Debian GNU/Linux 11 syzkaller ttyS0 Warning: Permanently added '[localhost]:28943' (ECDSA) to the list of known hosts. 2022/10/04 14:17:51 fuzzer started 2022/10/04 14:17:51 dialing manager at localhost:46847 syzkaller login: [ 36.396099] cgroup: Unknown subsys name 'net' [ 36.510208] cgroup: Unknown subsys name 'rlimit' 2022/10/04 14:18:05 syscalls: 2215 2022/10/04 14:18:05 code coverage: enabled 2022/10/04 14:18:05 comparison tracing: enabled 2022/10/04 14:18:05 extra coverage: enabled 2022/10/04 14:18:05 setuid sandbox: enabled 2022/10/04 14:18:05 namespace sandbox: enabled 2022/10/04 14:18:05 Android sandbox: enabled 2022/10/04 14:18:05 fault injection: enabled 2022/10/04 14:18:05 leak checking: enabled 2022/10/04 14:18:05 net packet injection: enabled 2022/10/04 14:18:05 net device setup: enabled 2022/10/04 14:18:05 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/10/04 14:18:05 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/10/04 14:18:05 USB emulation: enabled 2022/10/04 14:18:05 hci packet injection: enabled 2022/10/04 14:18:05 wifi device emulation: failed to parse kernel version (6.0.0-next-20221004) 2022/10/04 14:18:05 802.15.4 emulation: enabled 2022/10/04 14:18:05 fetching corpus: 0, signal 0/2000 (executing program) 2022/10/04 14:18:05 fetching corpus: 50, signal 23735/26862 (executing program) 2022/10/04 14:18:05 fetching corpus: 100, signal 36519/40500 (executing program) 2022/10/04 14:18:05 fetching corpus: 150, signal 42816/47650 (executing program) 2022/10/04 14:18:06 fetching corpus: 200, signal 49132/54598 (executing program) 2022/10/04 14:18:06 fetching corpus: 250, signal 54016/60020 (executing program) 2022/10/04 14:18:06 fetching corpus: 300, signal 57945/64413 (executing program) 2022/10/04 14:18:06 fetching corpus: 350, signal 62918/69567 (executing program) 2022/10/04 14:18:06 fetching corpus: 400, signal 69099/75724 (executing program) 2022/10/04 14:18:06 fetching corpus: 450, signal 72578/79305 (executing program) 2022/10/04 14:18:06 fetching corpus: 500, signal 75381/82216 (executing program) 2022/10/04 14:18:07 fetching corpus: 550, signal 80643/86937 (executing program) 2022/10/04 14:18:07 fetching corpus: 600, signal 83611/89704 (executing program) 2022/10/04 14:18:07 fetching corpus: 650, signal 85099/91263 (executing program) 2022/10/04 14:18:07 fetching corpus: 700, signal 86410/92653 (executing program) 2022/10/04 14:18:07 fetching corpus: 750, signal 90994/96291 (executing program) 2022/10/04 14:18:07 fetching corpus: 800, signal 93193/98109 (executing program) 2022/10/04 14:18:07 fetching corpus: 850, signal 94713/99428 (executing program) 2022/10/04 14:18:07 fetching corpus: 900, signal 96182/100594 (executing program) 2022/10/04 14:18:08 fetching corpus: 950, signal 98375/102175 (executing program) 2022/10/04 14:18:08 fetching corpus: 1000, signal 99863/103259 (executing program) 2022/10/04 14:18:08 fetching corpus: 1050, signal 101673/104722 (executing program) 2022/10/04 14:18:08 fetching corpus: 1100, signal 103453/105817 (executing program) 2022/10/04 14:18:08 fetching corpus: 1150, signal 104849/106691 (executing program) 2022/10/04 14:18:08 fetching corpus: 1200, signal 106174/107481 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/107647 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/107696 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/107747 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/107791 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/107839 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/107896 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/107951 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/108001 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/108048 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/108091 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/108137 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/108188 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/108241 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/108292 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/108350 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/108408 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/108459 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/108499 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/108543 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/108594 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/108622 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/108669 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/108720 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/108767 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/108815 (executing program) 2022/10/04 14:18:08 fetching corpus: 1203, signal 106286/108872 (executing program) 2022/10/04 14:18:09 fetching corpus: 1203, signal 106286/108917 (executing program) 2022/10/04 14:18:09 fetching corpus: 1203, signal 106286/108962 (executing program) 2022/10/04 14:18:09 fetching corpus: 1203, signal 106286/108965 (executing program) 2022/10/04 14:18:09 fetching corpus: 1203, signal 106286/108965 (executing program) 2022/10/04 14:18:11 starting 8 fuzzer processes 14:18:11 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="cc", 0x1, 0xfffffffffffffffc) keyctl$revoke(0x3, r0) add_key(&(0x7f0000001880)='user\x00', &(0x7f00000018c0)={'syz', 0x0}, &(0x7f0000001900)="e7", 0x1, 0xfffffffffffffffe) add_key(&(0x7f00000019c0)='blacklist\x00', 0x0, 0x0, 0x0, r0) 14:18:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000040), 0x4) 14:18:11 executing program 4: setgroups(0x2, &(0x7f00000033c0)=[0x0, 0x0]) getgroups(0x2, &(0x7f0000003400)=[0x0, 0x0]) 14:18:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x80000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400028001000470000004f801002000400003000000000000008000295d20d2f153595a4b414c4c4552202046415431362020200e1fbe5b7cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a00", 0xc0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8fffffff0ffffffffffffff00"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="f8fffffff0ffffffffffffff00"/32, 0x20, 0x400}, {&(0x7f0000010300)="f8fffffff0ffffffffffffff00"/32, 0x20, 0x600}, {&(0x7f0000010400)="f8fffffff0ffffffffffffff00"/32, 0x20, 0x800}, {&(0x7f0000010500)="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", 0x120, 0xa00}, {&(0x7f0000010700)="2e20202020202020202020100080ec70325132510000ec7032510300000000002e2e202020202020202020100080ec70325132510000ec70325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020200080ec70325132510000ec70325104001a040000", 0x80, 0x11800}, {&(0x7f0000010800)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x21800}, {&(0x7f0000010d00)='syzkallers\x00'/32, 0x20, 0x31800}, {&(0x7f0000010e00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x51800}], 0x0, &(0x7f0000010f00)) 14:18:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x9) connect$netlink(r0, &(0x7f00000019c0)=@proc={0x10, 0x0, 0x25dfdbfd}, 0xc) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f0000001b00)={&(0x7f0000001a00), 0xc, &(0x7f0000001ac0)={&(0x7f0000001a80)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}}, 0x28}}, 0x0) 14:18:11 executing program 6: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000700), 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000a40)={{0x0, 0x8}}) 14:18:11 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_mtu(r0, 0x29, 0x39, &(0x7f0000000000), 0x4) [ 56.236803] audit: type=1400 audit(1664893091.782:6): avc: denied { execmem } for pid=286 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 14:18:11 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8919, &(0x7f0000000000)={'lo\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8919, &(0x7f0000000000)={'lo\x00'}) [ 57.656323] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 57.661412] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 57.662686] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 57.664034] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 57.665685] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 57.667247] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 57.668823] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 57.671144] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 57.672277] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 57.673296] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 57.674500] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 57.675555] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 57.676629] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 57.677727] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 57.679232] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 57.680303] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 57.681426] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 57.682464] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 57.683635] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 57.684722] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 57.685958] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 57.692819] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 57.694119] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 57.695330] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 57.696410] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 57.697465] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 57.698722] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 57.699832] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 57.702612] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 57.703888] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 57.704969] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 57.706143] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 57.707402] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 57.708459] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 57.709647] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 57.710859] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 57.712037] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 57.713021] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 57.714252] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 57.715395] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 57.716443] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 57.717689] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 57.731881] Bluetooth: hci5: HCI_REQ-0x0c1a [ 57.733588] Bluetooth: hci3: HCI_REQ-0x0c1a [ 57.736180] Bluetooth: hci4: HCI_REQ-0x0c1a [ 57.742471] Bluetooth: hci2: HCI_REQ-0x0c1a [ 57.742493] Bluetooth: hci6: HCI_REQ-0x0c1a [ 57.743907] Bluetooth: hci1: HCI_REQ-0x0c1a [ 57.748208] Bluetooth: hci0: HCI_REQ-0x0c1a [ 57.750873] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 57.752985] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 57.754688] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 57.757760] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 57.759462] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 57.760841] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 57.793977] Bluetooth: hci7: HCI_REQ-0x0c1a [ 59.769539] Bluetooth: hci1: command 0x0409 tx timeout [ 59.770639] Bluetooth: hci3: command 0x0409 tx timeout [ 59.771552] Bluetooth: hci2: command 0x0409 tx timeout [ 59.772426] Bluetooth: hci0: command 0x0409 tx timeout [ 59.833392] Bluetooth: hci4: command 0x0409 tx timeout [ 59.834405] Bluetooth: hci6: command 0x0409 tx timeout [ 59.835832] Bluetooth: hci5: command 0x0409 tx timeout [ 59.897667] Bluetooth: hci7: command 0x0409 tx timeout [ 61.818026] Bluetooth: hci0: command 0x041b tx timeout [ 61.818851] Bluetooth: hci2: command 0x041b tx timeout [ 61.819992] Bluetooth: hci3: command 0x041b tx timeout [ 61.820739] Bluetooth: hci1: command 0x041b tx timeout [ 61.881442] Bluetooth: hci5: command 0x041b tx timeout [ 61.882868] Bluetooth: hci6: command 0x041b tx timeout [ 61.883637] Bluetooth: hci4: command 0x041b tx timeout [ 61.945190] Bluetooth: hci7: command 0x041b tx timeout [ 63.865195] Bluetooth: hci1: command 0x040f tx timeout [ 63.865663] Bluetooth: hci3: command 0x040f tx timeout [ 63.866106] Bluetooth: hci2: command 0x040f tx timeout [ 63.866515] Bluetooth: hci0: command 0x040f tx timeout [ 63.931539] Bluetooth: hci4: command 0x040f tx timeout [ 63.931968] Bluetooth: hci6: command 0x040f tx timeout [ 63.932412] Bluetooth: hci5: command 0x040f tx timeout [ 63.994141] Bluetooth: hci7: command 0x040f tx timeout [ 65.914196] Bluetooth: hci0: command 0x0419 tx timeout [ 65.914621] Bluetooth: hci2: command 0x0419 tx timeout [ 65.914981] Bluetooth: hci3: command 0x0419 tx timeout [ 65.915777] Bluetooth: hci1: command 0x0419 tx timeout [ 65.977112] Bluetooth: hci5: command 0x0419 tx timeout [ 65.977567] Bluetooth: hci6: command 0x0419 tx timeout [ 65.977970] Bluetooth: hci4: command 0x0419 tx timeout [ 66.042098] Bluetooth: hci7: command 0x0419 tx timeout 14:19:06 executing program 6: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000700), 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000a40)={{0x0, 0x8}}) 14:19:06 executing program 6: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000700), 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000a40)={{0x0, 0x8}}) 14:19:06 executing program 6: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000700), 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000a40)={{0x0, 0x8}}) 14:19:07 executing program 6: syz_emit_ethernet(0x8b, &(0x7f00000000c0)={@multicast, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0x55, 0x2c, 0x0, @private1, @mcast2, {[@routing={0x88}], {0x0, 0x0, 0x4d, 0x0, @gue={{0x2}, "aa729f6ccf30a1f79a1b7b54d72de75960e2f24fb91f91a0e9d8e6db902e6453f0c9ab20587512a2200d045729d9115a8367984a8ed6198e0dabb5ac94"}}}}}}}, 0x0) 14:19:07 executing program 6: syz_emit_ethernet(0x8b, &(0x7f00000000c0)={@multicast, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0x55, 0x2c, 0x0, @private1, @mcast2, {[@routing={0x88}], {0x0, 0x0, 0x4d, 0x0, @gue={{0x2}, "aa729f6ccf30a1f79a1b7b54d72de75960e2f24fb91f91a0e9d8e6db902e6453f0c9ab20587512a2200d045729d9115a8367984a8ed6198e0dabb5ac94"}}}}}}}, 0x0) 14:19:07 executing program 6: syz_emit_ethernet(0x8b, &(0x7f00000000c0)={@multicast, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0x55, 0x2c, 0x0, @private1, @mcast2, {[@routing={0x88}], {0x0, 0x0, 0x4d, 0x0, @gue={{0x2}, "aa729f6ccf30a1f79a1b7b54d72de75960e2f24fb91f91a0e9d8e6db902e6453f0c9ab20587512a2200d045729d9115a8367984a8ed6198e0dabb5ac94"}}}}}}}, 0x0) 14:19:07 executing program 6: syz_emit_ethernet(0x8b, &(0x7f00000000c0)={@multicast, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0x55, 0x2c, 0x0, @private1, @mcast2, {[@routing={0x88}], {0x0, 0x0, 0x4d, 0x0, @gue={{0x2}, "aa729f6ccf30a1f79a1b7b54d72de75960e2f24fb91f91a0e9d8e6db902e6453f0c9ab20587512a2200d045729d9115a8367984a8ed6198e0dabb5ac94"}}}}}}}, 0x0) 14:19:07 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x1036e1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000400)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000c00)}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="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", 0x90a}], 0x1) [ 112.058336] audit: type=1400 audit(1664893147.604:7): avc: denied { open } for pid=3915 comm="syz-executor.6" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 112.059950] audit: type=1400 audit(1664893147.604:8): avc: denied { kernel } for pid=3915 comm="syz-executor.6" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 112.074998] ------------[ cut here ]------------ [ 112.075022] [ 112.075027] ====================================================== [ 112.075030] WARNING: possible circular locking dependency detected [ 112.075035] 6.0.0-next-20221004 #1 Not tainted [ 112.075041] ------------------------------------------------------ [ 112.075044] syz-executor.6/3917 is trying to acquire lock: [ 112.075052] ffffffff853faaf8 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 112.075091] [ 112.075091] but task is already holding lock: [ 112.075094] ffff88800df9a020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 112.075120] [ 112.075120] which lock already depends on the new lock. [ 112.075120] [ 112.075123] [ 112.075123] the existing dependency chain (in reverse order) is: [ 112.075126] [ 112.075126] -> #3 (&ctx->lock){....}-{2:2}: [ 112.075140] _raw_spin_lock+0x2a/0x40 [ 112.075151] __perf_event_task_sched_out+0x53b/0x18d0 [ 112.075163] __schedule+0xedd/0x2470 [ 112.075180] schedule+0xda/0x1b0 [ 112.075194] futex_wait_queue+0xf5/0x1e0 [ 112.075206] futex_wait+0x28e/0x690 [ 112.075216] do_futex+0x2ff/0x380 [ 112.075225] __x64_sys_futex+0x1c6/0x4d0 [ 112.075235] do_syscall_64+0x3b/0x90 [ 112.075253] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 112.075266] [ 112.075266] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 112.075279] _raw_spin_lock_nested+0x30/0x40 [ 112.075290] raw_spin_rq_lock_nested+0x1e/0x30 [ 112.075303] task_fork_fair+0x63/0x4d0 [ 112.075319] sched_cgroup_fork+0x3d0/0x540 [ 112.075333] copy_process+0x4183/0x6e20 [ 112.075344] kernel_clone+0xe7/0x890 [ 112.075353] user_mode_thread+0xad/0xf0 [ 112.075364] rest_init+0x24/0x250 [ 112.075376] arch_call_rest_init+0xf/0x14 [ 112.075394] start_kernel+0x4c6/0x4eb [ 112.075410] secondary_startup_64_no_verify+0xe0/0xeb [ 112.075424] [ 112.075424] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 112.075438] _raw_spin_lock_irqsave+0x39/0x60 [ 112.075449] try_to_wake_up+0xab/0x1930 [ 112.075462] up+0x75/0xb0 [ 112.075476] __up_console_sem+0x6e/0x80 [ 112.075492] console_unlock+0x46a/0x590 [ 112.075508] vprintk_emit+0x1bd/0x560 [ 112.075523] vprintk+0x84/0xa0 [ 112.075539] _printk+0xba/0xf1 [ 112.075551] kauditd_hold_skb.cold+0x3f/0x4e [ 112.075568] kauditd_send_queue+0x233/0x290 [ 112.075582] kauditd_thread+0x5f9/0x9c0 [ 112.075596] kthread+0x2ed/0x3a0 [ 112.075611] ret_from_fork+0x22/0x30 [ 112.075623] [ 112.075623] -> #0 ((console_sem).lock){....}-{2:2}: [ 112.075636] __lock_acquire+0x2a02/0x5e70 [ 112.075653] lock_acquire+0x1a2/0x530 [ 112.075669] _raw_spin_lock_irqsave+0x39/0x60 [ 112.075680] down_trylock+0xe/0x70 [ 112.075695] __down_trylock_console_sem+0x3b/0xd0 [ 112.075711] vprintk_emit+0x16b/0x560 [ 112.075727] vprintk+0x84/0xa0 [ 112.075742] _printk+0xba/0xf1 [ 112.075753] report_bug.cold+0x72/0xab [ 112.075769] handle_bug+0x3c/0x70 [ 112.075778] exc_invalid_op+0x14/0x50 [ 112.075788] asm_exc_invalid_op+0x16/0x20 [ 112.075800] group_sched_out.part.0+0x2c7/0x460 [ 112.075818] ctx_sched_out+0x8f1/0xc10 [ 112.075834] __perf_event_task_sched_out+0x6d0/0x18d0 [ 112.075845] __schedule+0xedd/0x2470 [ 112.075859] schedule+0xda/0x1b0 [ 112.075873] futex_wait_queue+0xf5/0x1e0 [ 112.075883] futex_wait+0x28e/0x690 [ 112.075893] do_futex+0x2ff/0x380 [ 112.075903] __x64_sys_futex+0x1c6/0x4d0 [ 112.075913] do_syscall_64+0x3b/0x90 [ 112.075930] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 112.075943] [ 112.075943] other info that might help us debug this: [ 112.075943] [ 112.075945] Chain exists of: [ 112.075945] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 112.075945] [ 112.075960] Possible unsafe locking scenario: [ 112.075960] [ 112.075962] CPU0 CPU1 [ 112.075964] ---- ---- [ 112.075966] lock(&ctx->lock); [ 112.075972] lock(&rq->__lock); [ 112.075978] lock(&ctx->lock); [ 112.075984] lock((console_sem).lock); [ 112.075990] [ 112.075990] *** DEADLOCK *** [ 112.075990] [ 112.075992] 2 locks held by syz-executor.6/3917: [ 112.075998] #0: ffff88806ce37e98 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 112.076028] #1: ffff88800df9a020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 112.076054] [ 112.076054] stack backtrace: [ 112.076057] CPU: 0 PID: 3917 Comm: syz-executor.6 Not tainted 6.0.0-next-20221004 #1 [ 112.076070] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 112.076078] Call Trace: [ 112.076081] [ 112.076086] dump_stack_lvl+0x8b/0xb3 [ 112.076104] check_noncircular+0x263/0x2e0 [ 112.076121] ? format_decode+0x26c/0xb50 [ 112.076138] ? print_circular_bug+0x450/0x450 [ 112.076155] ? simple_strtoul+0x30/0x30 [ 112.076170] ? __lockdep_reset_lock+0x180/0x180 [ 112.076187] ? format_decode+0x26c/0xb50 [ 112.076204] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 112.076222] __lock_acquire+0x2a02/0x5e70 [ 112.076244] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 112.076266] lock_acquire+0x1a2/0x530 [ 112.076283] ? down_trylock+0xe/0x70 [ 112.076300] ? lock_release+0x750/0x750 [ 112.076317] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 112.076338] ? vprintk+0x84/0xa0 [ 112.076356] _raw_spin_lock_irqsave+0x39/0x60 [ 112.076368] ? down_trylock+0xe/0x70 [ 112.076384] down_trylock+0xe/0x70 [ 112.076401] ? vprintk+0x84/0xa0 [ 112.076417] __down_trylock_console_sem+0x3b/0xd0 [ 112.076435] vprintk_emit+0x16b/0x560 [ 112.076451] ? lock_downgrade+0x6d0/0x6d0 [ 112.076470] vprintk+0x84/0xa0 [ 112.076487] _printk+0xba/0xf1 [ 112.076499] ? record_print_text.cold+0x16/0x16 [ 112.076513] ? hrtimer_try_to_cancel+0x163/0x2c0 [ 112.076527] ? lock_downgrade+0x6d0/0x6d0 [ 112.076545] ? report_bug.cold+0x66/0xab [ 112.076563] ? group_sched_out.part.0+0x2c7/0x460 [ 112.076582] report_bug.cold+0x72/0xab [ 112.076601] handle_bug+0x3c/0x70 [ 112.076611] exc_invalid_op+0x14/0x50 [ 112.076621] asm_exc_invalid_op+0x16/0x20 [ 112.076635] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 112.076655] Code: 5e 41 5f e9 8b ae ef ff e8 86 ae ef ff 65 8b 1d 2b 08 ac 7e 31 ff 89 de e8 26 ab ef ff 85 db 0f 84 8a 00 00 00 e8 69 ae ef ff <0f> 0b e9 a5 fe ff ff e8 5d ae ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 112.076667] RSP: 0018:ffff8880205bf8f8 EFLAGS: 00010006 [ 112.076676] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 112.076683] RDX: ffff88801d4bb580 RSI: ffffffff81566da7 RDI: 0000000000000005 [ 112.076691] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 112.076699] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800df9a000 [ 112.076706] R13: ffff88806ce3d2c0 R14: ffffffff8547c9a0 R15: 0000000000000002 [ 112.076717] ? group_sched_out.part.0+0x2c7/0x460 [ 112.076737] ? group_sched_out.part.0+0x2c7/0x460 [ 112.076757] ctx_sched_out+0x8f1/0xc10 [ 112.076776] __perf_event_task_sched_out+0x6d0/0x18d0 [ 112.076790] ? lock_is_held_type+0xd7/0x130 [ 112.076805] ? __perf_cgroup_move+0x160/0x160 [ 112.076815] ? set_next_entity+0x304/0x550 [ 112.076835] ? lock_is_held_type+0xd7/0x130 [ 112.076850] __schedule+0xedd/0x2470 [ 112.076867] ? io_schedule_timeout+0x150/0x150 [ 112.076883] ? futex_wait_setup+0x166/0x230 [ 112.076898] schedule+0xda/0x1b0 [ 112.076913] futex_wait_queue+0xf5/0x1e0 [ 112.076926] futex_wait+0x28e/0x690 [ 112.076939] ? futex_wait_setup+0x230/0x230 [ 112.076952] ? wake_up_q+0x8b/0xf0 [ 112.076965] ? do_raw_spin_unlock+0x4f/0x220 [ 112.076984] ? futex_wake+0x158/0x490 [ 112.076999] ? lock_downgrade+0x6d0/0x6d0 [ 112.077016] ? lock_is_held_type+0xd7/0x130 [ 112.077032] do_futex+0x2ff/0x380 [ 112.077043] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0 [ 112.077056] ? ktime_get+0x153/0x1f0 [ 112.077072] __x64_sys_futex+0x1c6/0x4d0 [ 112.077084] ? hrtimer_interrupt+0x5b0/0x770 [ 112.077098] ? __x64_sys_futex_time32+0x480/0x480 [ 112.077111] ? syscall_enter_from_user_mode+0x1d/0x50 [ 112.077125] ? syscall_enter_from_user_mode+0x1d/0x50 [ 112.077141] do_syscall_64+0x3b/0x90 [ 112.077160] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 112.077173] RIP: 0033:0x7fdd8bf81b19 [ 112.077182] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 112.077192] RSP: 002b:00007fdd894f7218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 112.077203] RAX: ffffffffffffffda RBX: 00007fdd8c094f68 RCX: 00007fdd8bf81b19 [ 112.077211] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fdd8c094f68 [ 112.077218] RBP: 00007fdd8c094f60 R08: 0000000000000000 R09: 0000000000000000 [ 112.077225] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdd8c094f6c [ 112.077233] R13: 00007ffd020a1ebf R14: 00007fdd894f7300 R15: 0000000000022000 [ 112.077246] [ 112.136247] WARNING: CPU: 0 PID: 3917 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 112.136936] Modules linked in: [ 112.137180] CPU: 0 PID: 3917 Comm: syz-executor.6 Not tainted 6.0.0-next-20221004 #1 [ 112.137743] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 112.138577] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 112.139000] Code: 5e 41 5f e9 8b ae ef ff e8 86 ae ef ff 65 8b 1d 2b 08 ac 7e 31 ff 89 de e8 26 ab ef ff 85 db 0f 84 8a 00 00 00 e8 69 ae ef ff <0f> 0b e9 a5 fe ff ff e8 5d ae ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 112.140352] RSP: 0018:ffff8880205bf8f8 EFLAGS: 00010006 [ 112.140750] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 112.141275] RDX: ffff88801d4bb580 RSI: ffffffff81566da7 RDI: 0000000000000005 [ 112.141823] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 112.142359] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800df9a000 [ 112.142899] R13: ffff88806ce3d2c0 R14: ffffffff8547c9a0 R15: 0000000000000002 [ 112.143436] FS: 00007fdd894f7700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 112.144043] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 112.144470] CR2: 00007f7213bff620 CR3: 0000000020562000 CR4: 0000000000350ef0 [ 112.145001] Call Trace: [ 112.145202] [ 112.145376] ctx_sched_out+0x8f1/0xc10 [ 112.145682] __perf_event_task_sched_out+0x6d0/0x18d0 [ 112.146085] ? lock_is_held_type+0xd7/0x130 [ 112.146429] ? __perf_cgroup_move+0x160/0x160 [ 112.146780] ? set_next_entity+0x304/0x550 [ 112.147113] ? lock_is_held_type+0xd7/0x130 [ 112.147444] __schedule+0xedd/0x2470 [ 112.147741] ? io_schedule_timeout+0x150/0x150 [ 112.148090] ? futex_wait_setup+0x166/0x230 [ 112.148429] schedule+0xda/0x1b0 [ 112.148690] futex_wait_queue+0xf5/0x1e0 [ 112.149000] futex_wait+0x28e/0x690 [ 112.149281] ? futex_wait_setup+0x230/0x230 [ 112.149616] ? wake_up_q+0x8b/0xf0 [ 112.149903] ? do_raw_spin_unlock+0x4f/0x220 [ 112.150250] ? futex_wake+0x158/0x490 [ 112.150543] ? lock_downgrade+0x6d0/0x6d0 [ 112.150865] ? lock_is_held_type+0xd7/0x130 [ 112.151193] do_futex+0x2ff/0x380 [ 112.151468] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0 [ 112.151904] ? ktime_get+0x153/0x1f0 [ 112.152189] __x64_sys_futex+0x1c6/0x4d0 [ 112.152499] ? hrtimer_interrupt+0x5b0/0x770 [ 112.152832] ? __x64_sys_futex_time32+0x480/0x480 [ 112.153201] ? syscall_enter_from_user_mode+0x1d/0x50 [ 112.153593] ? syscall_enter_from_user_mode+0x1d/0x50 [ 112.153994] do_syscall_64+0x3b/0x90 [ 112.154288] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 112.154684] RIP: 0033:0x7fdd8bf81b19 [ 112.154975] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 112.156327] RSP: 002b:00007fdd894f7218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 112.156896] RAX: ffffffffffffffda RBX: 00007fdd8c094f68 RCX: 00007fdd8bf81b19 [ 112.157432] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fdd8c094f68 [ 112.157986] RBP: 00007fdd8c094f60 R08: 0000000000000000 R09: 0000000000000000 [ 112.158528] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdd8c094f6c [ 112.159062] R13: 00007ffd020a1ebf R14: 00007fdd894f7300 R15: 0000000000022000 [ 112.159605] [ 112.159787] irq event stamp: 596 [ 112.160039] hardirqs last enabled at (595): [] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 112.160759] hardirqs last disabled at (596): [] __schedule+0x1225/0x2470 [ 112.161377] softirqs last enabled at (436): [] __irq_exit_rcu+0x11b/0x180 [ 112.162031] softirqs last disabled at (431): [] __irq_exit_rcu+0x11b/0x180 [ 112.162664] ---[ end trace 0000000000000000 ]--- [ 112.296601] loop2: detected capacity change from 0 to 1304 [ 112.619596] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3959 comm=syz-executor.3 [ 112.621344] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3960 comm=syz-executor.3 14:19:08 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="cc", 0x1, 0xfffffffffffffffc) keyctl$revoke(0x3, r0) add_key(&(0x7f0000001880)='user\x00', &(0x7f00000018c0)={'syz', 0x0}, &(0x7f0000001900)="e7", 0x1, 0xfffffffffffffffe) add_key(&(0x7f00000019c0)='blacklist\x00', 0x0, 0x0, 0x0, r0) 14:19:08 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x1036e1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000400)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000c00)}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="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", 0x90a}], 0x1) 14:19:08 executing program 2: io_setup(0x5, &(0x7f0000000140)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000200)={0x77359400}, 0x10) 14:19:08 executing program 4: setgroups(0x2, &(0x7f00000033c0)=[0x0, 0x0]) getgroups(0x2, &(0x7f0000003400)=[0x0, 0x0]) 14:19:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000040), 0x4) 14:19:08 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8919, &(0x7f0000000000)={'lo\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8919, &(0x7f0000000000)={'lo\x00'}) 14:19:08 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_mtu(r0, 0x29, 0x39, &(0x7f0000000000), 0x4) 14:19:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x9) connect$netlink(r0, &(0x7f00000019c0)=@proc={0x10, 0x0, 0x25dfdbfd}, 0xc) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f0000001b00)={&(0x7f0000001a00), 0xc, &(0x7f0000001ac0)={&(0x7f0000001a80)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}}, 0x28}}, 0x0) [ 112.978834] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3981 comm=syz-executor.3 14:19:08 executing program 4: setgroups(0x2, &(0x7f00000033c0)=[0x0, 0x0]) getgroups(0x2, &(0x7f0000003400)=[0x0, 0x0]) 14:19:08 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8919, &(0x7f0000000000)={'lo\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8919, &(0x7f0000000000)={'lo\x00'}) 14:19:08 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="cc", 0x1, 0xfffffffffffffffc) keyctl$revoke(0x3, r0) add_key(&(0x7f0000001880)='user\x00', &(0x7f00000018c0)={'syz', 0x0}, &(0x7f0000001900)="e7", 0x1, 0xfffffffffffffffe) add_key(&(0x7f00000019c0)='blacklist\x00', 0x0, 0x0, 0x0, r0) 14:19:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x9) connect$netlink(r0, &(0x7f00000019c0)=@proc={0x10, 0x0, 0x25dfdbfd}, 0xc) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f0000001b00)={&(0x7f0000001a00), 0xc, &(0x7f0000001ac0)={&(0x7f0000001a80)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}}, 0x28}}, 0x0) 14:19:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000040), 0x4) 14:19:08 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8919, &(0x7f0000000000)={'lo\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8919, &(0x7f0000000000)={'lo\x00'}) 14:19:08 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_mtu(r0, 0x29, 0x39, &(0x7f0000000000), 0x4) 14:19:08 executing program 2: io_setup(0x5, &(0x7f0000000140)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000200)={0x77359400}, 0x10) 14:19:08 executing program 4: setgroups(0x2, &(0x7f00000033c0)=[0x0, 0x0]) getgroups(0x2, &(0x7f0000003400)=[0x0, 0x0]) 14:19:08 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x1036e1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000400)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000c00)}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="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", 0x90a}], 0x1) [ 113.120693] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4003 comm=syz-executor.3 14:19:08 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="cc", 0x1, 0xfffffffffffffffc) keyctl$revoke(0x3, r0) add_key(&(0x7f0000001880)='user\x00', &(0x7f00000018c0)={'syz', 0x0}, &(0x7f0000001900)="e7", 0x1, 0xfffffffffffffffe) add_key(&(0x7f00000019c0)='blacklist\x00', 0x0, 0x0, 0x0, r0) 14:19:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000040), 0x4) 14:19:08 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x1036e1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000400)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000c00)}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="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", 0x90a}], 0x1) 14:19:08 executing program 7: io_setup(0x5, &(0x7f0000000140)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000200)={0x77359400}, 0x10) 14:19:08 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="cc", 0x1, 0xfffffffffffffffc) keyctl$revoke(0x3, r0) add_key(&(0x7f0000001880)='user\x00', &(0x7f00000018c0)={'syz', 0x0}, &(0x7f0000001900)="e7", 0x1, 0xfffffffffffffffe) add_key(&(0x7f00000019c0)='blacklist\x00', 0x0, 0x0, 0x0, r0) 14:19:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x9) connect$netlink(r0, &(0x7f00000019c0)=@proc={0x10, 0x0, 0x25dfdbfd}, 0xc) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f0000001b00)={&(0x7f0000001a00), 0xc, &(0x7f0000001ac0)={&(0x7f0000001a80)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}}, 0x28}}, 0x0) 14:19:08 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_mtu(r0, 0x29, 0x39, &(0x7f0000000000), 0x4) 14:19:08 executing program 2: io_setup(0x5, &(0x7f0000000140)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000200)={0x77359400}, 0x10) 14:19:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x9) connect$netlink(r0, &(0x7f00000019c0)=@proc={0x10, 0x0, 0x25dfdbfd}, 0xc) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f0000001b00)={&(0x7f0000001a00), 0xc, &(0x7f0000001ac0)={&(0x7f0000001a80)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}}, 0x28}}, 0x0) [ 113.271540] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4020 comm=syz-executor.0 [ 113.274427] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4022 comm=syz-executor.3 14:19:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8919, &(0x7f0000000000)={'lo\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8919, &(0x7f0000000000)={'lo\x00'}) 14:19:08 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="cc", 0x1, 0xfffffffffffffffc) keyctl$revoke(0x3, r0) add_key(&(0x7f0000001880)='user\x00', &(0x7f00000018c0)={'syz', 0x0}, &(0x7f0000001900)="e7", 0x1, 0xfffffffffffffffe) add_key(&(0x7f00000019c0)='blacklist\x00', 0x0, 0x0, 0x0, r0) 14:19:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file1\x00') link(&(0x7f0000001200)='./file1\x00', &(0x7f0000001240)='./file0\x00') 14:19:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x9) connect$netlink(r0, &(0x7f00000019c0)=@proc={0x10, 0x0, 0x25dfdbfd}, 0xc) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f0000001b00)={&(0x7f0000001a00), 0xc, &(0x7f0000001ac0)={&(0x7f0000001a80)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}}, 0x28}}, 0x0) 14:19:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8919, &(0x7f0000000000)={'lo\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8919, &(0x7f0000000000)={'lo\x00'}) [ 113.361513] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4031 comm=syz-executor.0 14:19:08 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000c00)={0x0, 0x81}) 14:19:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x9) connect$netlink(r0, &(0x7f00000019c0)=@proc={0x10, 0x0, 0x25dfdbfd}, 0xc) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f0000001b00)={&(0x7f0000001a00), 0xc, &(0x7f0000001ac0)={&(0x7f0000001a80)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}}, 0x28}}, 0x0) 14:19:08 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="cc", 0x1, 0xfffffffffffffffc) keyctl$revoke(0x3, r0) add_key(&(0x7f0000001880)='user\x00', &(0x7f00000018c0)={'syz', 0x0}, &(0x7f0000001900)="e7", 0x1, 0xfffffffffffffffe) add_key(&(0x7f00000019c0)='blacklist\x00', 0x0, 0x0, 0x0, r0) 14:19:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file1\x00') link(&(0x7f0000001200)='./file1\x00', &(0x7f0000001240)='./file0\x00') [ 113.436850] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4038 comm=syz-executor.0 14:19:09 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000c00)={0x0, 0x81}) 14:19:09 executing program 7: io_setup(0x5, &(0x7f0000000140)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000200)={0x77359400}, 0x10) 14:19:09 executing program 2: io_setup(0x5, &(0x7f0000000140)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000200)={0x77359400}, 0x10) 14:19:09 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file1\x00') link(&(0x7f0000001200)='./file1\x00', &(0x7f0000001240)='./file0\x00') 14:19:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file1\x00') link(&(0x7f0000001200)='./file1\x00', &(0x7f0000001240)='./file0\x00') 14:19:09 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) write$P9_RLINK(r0, &(0x7f00000003c0)={0x7}, 0x7) write$P9_RLOCK(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000900)={0x43}, 0x43) 14:19:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8919, &(0x7f0000000000)={'lo\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8919, &(0x7f0000000000)={'lo\x00'}) 14:19:09 executing program 1: r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fcntl$addseals(r0, 0x40a, 0x0) [ 113.506409] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=9 sclass=netlink_xfrm_socket pid=4054 comm=syz-executor.0 14:19:09 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000c00)={0x0, 0x81}) 14:19:09 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file1\x00') link(&(0x7f0000001200)='./file1\x00', &(0x7f0000001240)='./file0\x00') 14:19:09 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) 14:19:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file1\x00') link(&(0x7f0000001200)='./file1\x00', &(0x7f0000001240)='./file0\x00') 14:19:09 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) write$P9_RLINK(r0, &(0x7f00000003c0)={0x7}, 0x7) write$P9_RLOCK(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000900)={0x43}, 0x43) 14:19:09 executing program 1: r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fcntl$addseals(r0, 0x40a, 0x0) 14:19:09 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file1\x00') link(&(0x7f0000001200)='./file1\x00', &(0x7f0000001240)='./file0\x00') 14:19:09 executing program 7: io_setup(0x5, &(0x7f0000000140)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000200)={0x77359400}, 0x10) 14:19:09 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000c00)={0x0, 0x81}) [ 113.625690] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=9 sclass=netlink_xfrm_socket pid=4070 comm=syz-executor.0 14:19:09 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) 14:19:09 executing program 1: r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fcntl$addseals(r0, 0x40a, 0x0) 14:19:09 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) write$P9_RLINK(r0, &(0x7f00000003c0)={0x7}, 0x7) write$P9_RLOCK(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000900)={0x43}, 0x43) 14:19:09 executing program 6: r0 = fork() ptrace$peek(0x3, r0, &(0x7f0000000000)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) get_robust_list(r2, &(0x7f0000000180)=&(0x7f0000000140)={&(0x7f0000000100)={&(0x7f00000000c0)}}, &(0x7f00000001c0)=0x18) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000240)={r1, 0x3, r3, 0xa6, 0x80000}) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setpgid(r2, r2) get_robust_list(r2, &(0x7f0000000300)=&(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, &(0x7f0000000340)=0x18) fork() 14:19:09 executing program 2: r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fcntl$addseals(r0, 0x40a, 0x0) 14:19:09 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x20, &(0x7f0000000000)) 14:19:09 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) 14:19:09 executing program 1: r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fcntl$addseals(r0, 0x40a, 0x0) 14:19:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) [ 113.852021] loop7: detected capacity change from 0 to 5 [ 113.853037] ======================================================= 14:19:09 executing program 7: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 113.853037] WARNING: The mand mount option has been deprecated and [ 113.853037] and is ignored by this kernel. Remove the mand [ 113.853037] option from the mount to silence this warning. [ 113.853037] ======================================================= 14:19:09 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) write$P9_RLINK(r0, &(0x7f00000003c0)={0x7}, 0x7) write$P9_RLOCK(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000900)={0x43}, 0x43) [ 113.872370] loop3: detected capacity change from 0 to 264192 14:19:09 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) [ 113.875741] FAT-fs (loop3): Unrecognized mount option "000000000000055623507461844674407370955161500000000000000000000004" or missing value 14:19:09 executing program 1: perf_event_open(&(0x7f0000001c00)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:19:09 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x20, &(0x7f0000000000)) 14:19:09 executing program 2: r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fcntl$addseals(r0, 0x40a, 0x0) 14:19:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x163008, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xa8, &(0x7f0000000240)={[{@inode_readahead_blks}]}) [ 113.956290] loop7: detected capacity change from 0 to 5 [ 113.988734] EXT4-fs (sda): re-mounted. Quota mode: none. [ 113.990967] EXT4-fs (sda): re-mounted. Quota mode: none. 14:19:09 executing program 2: r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fcntl$addseals(r0, 0x40a, 0x0) 14:19:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 14:19:09 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 14:19:09 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x20, &(0x7f0000000000)) 14:19:09 executing program 6: r0 = fork() ptrace$peek(0x3, r0, &(0x7f0000000000)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) get_robust_list(r2, &(0x7f0000000180)=&(0x7f0000000140)={&(0x7f0000000100)={&(0x7f00000000c0)}}, &(0x7f00000001c0)=0x18) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000240)={r1, 0x3, r3, 0xa6, 0x80000}) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setpgid(r2, r2) get_robust_list(r2, &(0x7f0000000300)=&(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, &(0x7f0000000340)=0x18) fork() [ 114.032791] loop7: detected capacity change from 0 to 5 14:19:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x163008, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xa8, &(0x7f0000000240)={[{@inode_readahead_blks}]}) 14:19:09 executing program 7: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 114.050881] loop3: detected capacity change from 0 to 264192 [ 114.057748] loop0: detected capacity change from 0 to 264192 [ 114.058276] loop4: detected capacity change from 0 to 5 14:19:09 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 114.079324] EXT4-fs (sda): re-mounted. Quota mode: none. 14:19:09 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x20, &(0x7f0000000000)) [ 114.083408] FAT-fs (loop3): Unrecognized mount option "000000000000063477553251844674407370955161500000000000000000000004" or missing value [ 114.096388] FAT-fs (loop0): Unrecognized mount option "000000000000010300441011844674407370955161500000000000000000000004" or missing value 14:19:09 executing program 2: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 114.104288] loop2: detected capacity change from 0 to 5 14:19:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x163008, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xa8, &(0x7f0000000240)={[{@inode_readahead_blks}]}) 14:19:09 executing program 7: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:19:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 14:19:09 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:19:09 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) [ 114.172818] loop7: detected capacity change from 0 to 5 [ 114.175307] EXT4-fs (sda): re-mounted. Quota mode: none. [ 114.195046] loop4: detected capacity change from 0 to 5 14:19:09 executing program 2: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:19:09 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:19:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x163008, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xa8, &(0x7f0000000240)={[{@inode_readahead_blks}]}) [ 114.224915] loop5: detected capacity change from 0 to 5 [ 114.225475] loop3: detected capacity change from 0 to 264192 [ 114.241813] FAT-fs (loop3): Unrecognized mount option "000000000000055662547211844674407370955161500000000000000000000004" or missing value [ 114.243935] loop0: detected capacity change from 0 to 264192 [ 114.251043] loop2: detected capacity change from 0 to 5 [ 114.263728] EXT4-fs (sda): re-mounted. Quota mode: none. [ 114.267013] FAT-fs (loop0): Unrecognized mount option "000000000000070337041661844674407370955161500000000000000000000004" or missing value 14:19:09 executing program 7: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:19:09 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:19:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 14:19:09 executing program 6: r0 = fork() ptrace$peek(0x3, r0, &(0x7f0000000000)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) get_robust_list(r2, &(0x7f0000000180)=&(0x7f0000000140)={&(0x7f0000000100)={&(0x7f00000000c0)}}, &(0x7f00000001c0)=0x18) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000240)={r1, 0x3, r3, 0xa6, 0x80000}) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setpgid(r2, r2) get_robust_list(r2, &(0x7f0000000300)=&(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, &(0x7f0000000340)=0x18) fork() 14:19:09 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:19:09 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:19:09 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 14:19:09 executing program 2: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 114.356507] loop1: detected capacity change from 0 to 5 [ 114.357656] loop4: detected capacity change from 0 to 5 [ 114.360622] loop7: detected capacity change from 0 to 5 [ 114.367469] loop5: detected capacity change from 0 to 5 [ 114.368663] loop2: detected capacity change from 0 to 5 [ 114.381119] loop3: detected capacity change from 0 to 264192 [ 114.384076] hrtimer: interrupt took 23094 ns [ 114.388564] loop0: detected capacity change from 0 to 264192 [ 114.395888] FAT-fs (loop3): Unrecognized mount option "000000000000056201524221844674407370955161500000000000000000000004" or missing value [ 114.402450] FAT-fs (loop0): Unrecognized mount option "000000000000047627065641844674407370955161500000000000000000000004" or missing value 14:19:09 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 114.477546] loop5: detected capacity change from 0 to 5 14:19:10 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:19:10 executing program 2: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 114.591187] loop2: detected capacity change from 0 to 5 [ 114.622873] loop1: detected capacity change from 0 to 5 14:19:10 executing program 3: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 114.642847] loop3: detected capacity change from 0 to 5 14:19:10 executing program 2: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:19:10 executing program 0: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:19:10 executing program 6: r0 = fork() ptrace$peek(0x3, r0, &(0x7f0000000000)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) get_robust_list(r2, &(0x7f0000000180)=&(0x7f0000000140)={&(0x7f0000000100)={&(0x7f00000000c0)}}, &(0x7f00000001c0)=0x18) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200), 0x103000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000240)={r1, 0x3, r3, 0xa6, 0x80000}) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setpgid(r2, r2) get_robust_list(r2, &(0x7f0000000300)=&(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, &(0x7f0000000340)=0x18) fork() [ 114.661010] loop0: detected capacity change from 0 to 5 [ 114.685845] loop2: detected capacity change from 0 to 5 [ 114.717721] loop5: detected capacity change from 0 to 5 14:19:10 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 114.846334] loop2: detected capacity change from 0 to 5 [ 114.849418] loop5: detected capacity change from 0 to 5 [ 114.867705] loop7: detected capacity change from 0 to 5 [ 114.876816] loop0: detected capacity change from 0 to 5 [ 114.882305] loop1: detected capacity change from 0 to 5 [ 114.883454] loop4: detected capacity change from 0 to 5 [ 114.884323] loop3: detected capacity change from 0 to 5 14:19:10 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:19:10 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@c VM DIAGNOSIS: 14:19:07 Registers: info registers vcpu 0 RAX=0000000000000065 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff823bd531 RDI=ffffffff8765c9a0 RBP=ffffffff8765c960 RSP=ffff8880205bf340 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000065 R11=0000000000000001 R12=0000000000000065 R13=ffffffff8765c960 R14=0000000000000010 R15=ffffffff823bd520 RIP=ffffffff823bd589 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fdd894f7700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f7213bff620 CR3=0000000020562000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007fdd8c0687c0 00007fdd8c0687c8 YMM02=0000000000000000 0000000000000000 00007fdd8c0687e0 00007fdd8c0687c0 YMM03=0000000000000000 0000000000000000 00007fdd8c0687c8 00007fdd8c0687c0 YMM04=0000000000000000 0000000000000000 ffffffffffffff00 ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=0000000000000003 RCX=ffffffff840e641f RDX=ffff88801054d040 RSI=0000000000000000 RDI=0000000000000005 RBP=ffffffff84e03500 RSP=ffff88803d84f6a0 R8 =0000000000000005 R9 =0000000000000003 R10=0000000000000001 R11=0000000000000001 R12=0000000000000001 R13=0000000000000005 R14=0000000000000003 R15=dffffc0000000000 RIP=ffffffff814617ac RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f76fa8f7368 CR3=000000000e8dc000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 756e696c2d34365f 3638782f62696c2f YMM01=0000000000000000 0000000000000000 322e6f732e6c6462 696c2f756e672d78 YMM02=0000000000000000 0000000000000000 00322e6f732e6c64 62696c2f756e672d YMM03=0000000000000000 0000000000000000 78756e696c2d3436 5f3638782f62696c YMM04=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000