Warning: Permanently added '[localhost]:59565' (ECDSA) to the list of known hosts. 2022/10/04 14:07:18 fuzzer started 2022/10/04 14:07:19 dialing manager at localhost:46847 syzkaller login: [ 35.926781] cgroup: Unknown subsys name 'net' [ 36.028255] cgroup: Unknown subsys name 'rlimit' 2022/10/04 14:07:32 syscalls: 2215 2022/10/04 14:07:32 code coverage: enabled 2022/10/04 14:07:32 comparison tracing: enabled 2022/10/04 14:07:32 extra coverage: enabled 2022/10/04 14:07:32 setuid sandbox: enabled 2022/10/04 14:07:32 namespace sandbox: enabled 2022/10/04 14:07:32 Android sandbox: enabled 2022/10/04 14:07:32 fault injection: enabled 2022/10/04 14:07:32 leak checking: enabled 2022/10/04 14:07:32 net packet injection: enabled 2022/10/04 14:07:32 net device setup: enabled 2022/10/04 14:07:32 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/10/04 14:07:32 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/10/04 14:07:32 USB emulation: enabled 2022/10/04 14:07:32 hci packet injection: enabled 2022/10/04 14:07:32 wifi device emulation: failed to parse kernel version (6.0.0-next-20221004) 2022/10/04 14:07:32 802.15.4 emulation: enabled 2022/10/04 14:07:32 fetching corpus: 0, signal 0/2000 (executing program) 2022/10/04 14:07:32 fetching corpus: 50, signal 25943/28086 (executing program) 2022/10/04 14:07:33 fetching corpus: 100, signal 33298/35725 (executing program) 2022/10/04 14:07:33 fetching corpus: 150, signal 41154/43254 (executing program) 2022/10/04 14:07:33 fetching corpus: 200, signal 47546/49042 (executing program) 2022/10/04 14:07:33 fetching corpus: 250, signal 52732/53557 (executing program) 2022/10/04 14:07:33 fetching corpus: 280, signal 55031/55410 (executing program) 2022/10/04 14:07:33 fetching corpus: 280, signal 55031/55457 (executing program) 2022/10/04 14:07:33 fetching corpus: 280, signal 55031/55504 (executing program) 2022/10/04 14:07:33 fetching corpus: 280, signal 55031/55559 (executing program) 2022/10/04 14:07:33 fetching corpus: 280, signal 55031/55615 (executing program) 2022/10/04 14:07:33 fetching corpus: 280, signal 55031/55670 (executing program) 2022/10/04 14:07:33 fetching corpus: 280, signal 55031/55715 (executing program) 2022/10/04 14:07:33 fetching corpus: 280, signal 55031/55778 (executing program) 2022/10/04 14:07:33 fetching corpus: 280, signal 55031/55827 (executing program) 2022/10/04 14:07:33 fetching corpus: 280, signal 55031/55878 (executing program) 2022/10/04 14:07:33 fetching corpus: 280, signal 55031/55939 (executing program) 2022/10/04 14:07:33 fetching corpus: 280, signal 55031/55986 (executing program) 2022/10/04 14:07:33 fetching corpus: 280, signal 55031/56042 (executing program) 2022/10/04 14:07:33 fetching corpus: 280, signal 55031/56076 (executing program) 2022/10/04 14:07:33 fetching corpus: 280, signal 55031/56130 (executing program) 2022/10/04 14:07:33 fetching corpus: 280, signal 55031/56183 (executing program) 2022/10/04 14:07:33 fetching corpus: 280, signal 55031/56232 (executing program) 2022/10/04 14:07:33 fetching corpus: 280, signal 55031/56281 (executing program) 2022/10/04 14:07:33 fetching corpus: 280, signal 55031/56322 (executing program) 2022/10/04 14:07:33 fetching corpus: 280, signal 55031/56395 (executing program) 2022/10/04 14:07:33 fetching corpus: 280, signal 55031/56448 (executing program) 2022/10/04 14:07:33 fetching corpus: 280, signal 55031/56495 (executing program) 2022/10/04 14:07:34 fetching corpus: 280, signal 55031/56495 (executing program) 2022/10/04 14:07:36 starting 8 fuzzer processes 14:07:36 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000400)) 14:07:36 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:07:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) 14:07:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) [ 53.238187] audit: type=1400 audit(1664892456.551:6): avc: denied { execmem } for pid=284 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 14:07:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73665df41100080120000200004000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010100)='RRaA\x00'/32, 0x20, 0x800}, {&(0x7f0000010200)="0000000072724161140000000b000000000000000000000000000000000055aa", 0x20, 0x9e0}, {&(0x7f0000010300)="601c6d6b646f73665df41100080120000200004000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60, 0x3000}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0f0700000008000000090000000a000000ffffff0fffffff0f00"/64, 0x40, 0x10000}, {&(0x7f0000010500)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0f0700000008000000090000000a000000ffffff0fffffff0f00"/64, 0x40, 0x10800}, {&(0x7f0000010600)="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", 0x120, 0x11000}, {&(0x7f0000010800)="2e202020202020202020201000bde670325132510000e67032510300000000002e2e2020202020202020201000bde670325132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020202000bde670325132510000e670325104001a040000", 0x80, 0x11800}, {&(0x7f0000010900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x12000}, {&(0x7f0000010e00)='syzkallers\x00'/32, 0x20, 0x12800}, {&(0x7f0000010f00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x15800}], 0x0, &(0x7f0000011000)) 14:07:36 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000040)) 14:07:36 executing program 6: r0 = socket$inet(0x2, 0x3, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 14:07:36 executing program 7: io_uring_setup(0x12f9, &(0x7f000000b200)={0x0, 0x0, 0x2000}) [ 54.564375] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 54.566577] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 54.569857] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 54.573208] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 54.575200] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 54.576790] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 54.581203] Bluetooth: hci0: HCI_REQ-0x0c1a [ 54.618644] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 54.620161] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 54.623394] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 54.627232] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 54.630014] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 54.631580] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 54.636268] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 54.638038] Bluetooth: hci4: HCI_REQ-0x0c1a [ 54.676275] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 54.679253] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 54.681251] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 54.682419] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 54.684365] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 54.685516] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 54.689196] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 54.691751] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 54.693024] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 54.695304] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 54.696694] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 54.699118] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 54.700591] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 54.701820] Bluetooth: hci7: HCI_REQ-0x0c1a [ 54.703728] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 54.711693] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 54.713879] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 54.715728] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 54.717573] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 54.721658] Bluetooth: hci6: HCI_REQ-0x0c1a [ 54.724906] Bluetooth: hci2: HCI_REQ-0x0c1a [ 54.726398] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 54.733622] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 54.735046] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 54.741742] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 54.751818] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 54.762895] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 54.773198] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 54.774515] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 54.780181] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 54.795418] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 54.806099] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 54.810150] Bluetooth: hci3: HCI_REQ-0x0c1a [ 54.816791] Bluetooth: hci5: HCI_REQ-0x0c1a [ 56.645787] Bluetooth: hci4: command 0x0409 tx timeout [ 56.646755] Bluetooth: hci0: command 0x0409 tx timeout [ 56.647386] Bluetooth: hci1: Opcode 0x c03 failed: -110 [ 56.709497] Bluetooth: hci7: command 0x0409 tx timeout [ 56.773511] Bluetooth: hci2: command 0x0409 tx timeout [ 56.773550] Bluetooth: hci6: command 0x0409 tx timeout [ 56.837557] Bluetooth: hci5: command 0x0409 tx timeout [ 56.837569] Bluetooth: hci3: command 0x0409 tx timeout [ 58.693571] Bluetooth: hci0: command 0x041b tx timeout [ 58.693856] Bluetooth: hci4: command 0x041b tx timeout [ 58.757518] Bluetooth: hci7: command 0x041b tx timeout [ 58.821585] Bluetooth: hci6: command 0x041b tx timeout [ 58.821591] Bluetooth: hci2: command 0x041b tx timeout [ 58.885584] Bluetooth: hci5: command 0x041b tx timeout [ 58.885592] Bluetooth: hci3: command 0x041b tx timeout [ 60.741548] Bluetooth: hci4: command 0x040f tx timeout [ 60.742984] Bluetooth: hci0: command 0x040f tx timeout [ 60.805613] Bluetooth: hci7: command 0x040f tx timeout [ 60.869534] Bluetooth: hci2: command 0x040f tx timeout [ 60.870609] Bluetooth: hci6: command 0x040f tx timeout [ 60.933570] Bluetooth: hci3: command 0x040f tx timeout [ 60.934554] Bluetooth: hci5: command 0x040f tx timeout [ 61.317556] Bluetooth: hci1: Opcode 0x c03 failed: -110 [ 62.790096] Bluetooth: hci0: command 0x0419 tx timeout [ 62.790146] Bluetooth: hci4: command 0x0419 tx timeout [ 62.853550] Bluetooth: hci7: command 0x0419 tx timeout [ 62.917567] Bluetooth: hci6: command 0x0419 tx timeout [ 62.917683] Bluetooth: hci2: command 0x0419 tx timeout [ 62.981541] Bluetooth: hci5: command 0x0419 tx timeout [ 62.981555] Bluetooth: hci3: command 0x0419 tx timeout [ 63.991736] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 63.998522] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 64.000678] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 64.006720] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 64.010133] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 64.013519] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 64.044640] Bluetooth: hci1: HCI_REQ-0x0c1a [ 66.118607] Bluetooth: hci1: command 0x0409 tx timeout [ 68.166573] Bluetooth: hci1: command 0x041b tx timeout [ 70.214644] Bluetooth: hci1: command 0x040f tx timeout [ 72.261537] Bluetooth: hci1: command 0x0419 tx timeout 14:08:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) 14:08:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) 14:08:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) 14:08:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) 14:08:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) 14:08:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) 14:08:31 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) 14:08:31 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) [ 110.238129] loop4: detected capacity change from 0 to 344 [ 111.000577] audit: type=1400 audit(1664892514.313:7): avc: denied { open } for pid=3913 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 111.003503] audit: type=1400 audit(1664892514.314:8): avc: denied { kernel } for pid=3913 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 111.011140] ------------[ cut here ]------------ [ 111.011164] [ 111.011168] ====================================================== [ 111.011171] WARNING: possible circular locking dependency detected [ 111.011175] 6.0.0-next-20221004 #1 Not tainted [ 111.011182] ------------------------------------------------------ [ 111.011186] syz-executor.1/3914 is trying to acquire lock: [ 111.011192] ffffffff853faaf8 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 111.011234] [ 111.011234] but task is already holding lock: [ 111.011237] ffff88800a066c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 111.011264] [ 111.011264] which lock already depends on the new lock. [ 111.011264] [ 111.011267] [ 111.011267] the existing dependency chain (in reverse order) is: [ 111.011270] [ 111.011270] -> #3 (&ctx->lock){....}-{2:2}: [ 111.011284] _raw_spin_lock+0x2a/0x40 [ 111.011296] __perf_event_task_sched_out+0x53b/0x18d0 [ 111.011307] __schedule+0xedd/0x2470 [ 111.011322] schedule+0xda/0x1b0 [ 111.011336] futex_wait_queue+0xf5/0x1e0 [ 111.011349] futex_wait+0x28e/0x690 [ 111.011359] do_futex+0x2ff/0x380 [ 111.011368] __x64_sys_futex+0x1c6/0x4d0 [ 111.011378] do_syscall_64+0x3b/0x90 [ 111.011396] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 111.011410] [ 111.011410] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 111.011423] _raw_spin_lock_nested+0x30/0x40 [ 111.011434] raw_spin_rq_lock_nested+0x1e/0x30 [ 111.011447] task_fork_fair+0x63/0x4d0 [ 111.011465] sched_cgroup_fork+0x3d0/0x540 [ 111.011482] copy_process+0x4183/0x6e20 [ 111.011493] kernel_clone+0xe7/0x890 [ 111.011502] user_mode_thread+0xad/0xf0 [ 111.011513] rest_init+0x24/0x250 [ 111.011525] arch_call_rest_init+0xf/0x14 [ 111.011544] start_kernel+0x4c6/0x4eb [ 111.011560] secondary_startup_64_no_verify+0xe0/0xeb [ 111.011574] [ 111.011574] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 111.011587] _raw_spin_lock_irqsave+0x39/0x60 [ 111.011599] try_to_wake_up+0xab/0x1930 [ 111.011612] up+0x75/0xb0 [ 111.011626] __up_console_sem+0x6e/0x80 [ 111.011642] console_unlock+0x46a/0x590 [ 111.011658] do_con_write+0xc05/0x1d50 [ 111.011670] con_write+0x21/0x40 [ 111.011679] n_tty_write+0x4d4/0xfe0 [ 111.011691] file_tty_write.constprop.0+0x455/0x8a0 [ 111.011704] vfs_write+0x9c3/0xd90 [ 111.011720] ksys_write+0x127/0x250 [ 111.011736] do_syscall_64+0x3b/0x90 [ 111.011754] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 111.011767] [ 111.011767] -> #0 ((console_sem).lock){....}-{2:2}: [ 111.011780] __lock_acquire+0x2a02/0x5e70 [ 111.011797] lock_acquire+0x1a2/0x530 [ 111.011813] _raw_spin_lock_irqsave+0x39/0x60 [ 111.011824] down_trylock+0xe/0x70 [ 111.011840] __down_trylock_console_sem+0x3b/0xd0 [ 111.011856] vprintk_emit+0x16b/0x560 [ 111.011872] vprintk+0x84/0xa0 [ 111.011887] _printk+0xba/0xf1 [ 111.011899] report_bug.cold+0x72/0xab [ 111.011916] handle_bug+0x3c/0x70 [ 111.011925] exc_invalid_op+0x14/0x50 [ 111.011934] asm_exc_invalid_op+0x16/0x20 [ 111.011947] group_sched_out.part.0+0x2c7/0x460 [ 111.011965] ctx_sched_out+0x8f1/0xc10 [ 111.011981] __perf_event_task_sched_out+0x6d0/0x18d0 [ 111.011992] __schedule+0xedd/0x2470 [ 111.012006] schedule+0xda/0x1b0 [ 111.012019] futex_wait_queue+0xf5/0x1e0 [ 111.012030] futex_wait+0x28e/0x690 [ 111.012040] do_futex+0x2ff/0x380 [ 111.012049] __x64_sys_futex+0x1c6/0x4d0 [ 111.012059] do_syscall_64+0x3b/0x90 [ 111.012076] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 111.012089] [ 111.012089] other info that might help us debug this: [ 111.012089] [ 111.012092] Chain exists of: [ 111.012092] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 111.012092] [ 111.012107] Possible unsafe locking scenario: [ 111.012107] [ 111.012109] CPU0 CPU1 [ 111.012112] ---- ---- [ 111.012114] lock(&ctx->lock); [ 111.012119] lock(&rq->__lock); [ 111.012126] lock(&ctx->lock); [ 111.012132] lock((console_sem).lock); [ 111.012137] [ 111.012137] *** DEADLOCK *** [ 111.012137] [ 111.012139] 2 locks held by syz-executor.1/3914: [ 111.012146] #0: ffff88806ce37e98 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 111.012176] #1: ffff88800a066c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 111.012202] [ 111.012202] stack backtrace: [ 111.012205] CPU: 0 PID: 3914 Comm: syz-executor.1 Not tainted 6.0.0-next-20221004 #1 [ 111.012217] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 111.012225] Call Trace: [ 111.012229] [ 111.012233] dump_stack_lvl+0x8b/0xb3 [ 111.012252] check_noncircular+0x263/0x2e0 [ 111.012268] ? format_decode+0x26c/0xb50 [ 111.012286] ? print_circular_bug+0x450/0x450 [ 111.012303] ? simple_strtoul+0x30/0x30 [ 111.012318] ? __lockdep_reset_lock+0x180/0x180 [ 111.012334] ? format_decode+0x26c/0xb50 [ 111.012352] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 111.012370] __lock_acquire+0x2a02/0x5e70 [ 111.012391] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 111.012413] lock_acquire+0x1a2/0x530 [ 111.012430] ? down_trylock+0xe/0x70 [ 111.012448] ? lock_release+0x750/0x750 [ 111.012464] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 111.012485] ? vprintk+0x84/0xa0 [ 111.012503] _raw_spin_lock_irqsave+0x39/0x60 [ 111.012515] ? down_trylock+0xe/0x70 [ 111.012531] down_trylock+0xe/0x70 [ 111.012548] ? vprintk+0x84/0xa0 [ 111.012564] __down_trylock_console_sem+0x3b/0xd0 [ 111.012582] vprintk_emit+0x16b/0x560 [ 111.012598] ? lock_downgrade+0x6d0/0x6d0 [ 111.012617] vprintk+0x84/0xa0 [ 111.012634] _printk+0xba/0xf1 [ 111.012646] ? record_print_text.cold+0x16/0x16 [ 111.012660] ? hrtimer_try_to_cancel+0x163/0x2c0 [ 111.012675] ? lock_downgrade+0x6d0/0x6d0 [ 111.012692] ? report_bug.cold+0x66/0xab [ 111.012711] ? group_sched_out.part.0+0x2c7/0x460 [ 111.012729] report_bug.cold+0x72/0xab [ 111.012748] handle_bug+0x3c/0x70 [ 111.012758] exc_invalid_op+0x14/0x50 [ 111.012769] asm_exc_invalid_op+0x16/0x20 [ 111.012782] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 111.012802] Code: 5e 41 5f e9 8b ae ef ff e8 86 ae ef ff 65 8b 1d 2b 08 ac 7e 31 ff 89 de e8 26 ab ef ff 85 db 0f 84 8a 00 00 00 e8 69 ae ef ff <0f> 0b e9 a5 fe ff ff e8 5d ae ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 111.012814] RSP: 0018:ffff88803d06f8f8 EFLAGS: 00010006 [ 111.012823] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 111.012831] RDX: ffff88803ce60000 RSI: ffffffff81566da7 RDI: 0000000000000005 [ 111.012839] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 111.012846] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800a066c00 [ 111.012854] R13: ffff88806ce3d2c0 R14: ffffffff8547c9a0 R15: 0000000000000002 [ 111.012865] ? group_sched_out.part.0+0x2c7/0x460 [ 111.012885] ? group_sched_out.part.0+0x2c7/0x460 [ 111.012904] ctx_sched_out+0x8f1/0xc10 [ 111.012924] __perf_event_task_sched_out+0x6d0/0x18d0 [ 111.012938] ? lock_is_held_type+0xd7/0x130 [ 111.012953] ? __perf_cgroup_move+0x160/0x160 [ 111.012963] ? set_next_entity+0x304/0x550 [ 111.012983] ? lock_is_held_type+0xd7/0x130 [ 111.012997] __schedule+0xedd/0x2470 [ 111.013015] ? io_schedule_timeout+0x150/0x150 [ 111.013031] ? futex_wait_setup+0x166/0x230 [ 111.013045] schedule+0xda/0x1b0 [ 111.013061] futex_wait_queue+0xf5/0x1e0 [ 111.013073] futex_wait+0x28e/0x690 [ 111.013086] ? futex_wait_setup+0x230/0x230 [ 111.013099] ? wake_up_q+0x8b/0xf0 [ 111.013112] ? do_raw_spin_unlock+0x4f/0x220 [ 111.013132] ? futex_wake+0x158/0x490 [ 111.013146] ? lock_downgrade+0x6d0/0x6d0 [ 111.013163] ? lock_is_held_type+0xd7/0x130 [ 111.013179] do_futex+0x2ff/0x380 [ 111.013190] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0 [ 111.013202] ? ktime_get+0x153/0x1f0 [ 111.013219] __x64_sys_futex+0x1c6/0x4d0 [ 111.013231] ? hrtimer_interrupt+0x5b0/0x770 [ 111.013245] ? __x64_sys_futex_time32+0x480/0x480 [ 111.013258] ? syscall_enter_from_user_mode+0x1d/0x50 [ 111.013272] ? syscall_enter_from_user_mode+0x1d/0x50 [ 111.013288] do_syscall_64+0x3b/0x90 [ 111.013306] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 111.013320] RIP: 0033:0x7fc1a1c69b19 [ 111.013328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 111.013339] RSP: 002b:00007fc19f1df218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 111.013350] RAX: ffffffffffffffda RBX: 00007fc1a1d7cf68 RCX: 00007fc1a1c69b19 [ 111.013358] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fc1a1d7cf68 [ 111.013365] RBP: 00007fc1a1d7cf60 R08: 0000000000000000 R09: 0000000000000000 [ 111.013372] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc1a1d7cf6c [ 111.013379] R13: 00007ffd91724fef R14: 00007fc19f1df300 R15: 0000000000022000 [ 111.013392] [ 111.075240] WARNING: CPU: 0 PID: 3914 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 111.075929] Modules linked in: [ 111.076179] CPU: 0 PID: 3914 Comm: syz-executor.1 Not tainted 6.0.0-next-20221004 #1 [ 111.076754] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 111.077574] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 111.077988] Code: 5e 41 5f e9 8b ae ef ff e8 86 ae ef ff 65 8b 1d 2b 08 ac 7e 31 ff 89 de e8 26 ab ef ff 85 db 0f 84 8a 00 00 00 e8 69 ae ef ff <0f> 0b e9 a5 fe ff ff e8 5d ae ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 111.079349] RSP: 0018:ffff88803d06f8f8 EFLAGS: 00010006 [ 111.079748] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 111.080273] RDX: ffff88803ce60000 RSI: ffffffff81566da7 RDI: 0000000000000005 [ 111.080804] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 111.081337] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800a066c00 [ 111.081863] R13: ffff88806ce3d2c0 R14: ffffffff8547c9a0 R15: 0000000000000002 [ 111.082408] FS: 00007fc19f1df700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 111.083006] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 111.083443] CR2: 0000000000000000 CR3: 000000000e0e0000 CR4: 0000000000350ef0 [ 111.083969] Call Trace: [ 111.084164] [ 111.084340] ctx_sched_out+0x8f1/0xc10 [ 111.084646] __perf_event_task_sched_out+0x6d0/0x18d0 [ 111.085033] ? lock_is_held_type+0xd7/0x130 [ 111.085365] ? __perf_cgroup_move+0x160/0x160 [ 111.085702] ? set_next_entity+0x304/0x550 [ 111.086036] ? lock_is_held_type+0xd7/0x130 [ 111.086361] __schedule+0xedd/0x2470 [ 111.086651] ? io_schedule_timeout+0x150/0x150 [ 111.086996] ? futex_wait_setup+0x166/0x230 [ 111.087325] schedule+0xda/0x1b0 [ 111.087589] futex_wait_queue+0xf5/0x1e0 [ 111.087897] futex_wait+0x28e/0x690 [ 111.088185] ? futex_wait_setup+0x230/0x230 [ 111.088526] ? wake_up_q+0x8b/0xf0 [ 111.088797] ? do_raw_spin_unlock+0x4f/0x220 [ 111.089148] ? futex_wake+0x158/0x490 [ 111.089442] ? lock_downgrade+0x6d0/0x6d0 [ 111.089761] ? lock_is_held_type+0xd7/0x130 [ 111.090104] do_futex+0x2ff/0x380 [ 111.090370] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0 [ 111.090803] ? ktime_get+0x153/0x1f0 [ 111.091094] __x64_sys_futex+0x1c6/0x4d0 [ 111.091403] ? hrtimer_interrupt+0x5b0/0x770 [ 111.091737] ? __x64_sys_futex_time32+0x480/0x480 [ 111.092094] ? syscall_enter_from_user_mode+0x1d/0x50 [ 111.092480] ? syscall_enter_from_user_mode+0x1d/0x50 [ 111.092866] do_syscall_64+0x3b/0x90 [ 111.093158] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 111.093550] RIP: 0033:0x7fc1a1c69b19 [ 111.093830] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 111.095171] RSP: 002b:00007fc19f1df218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 111.095730] RAX: ffffffffffffffda RBX: 00007fc1a1d7cf68 RCX: 00007fc1a1c69b19 [ 111.096254] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fc1a1d7cf68 [ 111.096778] RBP: 00007fc1a1d7cf60 R08: 0000000000000000 R09: 0000000000000000 [ 111.097311] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc1a1d7cf6c [ 111.097843] R13: 00007ffd91724fef R14: 00007fc19f1df300 R15: 0000000000022000 [ 111.098387] [ 111.098564] irq event stamp: 1954 [ 111.098824] hardirqs last enabled at (1953): [] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 111.099554] hardirqs last disabled at (1954): [] __schedule+0x1225/0x2470 [ 111.100170] softirqs last enabled at (1790): [] __irq_exit_rcu+0x11b/0x180 [ 111.100808] softirqs last disabled at (1621): [] __irq_exit_rcu+0x11b/0x180 [ 111.101442] ---[ end trace 0000000000000000 ]--- 14:08:36 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000400)) 14:08:36 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) 14:08:36 executing program 7: io_uring_setup(0x12f9, &(0x7f000000b200)={0x0, 0x0, 0x2000}) 14:08:36 executing program 6: r0 = socket$inet(0x2, 0x3, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 14:08:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73665df41100080120000200004000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010100)='RRaA\x00'/32, 0x20, 0x800}, {&(0x7f0000010200)="0000000072724161140000000b000000000000000000000000000000000055aa", 0x20, 0x9e0}, {&(0x7f0000010300)="601c6d6b646f73665df41100080120000200004000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60, 0x3000}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0f0700000008000000090000000a000000ffffff0fffffff0f00"/64, 0x40, 0x10000}, {&(0x7f0000010500)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0f0700000008000000090000000a000000ffffff0fffffff0f00"/64, 0x40, 0x10800}, {&(0x7f0000010600)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000bde670325132510000e670325103000000000041660069006c00650031000f00100000ffffffffffffffffffff0000ffffffff46494c45312020202020202000bde670325132510000e670325105000a00000041660069006c00650032000f00140000ffffffffffffffffffff0000ffffffff46494c45322020202020202000bde670325132510000e670325106002823000041660069006c0065002e000f00d263006f006c0064000000ffff0000ffffffff46494c457e312020434f4c2000bde670325132510000e67032510b0064000000", 0x120, 0x11000}, {&(0x7f0000010800)="2e202020202020202020201000bde670325132510000e67032510300000000002e2e2020202020202020201000bde670325132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020202000bde670325132510000e670325104001a040000", 0x80, 0x11800}, {&(0x7f0000010900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x12000}, {&(0x7f0000010e00)='syzkallers\x00'/32, 0x20, 0x12800}, {&(0x7f0000010f00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x15800}], 0x0, &(0x7f0000011000)) [ 113.305947] loop4: detected capacity change from 0 to 344 14:08:36 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000040)) 14:08:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:36 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:36 executing program 6: r0 = socket$inet(0x2, 0x3, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 14:08:36 executing program 7: io_uring_setup(0x12f9, &(0x7f000000b200)={0x0, 0x0, 0x2000}) 14:08:36 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000040)) 14:08:36 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) 14:08:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73665df41100080120000200004000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010100)='RRaA\x00'/32, 0x20, 0x800}, {&(0x7f0000010200)="0000000072724161140000000b000000000000000000000000000000000055aa", 0x20, 0x9e0}, {&(0x7f0000010300)="601c6d6b646f73665df41100080120000200004000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60, 0x3000}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0f0700000008000000090000000a000000ffffff0fffffff0f00"/64, 0x40, 0x10000}, {&(0x7f0000010500)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0f0700000008000000090000000a000000ffffff0fffffff0f00"/64, 0x40, 0x10800}, {&(0x7f0000010600)="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", 0x120, 0x11000}, {&(0x7f0000010800)="2e202020202020202020201000bde670325132510000e67032510300000000002e2e2020202020202020201000bde670325132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020202000bde670325132510000e670325104001a040000", 0x80, 0x11800}, {&(0x7f0000010900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x12000}, {&(0x7f0000010e00)='syzkallers\x00'/32, 0x20, 0x12800}, {&(0x7f0000010f00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x15800}], 0x0, &(0x7f0000011000)) 14:08:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) [ 113.417900] loop4: detected capacity change from 0 to 344 14:08:36 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000400)) 14:08:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:36 executing program 6: r0 = socket$inet(0x2, 0x3, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 14:08:36 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000040)) 14:08:36 executing program 7: io_uring_setup(0x12f9, &(0x7f000000b200)={0x0, 0x0, 0x2000}) 14:08:36 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73665df41100080120000200004000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010100)='RRaA\x00'/32, 0x20, 0x800}, {&(0x7f0000010200)="0000000072724161140000000b000000000000000000000000000000000055aa", 0x20, 0x9e0}, {&(0x7f0000010300)="601c6d6b646f73665df41100080120000200004000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60, 0x3000}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0f0700000008000000090000000a000000ffffff0fffffff0f00"/64, 0x40, 0x10000}, {&(0x7f0000010500)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0f0700000008000000090000000a000000ffffff0fffffff0f00"/64, 0x40, 0x10800}, {&(0x7f0000010600)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000bde670325132510000e670325103000000000041660069006c00650031000f00100000ffffffffffffffffffff0000ffffffff46494c45312020202020202000bde670325132510000e670325105000a00000041660069006c00650032000f00140000ffffffffffffffffffff0000ffffffff46494c45322020202020202000bde670325132510000e670325106002823000041660069006c0065002e000f00d263006f006c0064000000ffff0000ffffffff46494c457e312020434f4c2000bde670325132510000e67032510b0064000000", 0x120, 0x11000}, {&(0x7f0000010800)="2e202020202020202020201000bde670325132510000e67032510300000000002e2e2020202020202020201000bde670325132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020202000bde670325132510000e670325104001a040000", 0x80, 0x11800}, {&(0x7f0000010900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x12000}, {&(0x7f0000010e00)='syzkallers\x00'/32, 0x20, 0x12800}, {&(0x7f0000010f00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x15800}], 0x0, &(0x7f0000011000)) 14:08:36 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:36 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) [ 113.526094] loop4: detected capacity change from 0 to 344 14:08:36 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:36 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:36 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:36 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000400)) 14:08:36 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:36 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:36 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:36 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:37 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:37 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:37 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:37 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:37 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:37 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:37 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:37 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:37 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) [ 113.919457] hrtimer: interrupt took 19507 ns 14:08:37 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:37 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:37 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:37 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:37 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:37 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:37 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:37 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:37 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:37 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:37 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:37 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:37 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:38 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:08:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:38 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:38 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000040)) 14:08:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:38 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) 14:08:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000400008000f800002000400003000000000000000100000000000000020000000100060000000000000000000000000080002913cb39f153595a4b414c4c4552202046415433322020200e1fbe777cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a0000000000", 0xe0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aa5252614100"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="0000000072724161430000001a000000000000000000000000000000000055aa", 0x20, 0x3e0}, {&(0x7f0000010300)="eb58906d6b66732e66617400020120000400008000f800002000400003000000000000000100000000000000020000000100060000000000000000000000000080002913cb39f153595a4b414c4c4552202046415433322020200e1fbe777cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a0000000000", 0xe0, 0xc00}, {&(0x7f0000010400)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0xde0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0fffffff0f0500000006000000ffffff0fffffff0f090000000a0000000b0000000c0000000d0000000e0000000f00000010000000110000001200000013000000140000001500000016000000170000001800000019000000ffffff0fffffff0f00"/128, 0x80, 0x4000}, {&(0x7f0000010600)="f8ffff0fffffff0ff8ffff0fffffff0f0500000006000000ffffff0fffffff0f090000000a0000000b0000000c0000000d0000000e0000000f00000010000000110000001200000013000000140000001500000016000000170000001800000019000000ffffff0fffffff0f00"/128, 0x80, 0x4200}, {&(0x7f0000010700)="f8ffff0fffffff0ff8ffff0fffffff0f0500000006000000ffffff0fffffff0f090000000a0000000b0000000c0000000d0000000e0000000f00000010000000110000001200000013000000140000001500000016000000170000001800000019000000ffffff0fffffff0f00"/128, 0x80, 0x4400}, {&(0x7f0000010800)="f8ffff0fffffff0ff8ffff0fffffff0f0500000006000000ffffff0fffffff0f090000000a0000000b0000000c0000000d0000000e0000000f00000010000000110000001200000013000000140000001500000016000000170000001800000019000000ffffff0fffffff0f00"/128, 0x80, 0x4600}, {&(0x7f0000010900)="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", 0x120, 0x4800}, {&(0x7f0000010b00)="2e2020202020202020202010000de870325132510000e87032510300000000002e2e20202020202020202010000de870325132510000e870325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202020000de870325132510000e870325104001a040000", 0x80, 0x4a00}, {&(0x7f0000010c00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x4c00}, {&(0x7f0000011100)='syzkallers\x00'/32, 0x20, 0x5200}, {&(0x7f0000011200)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x7800}], 0x0, &(0x7f0000011300)) [ 115.031129] loop4: detected capacity change from 0 to 128 [ 115.317131] loop4: detected capacity change from 0 to 128 14:08:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000400008000f800002000400003000000000000000100000000000000020000000100060000000000000000000000000080002913cb39f153595a4b414c4c4552202046415433322020200e1fbe777cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a0000000000", 0xe0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aa5252614100"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="0000000072724161430000001a000000000000000000000000000000000055aa", 0x20, 0x3e0}, {&(0x7f0000010300)="eb58906d6b66732e66617400020120000400008000f800002000400003000000000000000100000000000000020000000100060000000000000000000000000080002913cb39f153595a4b414c4c4552202046415433322020200e1fbe777cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a0000000000", 0xe0, 0xc00}, {&(0x7f0000010400)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0xde0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0fffffff0f0500000006000000ffffff0fffffff0f090000000a0000000b0000000c0000000d0000000e0000000f00000010000000110000001200000013000000140000001500000016000000170000001800000019000000ffffff0fffffff0f00"/128, 0x80, 0x4000}, {&(0x7f0000010600)="f8ffff0fffffff0ff8ffff0fffffff0f0500000006000000ffffff0fffffff0f090000000a0000000b0000000c0000000d0000000e0000000f00000010000000110000001200000013000000140000001500000016000000170000001800000019000000ffffff0fffffff0f00"/128, 0x80, 0x4200}, {&(0x7f0000010700)="f8ffff0fffffff0ff8ffff0fffffff0f0500000006000000ffffff0fffffff0f090000000a0000000b0000000c0000000d0000000e0000000f00000010000000110000001200000013000000140000001500000016000000170000001800000019000000ffffff0fffffff0f00"/128, 0x80, 0x4400}, {&(0x7f0000010800)="f8ffff0fffffff0ff8ffff0fffffff0f0500000006000000ffffff0fffffff0f090000000a0000000b0000000c0000000d0000000e0000000f00000010000000110000001200000013000000140000001500000016000000170000001800000019000000ffffff0fffffff0f00"/128, 0x80, 0x4600}, {&(0x7f0000010900)="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", 0x120, 0x4800}, {&(0x7f0000010b00)="2e2020202020202020202010000de870325132510000e87032510300000000002e2e20202020202020202010000de870325132510000e870325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202020000de870325132510000e870325104001a040000", 0x80, 0x4a00}, {&(0x7f0000010c00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x4c00}, {&(0x7f0000011100)='syzkallers\x00'/32, 0x20, 0x5200}, {&(0x7f0000011200)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x7800}], 0x0, &(0x7f0000011300)) 14:08:38 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) 14:08:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:38 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000040)) 14:08:38 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:38 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000040)) 14:08:38 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0xf6, 0x5, 0x9, "d2a149fd4415c7eb677a5b4636793d2e", "84784878199988e83ac2b08aacac3433328173d0861b22ed067b49bb67940306ca116fdad3c5faa346e20775406e86c9e10af6588da9448ac2effbf9c314da3d416e4b182461ba029338c85552d9e6e5595de04ec055b23e82e644939271ed7aa51fd8f0563211f839595e195b929ecd8d3c9d473048271484cf4c2684e438dd446a0e1e6d086e7f63ae66680bf1eff6cb761cdad0ec32f30256c01fbd7f8ad9b774c70177f2b59747f5584ddf99f9a91c9ddc815dfc147c7b50d0001f826823a2ae3d125fa668d015c73b1cbbe0d4017f14140bd63714baccd9e6f764a4105e7e"}, 0xf6, 0x2) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1015, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) dup2(r1, r0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000018c0)={0x2, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x17) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @initdev}}) socket$inet_udp(0x2, 0x2, 0x0) 14:08:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000400008000f800002000400003000000000000000100000000000000020000000100060000000000000000000000000080002913cb39f153595a4b414c4c4552202046415433322020200e1fbe777cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a0000000000", 0xe0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aa5252614100"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="0000000072724161430000001a000000000000000000000000000000000055aa", 0x20, 0x3e0}, {&(0x7f0000010300)="eb58906d6b66732e66617400020120000400008000f800002000400003000000000000000100000000000000020000000100060000000000000000000000000080002913cb39f153595a4b414c4c4552202046415433322020200e1fbe777cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a0000000000", 0xe0, 0xc00}, {&(0x7f0000010400)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0xde0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0fffffff0f0500000006000000ffffff0fffffff0f090000000a0000000b0000000c0000000d0000000e0000000f00000010000000110000001200000013000000140000001500000016000000170000001800000019000000ffffff0fffffff0f00"/128, 0x80, 0x4000}, {&(0x7f0000010600)="f8ffff0fffffff0ff8ffff0fffffff0f0500000006000000ffffff0fffffff0f090000000a0000000b0000000c0000000d0000000e0000000f00000010000000110000001200000013000000140000001500000016000000170000001800000019000000ffffff0fffffff0f00"/128, 0x80, 0x4200}, {&(0x7f0000010700)="f8ffff0fffffff0ff8ffff0fffffff0f0500000006000000ffffff0fffffff0f090000000a0000000b0000000c0000000d0000000e0000000f00000010000000110000001200000013000000140000001500000016000000170000001800000019000000ffffff0fffffff0f00"/128, 0x80, 0x4400}, {&(0x7f0000010800)="f8ffff0fffffff0ff8ffff0fffffff0f0500000006000000ffffff0fffffff0f090000000a0000000b0000000c0000000d0000000e0000000f00000010000000110000001200000013000000140000001500000016000000170000001800000019000000ffffff0fffffff0f00"/128, 0x80, 0x4600}, {&(0x7f0000010900)="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", 0x120, 0x4800}, {&(0x7f0000010b00)="2e2020202020202020202010000de870325132510000e87032510300000000002e2e20202020202020202010000de870325132510000e870325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202020000de870325132510000e870325104001a040000", 0x80, 0x4a00}, {&(0x7f0000010c00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x4c00}, {&(0x7f0000011100)='syzkallers\x00'/32, 0x20, 0x5200}, {&(0x7f0000011200)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x7800}], 0x0, &(0x7f0000011300)) 14:08:38 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) [ 115.461261] loop4: detected capacity change from 0 to 128 14:08:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000400008000f800002000400003000000000000000100000000000000020000000100060000000000000000000000000080002913cb39f153595a4b414c4c4552202046415433322020200e1fbe777cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a0000000000", 0xe0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aa5252614100"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="0000000072724161430000001a000000000000000000000000000000000055aa", 0x20, 0x3e0}, {&(0x7f0000010300)="eb58906d6b66732e66617400020120000400008000f800002000400003000000000000000100000000000000020000000100060000000000000000000000000080002913cb39f153595a4b414c4c4552202046415433322020200e1fbe777cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a0000000000", 0xe0, 0xc00}, {&(0x7f0000010400)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0xde0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0fffffff0f0500000006000000ffffff0fffffff0f090000000a0000000b0000000c0000000d0000000e0000000f00000010000000110000001200000013000000140000001500000016000000170000001800000019000000ffffff0fffffff0f00"/128, 0x80, 0x4000}, {&(0x7f0000010600)="f8ffff0fffffff0ff8ffff0fffffff0f0500000006000000ffffff0fffffff0f090000000a0000000b0000000c0000000d0000000e0000000f00000010000000110000001200000013000000140000001500000016000000170000001800000019000000ffffff0fffffff0f00"/128, 0x80, 0x4200}, {&(0x7f0000010700)="f8ffff0fffffff0ff8ffff0fffffff0f0500000006000000ffffff0fffffff0f090000000a0000000b0000000c0000000d0000000e0000000f00000010000000110000001200000013000000140000001500000016000000170000001800000019000000ffffff0fffffff0f00"/128, 0x80, 0x4400}, {&(0x7f0000010800)="f8ffff0fffffff0ff8ffff0fffffff0f0500000006000000ffffff0fffffff0f090000000a0000000b0000000c0000000d0000000e0000000f00000010000000110000001200000013000000140000001500000016000000170000001800000019000000ffffff0fffffff0f00"/128, 0x80, 0x4600}, {&(0x7f0000010900)="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", 0x120, 0x4800}, {&(0x7f0000010b00)="2e2020202020202020202010000de870325132510000e87032510300000000002e2e20202020202020202010000de870325132510000e870325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202020000de870325132510000e870325104001a040000", 0x80, 0x4a00}, {&(0x7f0000010c00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x4c00}, {&(0x7f0000011100)='syzkallers\x00'/32, 0x20, 0x5200}, {&(0x7f0000011200)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x7800}], 0x0, &(0x7f0000011300)) [ 115.525061] loop4: detected capacity change from 0 to 128 14:08:38 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x0) 14:08:38 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0xe0000064) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000120) inotify_add_watch(r1, &(0x7f0000002800)='./file0\x00', 0x20000040) 14:08:38 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000003380)={@local, @multicast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "dd02a6", 0x9, 0x11, 0x0, @private0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, {[], {0x0, 0x0, 0x8}}}}}}, 0x0) 14:08:38 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) recvfrom(r0, 0x0, 0x0, 0x40000140, 0x0, 0x0) 14:08:38 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448ca, 0x0) 14:08:38 executing program 1: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockname(0xffffffffffffffff, 0x0, &(0x7f00000004c0)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000500)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) timerfd_create(0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0 VM DIAGNOSIS: 14:08:34 Registers: info registers vcpu 0 RAX=0000000000000069 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff823bd531 RDI=ffffffff8765c9a0 RBP=ffffffff8765c960 RSP=ffff88803d06f340 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000069 R11=0000000000000001 R12=0000000000000069 R13=ffffffff8765c960 R14=0000000000000010 R15=ffffffff823bd520 RIP=ffffffff823bd589 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fc19f1df700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000000000000 CR3=000000000e0e0000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000710000 YMM01=0000000000000000 0000000000000000 0000000000000000 696c61766e49002f YMM02=0000000000000000 0000000000000000 ffffffffffff0f0e 0d0c0b0a09080706 YMM03=0000000000000000 0000000000000000 0000000000000000 000065636172742f YMM04=0000000000000000 0000000000000000 2f2f2f2f2f2f2f2f 2f2f2f2f2f2f2f2f YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000558a5d2da840 ffffffff00000004 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 2f63697361622f63 72732f2e2e000d0a YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000080010001 RBX=ffff88806cf280c0 RCX=0000000000000000 RDX=ffff88802c02b580 RSI=ffffffff81369f3d RDI=0000000000000007 RBP=0000000000000000 RSP=ffff88806cf09dd0 R8 =0000000000000007 R9 =0000000000000000 R10=ffffffffffffff25 R11=0000000000000001 R12=ffffffffffffff25 R13=ffff88803d0377a8 R14=ffff88806cf2a6c0 R15=dffffc0000000000 RIP=ffffffff81369f3d RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fa75612a1f0 CR3=0000000017d28000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 756e696c2d34365f 3638782f62696c2f YMM01=0000000000000000 0000000000000000 6461657268747062 696c2f756e672d78 YMM02=0000000000000000 0000000000000000 00302e6f732e6461 657268747062696c YMM03=0000000000000000 0000000000000000 2f756e672d78756e 696c2d34365f3638 YMM04=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000