ff05910a52a6ca0697c3a6ccad0d4e61d859b20ee68224d5fbdb966a7f93d871e4bf1fd757c390be2ef54d4e0000", 0xc5}], 0x5, 0xfd, 0x0) clone3(&(0x7f00000023c0)={0x4000000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x80000000}, 0x0, 0x0, &(0x7f0000002340)=""/10, &(0x7f0000002380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, {r4}}, 0x58) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) [ 143.415435] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=4073 comm=syz-executor.4 [ 143.763855] loop3: detected capacity change from 0 to 5 16:56:44 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syncfs(0xffffffffffffffff) r1 = gettid() migrate_pages(r1, 0x9, &(0x7f0000000000)=0x23, &(0x7f0000000180)=0x10001) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0), 0x40102, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r2, 0x941c, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000002580)='./file1\x00', 0x141042, 0x20) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/loop6', 0x0, 0x10) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000001d0069ff000000000000000007"], 0x1c}], 0x1}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r3) sendmsg$NL80211_CMD_FLUSH_PMKSA(r5, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="000125bd70040000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0x4008040}, 0x4008090) pwritev(r3, &(0x7f0000000880)=[{&(0x7f0000000300)="c21f5f59fcffb00e3f91241286314fe21fa8f5f5338647c5f7e542d05bf650bd29d797c6d6e9a9a65ede89b25d045d75f500c06eb7abc2036de1c85b39f2de0ed0d0d33472fa9357517ca3e0e482fb697718a2e23a26a2a8c560312a203df6087872597f46b8380969b729c75583bb7e1f9cc883f6c66d6e6d34c11a5a8312671b3bb5fd372f3fc80c5ea8af255a02d926079cf519f45c6ab5c79000927f7fbdc0273099bfb8c6cb8c3c9d301c992594cfefa4c879ceacce65e1841304f4b5264bda55", 0xc3}, {0x0}, {&(0x7f0000000600)}, {0x0}, {&(0x7f0000000780)="e300e3d0f16d85f4ea9ae5cc9f0af6180c5f6485d3a54caba91debe6bb131c805efba8d46929051c2741a3582301d9b4fc1a730902eec16fd064ddd5b9f4bb5be7ae1cf0da69dd174f9f9bcd782e1f57cc3a9b1a30aaab2b2fe512d50ba5804892fd79b83ce8f59db82b90e553f2d6c4fc1dba589b17386e3060565a1f2f2871e7f9d46abcabfc6b8e0e6442bf6a3fe00249a6ad2da9a8ff05910a52a6ca0697c3a6ccad0d4e61d859b20ee68224d5fbdb966a7f93d871e4bf1fd757c390be2ef54d4e0000", 0xc5}], 0x5, 0xfd, 0x0) clone3(&(0x7f00000023c0)={0x4000000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x80000000}, 0x0, 0x0, &(0x7f0000002340)=""/10, &(0x7f0000002380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, {r4}}, 0x58) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) 16:56:44 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup2(r0, r1) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r2}}) 16:56:44 executing program 3: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 16:56:44 executing program 4: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syncfs(0xffffffffffffffff) r1 = gettid() migrate_pages(r1, 0x9, &(0x7f0000000000)=0x23, &(0x7f0000000180)=0x10001) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0), 0x40102, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r2, 0x941c, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000002580)='./file1\x00', 0x141042, 0x20) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/loop6', 0x0, 0x10) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000001d0069ff000000000000000007"], 0x1c}], 0x1}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r3) sendmsg$NL80211_CMD_FLUSH_PMKSA(r5, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="000125bd70040000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0x4008040}, 0x4008090) pwritev(r3, &(0x7f0000000880)=[{&(0x7f0000000300)="c21f5f59fcffb00e3f91241286314fe21fa8f5f5338647c5f7e542d05bf650bd29d797c6d6e9a9a65ede89b25d045d75f500c06eb7abc2036de1c85b39f2de0ed0d0d33472fa9357517ca3e0e482fb697718a2e23a26a2a8c560312a203df6087872597f46b8380969b729c75583bb7e1f9cc883f6c66d6e6d34c11a5a8312671b3bb5fd372f3fc80c5ea8af255a02d926079cf519f45c6ab5c79000927f7fbdc0273099bfb8c6cb8c3c9d301c992594cfefa4c879ceacce65e1841304f4b5264bda55", 0xc3}, {0x0}, {&(0x7f0000000600)}, {0x0}, {&(0x7f0000000780)="e300e3d0f16d85f4ea9ae5cc9f0af6180c5f6485d3a54caba91debe6bb131c805efba8d46929051c2741a3582301d9b4fc1a730902eec16fd064ddd5b9f4bb5be7ae1cf0da69dd174f9f9bcd782e1f57cc3a9b1a30aaab2b2fe512d50ba5804892fd79b83ce8f59db82b90e553f2d6c4fc1dba589b17386e3060565a1f2f2871e7f9d46abcabfc6b8e0e6442bf6a3fe00249a6ad2da9a8ff05910a52a6ca0697c3a6ccad0d4e61d859b20ee68224d5fbdb966a7f93d871e4bf1fd757c390be2ef54d4e0000", 0xc5}], 0x5, 0xfd, 0x0) clone3(&(0x7f00000023c0)={0x4000000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x80000000}, 0x0, 0x0, &(0x7f0000002340)=""/10, &(0x7f0000002380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, {r4}}, 0x58) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) 16:56:44 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syncfs(0xffffffffffffffff) r0 = gettid() migrate_pages(r0, 0x9, &(0x7f0000000000)=0x23, &(0x7f0000000180)=0x10001) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0), 0x40102, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r1, 0x941c, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000002580)='./file1\x00', 0x141042, 0x20) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/loop6', 0x0, 0x10) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r2) 16:56:44 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) mount_setattr(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)={0x0, 0x0, 0x20000}, 0x20) 16:56:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) mount_setattr(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)={0x0, 0x0, 0x20000}, 0x20) 16:56:44 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup2(r0, r1) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r2}}) 16:56:44 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syncfs(0xffffffffffffffff) r0 = gettid() migrate_pages(r0, 0x9, &(0x7f0000000000)=0x23, &(0x7f0000000180)=0x10001) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0), 0x40102, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r1, 0x941c, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000002580)='./file1\x00', 0x141042, 0x20) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/loop6', 0x0, 0x10) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r2) [ 143.849925] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=4097 comm=syz-executor.7 [ 143.879535] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=4092 comm=syz-executor.4 16:56:45 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) mount_setattr(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)={0x0, 0x0, 0x20000}, 0x20) 16:56:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) mount_setattr(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)={0x0, 0x0, 0x20000}, 0x20) 16:56:45 executing program 4: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syncfs(0xffffffffffffffff) r1 = gettid() migrate_pages(r1, 0x9, &(0x7f0000000000)=0x23, &(0x7f0000000180)=0x10001) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0), 0x40102, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r2, 0x941c, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000002580)='./file1\x00', 0x141042, 0x20) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/loop6', 0x0, 0x10) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000001d0069ff000000000000000007"], 0x1c}], 0x1}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r3) sendmsg$NL80211_CMD_FLUSH_PMKSA(r5, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="000125bd70040000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0x4008040}, 0x4008090) pwritev(r3, &(0x7f0000000880)=[{&(0x7f0000000300)="c21f5f59fcffb00e3f91241286314fe21fa8f5f5338647c5f7e542d05bf650bd29d797c6d6e9a9a65ede89b25d045d75f500c06eb7abc2036de1c85b39f2de0ed0d0d33472fa9357517ca3e0e482fb697718a2e23a26a2a8c560312a203df6087872597f46b8380969b729c75583bb7e1f9cc883f6c66d6e6d34c11a5a8312671b3bb5fd372f3fc80c5ea8af255a02d926079cf519f45c6ab5c79000927f7fbdc0273099bfb8c6cb8c3c9d301c992594cfefa4c879ceacce65e1841304f4b5264bda55", 0xc3}, {0x0}, {&(0x7f0000000600)}, {0x0}, {&(0x7f0000000780)="e300e3d0f16d85f4ea9ae5cc9f0af6180c5f6485d3a54caba91debe6bb131c805efba8d46929051c2741a3582301d9b4fc1a730902eec16fd064ddd5b9f4bb5be7ae1cf0da69dd174f9f9bcd782e1f57cc3a9b1a30aaab2b2fe512d50ba5804892fd79b83ce8f59db82b90e553f2d6c4fc1dba589b17386e3060565a1f2f2871e7f9d46abcabfc6b8e0e6442bf6a3fe00249a6ad2da9a8ff05910a52a6ca0697c3a6ccad0d4e61d859b20ee68224d5fbdb966a7f93d871e4bf1fd757c390be2ef54d4e0000", 0xc5}], 0x5, 0xfd, 0x0) clone3(&(0x7f00000023c0)={0x4000000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x80000000}, 0x0, 0x0, &(0x7f0000002340)=""/10, &(0x7f0000002380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, {r4}}, 0x58) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) 16:56:45 executing program 5: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syncfs(0xffffffffffffffff) r1 = gettid() migrate_pages(r1, 0x9, &(0x7f0000000000)=0x23, &(0x7f0000000180)=0x10001) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0), 0x40102, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r2, 0x941c, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000002580)='./file1\x00', 0x141042, 0x20) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/loop6', 0x0, 0x10) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000001d0069ff000000000000000007"], 0x1c}], 0x1}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r3) sendmsg$NL80211_CMD_FLUSH_PMKSA(r5, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="000125bd70040000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0x4008040}, 0x4008090) pwritev(r3, &(0x7f0000000880)=[{&(0x7f0000000300)="c21f5f59fcffb00e3f91241286314fe21fa8f5f5338647c5f7e542d05bf650bd29d797c6d6e9a9a65ede89b25d045d75f500c06eb7abc2036de1c85b39f2de0ed0d0d33472fa9357517ca3e0e482fb697718a2e23a26a2a8c560312a203df6087872597f46b8380969b729c75583bb7e1f9cc883f6c66d6e6d34c11a5a8312671b3bb5fd372f3fc80c5ea8af255a02d926079cf519f45c6ab5c79000927f7fbdc0273099bfb8c6cb8c3c9d301c992594cfefa4c879ceacce65e1841304f4b5264bda55", 0xc3}, {0x0}, {&(0x7f0000000600)}, {0x0}, {&(0x7f0000000780)="e300e3d0f16d85f4ea9ae5cc9f0af6180c5f6485d3a54caba91debe6bb131c805efba8d46929051c2741a3582301d9b4fc1a730902eec16fd064ddd5b9f4bb5be7ae1cf0da69dd174f9f9bcd782e1f57cc3a9b1a30aaab2b2fe512d50ba5804892fd79b83ce8f59db82b90e553f2d6c4fc1dba589b17386e3060565a1f2f2871e7f9d46abcabfc6b8e0e6442bf6a3fe00249a6ad2da9a8ff05910a52a6ca0697c3a6ccad0d4e61d859b20ee68224d5fbdb966a7f93d871e4bf1fd757c390be2ef54d4e0000", 0xc5}], 0x5, 0xfd, 0x0) clone3(&(0x7f00000023c0)={0x4000000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x80000000}, 0x0, 0x0, &(0x7f0000002340)=""/10, &(0x7f0000002380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, {r4}}, 0x58) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) 16:56:45 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syncfs(0xffffffffffffffff) r1 = gettid() migrate_pages(r1, 0x9, &(0x7f0000000000)=0x23, &(0x7f0000000180)=0x10001) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0), 0x40102, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r2, 0x941c, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000002580)='./file1\x00', 0x141042, 0x20) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/loop6', 0x0, 0x10) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000001d0069ff000000000000000007"], 0x1c}], 0x1}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r3) sendmsg$NL80211_CMD_FLUSH_PMKSA(r5, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="000125bd70040000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0x4008040}, 0x4008090) pwritev(r3, &(0x7f0000000880)=[{&(0x7f0000000300)="c21f5f59fcffb00e3f91241286314fe21fa8f5f5338647c5f7e542d05bf650bd29d797c6d6e9a9a65ede89b25d045d75f500c06eb7abc2036de1c85b39f2de0ed0d0d33472fa9357517ca3e0e482fb697718a2e23a26a2a8c560312a203df6087872597f46b8380969b729c75583bb7e1f9cc883f6c66d6e6d34c11a5a8312671b3bb5fd372f3fc80c5ea8af255a02d926079cf519f45c6ab5c79000927f7fbdc0273099bfb8c6cb8c3c9d301c992594cfefa4c879ceacce65e1841304f4b5264bda55", 0xc3}, {0x0}, {&(0x7f0000000600)}, {0x0}, {&(0x7f0000000780)="e300e3d0f16d85f4ea9ae5cc9f0af6180c5f6485d3a54caba91debe6bb131c805efba8d46929051c2741a3582301d9b4fc1a730902eec16fd064ddd5b9f4bb5be7ae1cf0da69dd174f9f9bcd782e1f57cc3a9b1a30aaab2b2fe512d50ba5804892fd79b83ce8f59db82b90e553f2d6c4fc1dba589b17386e3060565a1f2f2871e7f9d46abcabfc6b8e0e6442bf6a3fe00249a6ad2da9a8ff05910a52a6ca0697c3a6ccad0d4e61d859b20ee68224d5fbdb966a7f93d871e4bf1fd757c390be2ef54d4e0000", 0xc5}], 0x5, 0xfd, 0x0) clone3(&(0x7f00000023c0)={0x4000000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x80000000}, 0x0, 0x0, &(0x7f0000002340)=""/10, &(0x7f0000002380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, {r4}}, 0x58) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) 16:56:45 executing program 3: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 16:56:45 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup2(r0, r1) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r2}}) 16:56:45 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup2(r0, r1) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r2}}) [ 144.701646] loop3: detected capacity change from 0 to 5 16:56:45 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) mount_setattr(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)={0x0, 0x0, 0x20000}, 0x20) 16:56:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) mount_setattr(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)={0x0, 0x0, 0x20000}, 0x20) 16:56:45 executing program 0: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syncfs(0xffffffffffffffff) r1 = gettid() migrate_pages(r1, 0x9, &(0x7f0000000000)=0x23, &(0x7f0000000180)=0x10001) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0), 0x40102, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r2, 0x941c, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000002580)='./file1\x00', 0x141042, 0x20) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/loop6', 0x0, 0x10) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000001d0069ff000000000000000007"], 0x1c}], 0x1}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r3) sendmsg$NL80211_CMD_FLUSH_PMKSA(r5, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="000125bd70040000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0x4008040}, 0x4008090) pwritev(r3, &(0x7f0000000880)=[{&(0x7f0000000300)="c21f5f59fcffb00e3f91241286314fe21fa8f5f5338647c5f7e542d05bf650bd29d797c6d6e9a9a65ede89b25d045d75f500c06eb7abc2036de1c85b39f2de0ed0d0d33472fa9357517ca3e0e482fb697718a2e23a26a2a8c560312a203df6087872597f46b8380969b729c75583bb7e1f9cc883f6c66d6e6d34c11a5a8312671b3bb5fd372f3fc80c5ea8af255a02d926079cf519f45c6ab5c79000927f7fbdc0273099bfb8c6cb8c3c9d301c992594cfefa4c879ceacce65e1841304f4b5264bda55", 0xc3}, {0x0}, {&(0x7f0000000600)}, {0x0}, {&(0x7f0000000780)="e300e3d0f16d85f4ea9ae5cc9f0af6180c5f6485d3a54caba91debe6bb131c805efba8d46929051c2741a3582301d9b4fc1a730902eec16fd064ddd5b9f4bb5be7ae1cf0da69dd174f9f9bcd782e1f57cc3a9b1a30aaab2b2fe512d50ba5804892fd79b83ce8f59db82b90e553f2d6c4fc1dba589b17386e3060565a1f2f2871e7f9d46abcabfc6b8e0e6442bf6a3fe00249a6ad2da9a8ff05910a52a6ca0697c3a6ccad0d4e61d859b20ee68224d5fbdb966a7f93d871e4bf1fd757c390be2ef54d4e0000", 0xc5}], 0x5, 0xfd, 0x0) clone3(&(0x7f00000023c0)={0x4000000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x80000000}, 0x0, 0x0, &(0x7f0000002340)=""/10, &(0x7f0000002380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, {r4}}, 0x58) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) 16:56:46 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) read$rfkill(r0, &(0x7f0000000900), 0x8) 16:56:46 executing program 1: syz_emit_ethernet(0x4e, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ddc00", 0x18, 0x3a, 0xff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @loopback={0xff00000000000000}}}}}}}, 0x0) 16:56:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)={0x28, 0x28, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x2}, @typed={0x8, 0x84, 0x0, 0x0, @pid}, @typed={0x8, 0x0, 0x0, 0x0, @pid}]}, 0x28}], 0x1}, 0x0) [ 145.407900] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 16:56:46 executing program 1: syz_emit_ethernet(0x4e, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ddc00", 0x18, 0x3a, 0xff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @loopback={0xff00000000000000}}}}}}}, 0x0) [ 145.628146] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=4116 comm=syz-executor.5 [ 145.637307] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=4127 comm=syz-executor.0 [ 145.709860] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=4115 comm=syz-executor.7 [ 146.100982] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=4114 comm=syz-executor.4 16:56:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000540)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') utimes(0x0, &(0x7f0000000280)={{}, {0x0, 0xea60}}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x101342, 0x0) write$binfmt_aout(r0, &(0x7f0000000c40)=ANY=[], 0x820) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x260100, 0x4) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000180)='\x00', &(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x8, 0x3) syz_io_uring_setup(0x1, &(0x7f0000000080), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_CONNECT={0x10, 0xca9e09d5bb4a44c, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f00000002c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x3, 0x0, 0x4d1241c2, 0x0, 0x0, 0x0, 0x0, 0x1, {0x1}}, 0x400) sendfile(r0, r1, 0x0, 0x7fffffff) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x100, 0x6) 16:56:46 executing program 1: syz_emit_ethernet(0x4e, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ddc00", 0x18, 0x3a, 0xff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @loopback={0xff00000000000000}}}}}}}, 0x0) 16:56:46 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup2(r0, r1) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r2}}) 16:56:46 executing program 5: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syncfs(0xffffffffffffffff) r1 = gettid() migrate_pages(r1, 0x9, &(0x7f0000000000)=0x23, &(0x7f0000000180)=0x10001) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0), 0x40102, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r2, 0x941c, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000002580)='./file1\x00', 0x141042, 0x20) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/loop6', 0x0, 0x10) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000001d0069ff000000000000000007"], 0x1c}], 0x1}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r3) sendmsg$NL80211_CMD_FLUSH_PMKSA(r5, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="000125bd70040000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0x4008040}, 0x4008090) pwritev(r3, &(0x7f0000000880)=[{&(0x7f0000000300)="c21f5f59fcffb00e3f91241286314fe21fa8f5f5338647c5f7e542d05bf650bd29d797c6d6e9a9a65ede89b25d045d75f500c06eb7abc2036de1c85b39f2de0ed0d0d33472fa9357517ca3e0e482fb697718a2e23a26a2a8c560312a203df6087872597f46b8380969b729c75583bb7e1f9cc883f6c66d6e6d34c11a5a8312671b3bb5fd372f3fc80c5ea8af255a02d926079cf519f45c6ab5c79000927f7fbdc0273099bfb8c6cb8c3c9d301c992594cfefa4c879ceacce65e1841304f4b5264bda55", 0xc3}, {0x0}, {&(0x7f0000000600)}, {0x0}, {&(0x7f0000000780)="e300e3d0f16d85f4ea9ae5cc9f0af6180c5f6485d3a54caba91debe6bb131c805efba8d46929051c2741a3582301d9b4fc1a730902eec16fd064ddd5b9f4bb5be7ae1cf0da69dd174f9f9bcd782e1f57cc3a9b1a30aaab2b2fe512d50ba5804892fd79b83ce8f59db82b90e553f2d6c4fc1dba589b17386e3060565a1f2f2871e7f9d46abcabfc6b8e0e6442bf6a3fe00249a6ad2da9a8ff05910a52a6ca0697c3a6ccad0d4e61d859b20ee68224d5fbdb966a7f93d871e4bf1fd757c390be2ef54d4e0000", 0xc5}], 0x5, 0xfd, 0x0) clone3(&(0x7f00000023c0)={0x4000000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x80000000}, 0x0, 0x0, &(0x7f0000002340)=""/10, &(0x7f0000002380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, {r4}}, 0x58) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) 16:56:46 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup2(r0, r1) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r2}}) 16:56:46 executing program 0: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syncfs(0xffffffffffffffff) r1 = gettid() migrate_pages(r1, 0x9, &(0x7f0000000000)=0x23, &(0x7f0000000180)=0x10001) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0), 0x40102, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r2, 0x941c, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000002580)='./file1\x00', 0x141042, 0x20) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/loop6', 0x0, 0x10) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000001d0069ff000000000000000007"], 0x1c}], 0x1}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r3) sendmsg$NL80211_CMD_FLUSH_PMKSA(r5, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="000125bd70040000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0x4008040}, 0x4008090) pwritev(r3, &(0x7f0000000880)=[{&(0x7f0000000300)="c21f5f59fcffb00e3f91241286314fe21fa8f5f5338647c5f7e542d05bf650bd29d797c6d6e9a9a65ede89b25d045d75f500c06eb7abc2036de1c85b39f2de0ed0d0d33472fa9357517ca3e0e482fb697718a2e23a26a2a8c560312a203df6087872597f46b8380969b729c75583bb7e1f9cc883f6c66d6e6d34c11a5a8312671b3bb5fd372f3fc80c5ea8af255a02d926079cf519f45c6ab5c79000927f7fbdc0273099bfb8c6cb8c3c9d301c992594cfefa4c879ceacce65e1841304f4b5264bda55", 0xc3}, {0x0}, {&(0x7f0000000600)}, {0x0}, {&(0x7f0000000780)="e300e3d0f16d85f4ea9ae5cc9f0af6180c5f6485d3a54caba91debe6bb131c805efba8d46929051c2741a3582301d9b4fc1a730902eec16fd064ddd5b9f4bb5be7ae1cf0da69dd174f9f9bcd782e1f57cc3a9b1a30aaab2b2fe512d50ba5804892fd79b83ce8f59db82b90e553f2d6c4fc1dba589b17386e3060565a1f2f2871e7f9d46abcabfc6b8e0e6442bf6a3fe00249a6ad2da9a8ff05910a52a6ca0697c3a6ccad0d4e61d859b20ee68224d5fbdb966a7f93d871e4bf1fd757c390be2ef54d4e0000", 0xc5}], 0x5, 0xfd, 0x0) clone3(&(0x7f00000023c0)={0x4000000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x80000000}, 0x0, 0x0, &(0x7f0000002340)=""/10, &(0x7f0000002380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, {r4}}, 0x58) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) 16:56:46 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syncfs(0xffffffffffffffff) r1 = gettid() migrate_pages(r1, 0x9, &(0x7f0000000000)=0x23, &(0x7f0000000180)=0x10001) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0), 0x40102, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r2, 0x941c, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000002580)='./file1\x00', 0x141042, 0x20) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/loop6', 0x0, 0x10) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000001d0069ff000000000000000007"], 0x1c}], 0x1}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r3) sendmsg$NL80211_CMD_FLUSH_PMKSA(r5, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="000125bd70040000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0x4008040}, 0x4008090) pwritev(r3, &(0x7f0000000880)=[{&(0x7f0000000300)="c21f5f59fcffb00e3f91241286314fe21fa8f5f5338647c5f7e542d05bf650bd29d797c6d6e9a9a65ede89b25d045d75f500c06eb7abc2036de1c85b39f2de0ed0d0d33472fa9357517ca3e0e482fb697718a2e23a26a2a8c560312a203df6087872597f46b8380969b729c75583bb7e1f9cc883f6c66d6e6d34c11a5a8312671b3bb5fd372f3fc80c5ea8af255a02d926079cf519f45c6ab5c79000927f7fbdc0273099bfb8c6cb8c3c9d301c992594cfefa4c879ceacce65e1841304f4b5264bda55", 0xc3}, {0x0}, {&(0x7f0000000600)}, {0x0}, {&(0x7f0000000780)="e300e3d0f16d85f4ea9ae5cc9f0af6180c5f6485d3a54caba91debe6bb131c805efba8d46929051c2741a3582301d9b4fc1a730902eec16fd064ddd5b9f4bb5be7ae1cf0da69dd174f9f9bcd782e1f57cc3a9b1a30aaab2b2fe512d50ba5804892fd79b83ce8f59db82b90e553f2d6c4fc1dba589b17386e3060565a1f2f2871e7f9d46abcabfc6b8e0e6442bf6a3fe00249a6ad2da9a8ff05910a52a6ca0697c3a6ccad0d4e61d859b20ee68224d5fbdb966a7f93d871e4bf1fd757c390be2ef54d4e0000", 0xc5}], 0x5, 0xfd, 0x0) clone3(&(0x7f00000023c0)={0x4000000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x80000000}, 0x0, 0x0, &(0x7f0000002340)=""/10, &(0x7f0000002380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, {r4}}, 0x58) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) 16:56:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x32, 0x0, &(0x7f00000000c0)) [ 146.217052] loop3: detected capacity change from 0 to 256 [ 146.250079] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:56:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {0x6}, [@ETHTOOL_A_RINGS_HEADER={0x4}]}, 0x18}}, 0x0) 16:56:47 executing program 1: syz_emit_ethernet(0x4e, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ddc00", 0x18, 0x3a, 0xff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @loopback={0xff00000000000000}}}}}}}, 0x0) 16:56:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {0x6}, [@ETHTOOL_A_RINGS_HEADER={0x4}]}, 0x18}}, 0x0) [ 146.441066] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=4161 comm=syz-executor.0 16:56:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73665df41100080120000200004000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fff", 0x9, 0x10000}], 0x0, &(0x7f0000011000)) [ 146.539132] loop1: detected capacity change from 0 to 256 [ 146.545850] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:56:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {0x6}, [@ETHTOOL_A_RINGS_HEADER={0x4}]}, 0x18}}, 0x0) [ 146.555195] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000ff) [ 146.556451] FAT-fs (loop1): Filesystem has been set read-only [ 146.573627] loop1: detected capacity change from 0 to 256 [ 146.580222] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 146.585907] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000ff) [ 146.587042] FAT-fs (loop1): Filesystem has been set read-only 16:56:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000540)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') utimes(0x0, &(0x7f0000000280)={{}, {0x0, 0xea60}}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x101342, 0x0) write$binfmt_aout(r0, &(0x7f0000000c40)=ANY=[], 0x820) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x260100, 0x4) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000180)='\x00', &(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x8, 0x3) syz_io_uring_setup(0x1, &(0x7f0000000080), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_CONNECT={0x10, 0xca9e09d5bb4a44c, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f00000002c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x3, 0x0, 0x4d1241c2, 0x0, 0x0, 0x0, 0x0, 0x1, {0x1}}, 0x400) sendfile(r0, r1, 0x0, 0x7fffffff) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x100, 0x6) [ 146.634241] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:56:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000540)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') utimes(0x0, &(0x7f0000000280)={{}, {0x0, 0xea60}}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x101342, 0x0) write$binfmt_aout(r0, &(0x7f0000000c40)=ANY=[], 0x820) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x260100, 0x4) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000180)='\x00', &(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x8, 0x3) syz_io_uring_setup(0x1, &(0x7f0000000080), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_CONNECT={0x10, 0xca9e09d5bb4a44c, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f00000002c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x3, 0x0, 0x4d1241c2, 0x0, 0x0, 0x0, 0x0, 0x1, {0x1}}, 0x400) sendfile(r0, r1, 0x0, 0x7fffffff) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x100, 0x6) 16:56:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {0x6}, [@ETHTOOL_A_RINGS_HEADER={0x4}]}, 0x18}}, 0x0) [ 146.696043] loop3: detected capacity change from 0 to 256 16:56:47 executing program 5: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syncfs(0xffffffffffffffff) r1 = gettid() migrate_pages(r1, 0x9, &(0x7f0000000000)=0x23, &(0x7f0000000180)=0x10001) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0), 0x40102, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r2, 0x941c, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000002580)='./file1\x00', 0x141042, 0x20) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/loop6', 0x0, 0x10) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000001d0069ff000000000000000007"], 0x1c}], 0x1}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r3) sendmsg$NL80211_CMD_FLUSH_PMKSA(r5, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="000125bd70040000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0x4008040}, 0x4008090) pwritev(r3, &(0x7f0000000880)=[{&(0x7f0000000300)="c21f5f59fcffb00e3f91241286314fe21fa8f5f5338647c5f7e542d05bf650bd29d797c6d6e9a9a65ede89b25d045d75f500c06eb7abc2036de1c85b39f2de0ed0d0d33472fa9357517ca3e0e482fb697718a2e23a26a2a8c560312a203df6087872597f46b8380969b729c75583bb7e1f9cc883f6c66d6e6d34c11a5a8312671b3bb5fd372f3fc80c5ea8af255a02d926079cf519f45c6ab5c79000927f7fbdc0273099bfb8c6cb8c3c9d301c992594cfefa4c879ceacce65e1841304f4b5264bda55", 0xc3}, {0x0}, {&(0x7f0000000600)}, {0x0}, {&(0x7f0000000780)="e300e3d0f16d85f4ea9ae5cc9f0af6180c5f6485d3a54caba91debe6bb131c805efba8d46929051c2741a3582301d9b4fc1a730902eec16fd064ddd5b9f4bb5be7ae1cf0da69dd174f9f9bcd782e1f57cc3a9b1a30aaab2b2fe512d50ba5804892fd79b83ce8f59db82b90e553f2d6c4fc1dba589b17386e3060565a1f2f2871e7f9d46abcabfc6b8e0e6442bf6a3fe00249a6ad2da9a8ff05910a52a6ca0697c3a6ccad0d4e61d859b20ee68224d5fbdb966a7f93d871e4bf1fd757c390be2ef54d4e0000", 0xc5}], 0x5, 0xfd, 0x0) clone3(&(0x7f00000023c0)={0x4000000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x80000000}, 0x0, 0x0, &(0x7f0000002340)=""/10, &(0x7f0000002380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, {r4}}, 0x58) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) [ 146.707495] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 146.722971] loop1: detected capacity change from 0 to 256 [ 146.748968] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:56:47 executing program 0: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syncfs(0xffffffffffffffff) r1 = gettid() migrate_pages(r1, 0x9, &(0x7f0000000000)=0x23, &(0x7f0000000180)=0x10001) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0), 0x40102, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r2, 0x941c, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000002580)='./file1\x00', 0x141042, 0x20) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/loop6', 0x0, 0x10) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000001d0069ff000000000000000007"], 0x1c}], 0x1}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r3) sendmsg$NL80211_CMD_FLUSH_PMKSA(r5, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="000125bd70040000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0x4008040}, 0x4008090) pwritev(r3, &(0x7f0000000880)=[{&(0x7f0000000300)="c21f5f59fcffb00e3f91241286314fe21fa8f5f5338647c5f7e542d05bf650bd29d797c6d6e9a9a65ede89b25d045d75f500c06eb7abc2036de1c85b39f2de0ed0d0d33472fa9357517ca3e0e482fb697718a2e23a26a2a8c560312a203df6087872597f46b8380969b729c75583bb7e1f9cc883f6c66d6e6d34c11a5a8312671b3bb5fd372f3fc80c5ea8af255a02d926079cf519f45c6ab5c79000927f7fbdc0273099bfb8c6cb8c3c9d301c992594cfefa4c879ceacce65e1841304f4b5264bda55", 0xc3}, {0x0}, {&(0x7f0000000600)}, {0x0}, {&(0x7f0000000780)="e300e3d0f16d85f4ea9ae5cc9f0af6180c5f6485d3a54caba91debe6bb131c805efba8d46929051c2741a3582301d9b4fc1a730902eec16fd064ddd5b9f4bb5be7ae1cf0da69dd174f9f9bcd782e1f57cc3a9b1a30aaab2b2fe512d50ba5804892fd79b83ce8f59db82b90e553f2d6c4fc1dba589b17386e3060565a1f2f2871e7f9d46abcabfc6b8e0e6442bf6a3fe00249a6ad2da9a8ff05910a52a6ca0697c3a6ccad0d4e61d859b20ee68224d5fbdb966a7f93d871e4bf1fd757c390be2ef54d4e0000", 0xc5}], 0x5, 0xfd, 0x0) clone3(&(0x7f00000023c0)={0x4000000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x80000000}, 0x0, 0x0, &(0x7f0000002340)=""/10, &(0x7f0000002380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, {r4}}, 0x58) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) 16:56:48 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x141042, 0x22) pwritev(r1, &(0x7f0000000640)=[{&(0x7f00000002c0)="02", 0x1}], 0x1, 0x7fffffe, 0x0) truncate(&(0x7f0000000200)='./file1\x00', 0x80) r2 = getpgrp(0xffffffffffffffff) pwritev(r1, &(0x7f0000000300)=[{&(0x7f0000000240)="a3d1112c4b2c8aba23dadff12b83128aa9dbee236a29f81c20aa756479d285ae8146c09e1466e63445172acd519c740ec673939c6790a6e626c2b48535d3b2ca43d3f4", 0x43}], 0x1, 0x2, 0x7) capget(&(0x7f00000000c0)={0x19980330, r2}, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000440)={{0x1, 0x1, 0x18, r1, {0xee00, 0xee01}}, './file1\x00'}) ioctl$EXT4_IOC_GET_ES_CACHE(r3, 0xc020662a, &(0x7f0000000480)={0x3782, 0x8, 0x0, 0x1, 0x5, [{0x7, 0x2, 0x9, '\x00', 0x804}, {0xfffffffffffffff8, 0x2, 0x6, '\x00', 0x388c}, {0x2, 0x3f22, 0x9, '\x00', 0x800}, {0x81, 0x80, 0x1, '\x00', 0x800}, {0x49b2, 0x0, 0x7, '\x00', 0x2808}]}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$SG_GET_NUM_WAITING(r4, 0x227d, &(0x7f0000000100)) r5 = socket$inet6(0xa, 0x1, 0x0) openat(r1, &(0x7f0000000400)='./file0\x00', 0x30000, 0x100) getsockopt$SO_COOKIE(r5, 0x1, 0x47, &(0x7f0000000000), &(0x7f0000000040)=0x8) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000003c0)) 16:56:48 executing program 7: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000540)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') utimes(0x0, &(0x7f0000000280)={{}, {0x0, 0xea60}}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x101342, 0x0) write$binfmt_aout(r0, &(0x7f0000000c40)=ANY=[], 0x820) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x260100, 0x4) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000180)='\x00', &(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x8, 0x3) syz_io_uring_setup(0x1, &(0x7f0000000080), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_CONNECT={0x10, 0xca9e09d5bb4a44c, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f00000002c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x3, 0x0, 0x4d1241c2, 0x0, 0x0, 0x0, 0x0, 0x1, {0x1}}, 0x400) sendfile(r0, r1, 0x0, 0 VM DIAGNOSIS: 16:56:41 Registers: info registers vcpu 0 RAX=ffff88804255fbb8 RBX=0000000000000001 RCX=ffff88804255fad0 RDX=0000000000000000 RSI=0000000000000001 RDI=0000000000000001 RBP=ffff88804255f6e0 RSP=ffff88804255f608 R8 =ffffffff86226bc6 R9 =ffffffff86226bca R10=ffffed10084abede R11=000000000003603d R12=ffff88804255f6c9 R13=ffff88804255f6e8 R14=ffff88804255f688 R15=ffffffff86226bcb RIP=ffffffff8111bc6c RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f9bf2de0b70 CR3=0000000040c26000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 00524f5252450040 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=dffffc0000000060 RBX=00000000000003fd RCX=0000000000000000 RDX=00000000000003fd RSI=ffffffff822b253c RDI=ffffffff8763fae0 RBP=ffffffff8763faa0 RSP=ffff8880423f7640 R8 =0000000000000004 R9 =0000000000000010 R10=0000000000000010 R11=0000000000000001 R12=0000000000002710 R13=0000000000000020 R14=fffffbfff0ec7fab R15=dffffc0000000000 RIP=ffffffff822b2591 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fec13e69700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fc4c16ee020 CR3=000000000d3ca000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 38313d72656e776f 662c73746f646f6e YMM01=0000000000000000 0000000000000000 3631353539303733 3730343437363434 YMM02=0000000000000000 0000000000000000 6a626f2c3d657079 745f6a626f2c3531 YMM03=0000000000000000 0000000000000000 65746e6f632c5b2e cb273d656c6f725f YMM04=0000000000000000 0000000000000000 2c40292b2a3d7461 6873666b63616d73 YMM05=0000000000000000 0000000000000000 2c38323930363030 3030303030303030 YMM06=0000000000000000 0000000000000000 30303030303d6469 752c746f6f723d74 YMM07=0000000000000000 0000000000000000 7865746e6f632c5b 2ecb273d656c6f72 YMM08=0000000000000000 0000000000000000 92eb12d48b7ea51c 2bab3ae632fa2f91 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000