Debian GNU/Linux 11 syzkaller ttyS0 Warning: Permanently added '[localhost]:53884' (ECDSA) to the list of known hosts. 2022/10/05 11:03:28 fuzzer started 2022/10/05 11:03:28 dialing manager at localhost:37193 syzkaller login: [ 35.425275] cgroup: Unknown subsys name 'net' [ 35.513389] cgroup: Unknown subsys name 'rlimit' 2022/10/05 11:03:42 syscalls: 2215 2022/10/05 11:03:42 code coverage: enabled 2022/10/05 11:03:42 comparison tracing: enabled 2022/10/05 11:03:42 extra coverage: enabled 2022/10/05 11:03:42 setuid sandbox: enabled 2022/10/05 11:03:42 namespace sandbox: enabled 2022/10/05 11:03:42 Android sandbox: enabled 2022/10/05 11:03:42 fault injection: enabled 2022/10/05 11:03:42 leak checking: enabled 2022/10/05 11:03:42 net packet injection: enabled 2022/10/05 11:03:42 net device setup: enabled 2022/10/05 11:03:42 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/10/05 11:03:42 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/10/05 11:03:42 USB emulation: enabled 2022/10/05 11:03:42 hci packet injection: enabled 2022/10/05 11:03:42 wifi device emulation: failed to parse kernel version (6.0.0-next-20221005) 2022/10/05 11:03:42 802.15.4 emulation: enabled 2022/10/05 11:03:42 fetching corpus: 0, signal 0/2000 (executing program) 2022/10/05 11:03:42 fetching corpus: 50, signal 23520/26595 (executing program) 2022/10/05 11:03:42 fetching corpus: 100, signal 36624/40474 (executing program) 2022/10/05 11:03:42 fetching corpus: 150, signal 45768/50102 (executing program) 2022/10/05 11:03:42 fetching corpus: 200, signal 51217/56093 (executing program) 2022/10/05 11:03:42 fetching corpus: 250, signal 54220/59734 (executing program) 2022/10/05 11:03:43 fetching corpus: 300, signal 60396/65924 (executing program) 2022/10/05 11:03:43 fetching corpus: 350, signal 65404/70956 (executing program) 2022/10/05 11:03:43 fetching corpus: 400, signal 69247/74772 (executing program) 2022/10/05 11:03:43 fetching corpus: 450, signal 72836/78245 (executing program) 2022/10/05 11:03:43 fetching corpus: 500, signal 75466/80836 (executing program) 2022/10/05 11:03:43 fetching corpus: 550, signal 77633/83005 (executing program) 2022/10/05 11:03:43 fetching corpus: 600, signal 80058/85267 (executing program) 2022/10/05 11:03:43 fetching corpus: 650, signal 82227/87234 (executing program) 2022/10/05 11:03:44 fetching corpus: 700, signal 84950/89518 (executing program) 2022/10/05 11:03:44 fetching corpus: 750, signal 87366/91464 (executing program) 2022/10/05 11:03:44 fetching corpus: 800, signal 88857/92690 (executing program) 2022/10/05 11:03:44 fetching corpus: 850, signal 90828/94169 (executing program) 2022/10/05 11:03:44 fetching corpus: 900, signal 92271/95232 (executing program) 2022/10/05 11:03:44 fetching corpus: 950, signal 93961/96388 (executing program) 2022/10/05 11:03:44 fetching corpus: 1000, signal 95559/97431 (executing program) 2022/10/05 11:03:45 fetching corpus: 1050, signal 97063/98387 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/98705 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/98749 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/98795 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/98837 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/98876 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/98922 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/98967 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/99016 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/99063 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/99110 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/99162 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/99208 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/99251 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/99307 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/99364 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/99412 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/99463 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/99503 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/99559 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/99607 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/99651 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/99709 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/99750 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/99810 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/99860 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/99919 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/99957 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/100007 (executing program) 2022/10/05 11:03:45 fetching corpus: 1086, signal 97534/100007 (executing program) 2022/10/05 11:03:48 starting 8 fuzzer processes 11:03:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') pread64(r0, &(0x7f0000000180)=""/16, 0x2f00, 0x0) 11:03:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)={0x2c, 0x2c, 0x1, 0x0, 0x0, "", [@typed={0x11, 0x0, 0x0, 0x0, @binary="d8c93112d53774fb2e1ea05d01"}, @nested={0x5, 0xa, 0x0, 0x1, [@generic="c9"]}]}, 0x2c}], 0x1}, 0x0) 11:03:48 executing program 2: socket(0x29, 0x0, 0x0) 11:03:48 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) recvfrom(r0, 0x0, 0x0, 0x1, 0x0, 0x0) [ 54.687395] audit: type=1400 audit(1664967828.315:6): avc: denied { execmem } for pid=285 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 11:03:48 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000080), 0x4) 11:03:48 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000017a00), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000180)) 11:03:48 executing program 6: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00') readlink(&(0x7f0000000680)='./file1\x00', &(0x7f0000000100)=""/251, 0xfb) readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000000200)=""/209, 0xd1) 11:03:48 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001b80)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c, 0x0, 0x0, &(0x7f0000001c40)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @multicast2}}}}, @pktinfo={{0x24, 0x29, 0x32, {@empty}}}], 0x50}}], 0x2, 0x0) [ 56.013512] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 56.015424] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 56.017244] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 56.020590] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 56.022575] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 56.023997] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 56.029260] Bluetooth: hci0: HCI_REQ-0x0c1a [ 56.055330] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 56.056818] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 56.058397] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 56.059394] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 56.060659] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 56.061676] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 56.067817] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 56.068904] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 56.071803] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 56.072851] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 56.075242] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 56.076268] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 56.081762] Bluetooth: hci1: HCI_REQ-0x0c1a [ 56.084038] Bluetooth: hci2: HCI_REQ-0x0c1a [ 56.170458] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 56.172377] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 56.173826] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 56.177830] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 56.178984] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 56.180426] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 56.181917] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 56.183886] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 56.190912] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 56.194377] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 56.194510] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 56.199791] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 56.199906] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 56.200985] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 56.204747] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 56.205992] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 56.211039] Bluetooth: hci3: HCI_REQ-0x0c1a [ 56.214956] Bluetooth: hci6: HCI_REQ-0x0c1a [ 56.239555] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 56.247704] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 56.273850] Bluetooth: hci7: HCI_REQ-0x0c1a [ 58.094043] Bluetooth: hci1: command 0x0409 tx timeout [ 58.094064] Bluetooth: hci0: command 0x0409 tx timeout [ 58.156560] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 58.156615] Bluetooth: hci5: Opcode 0x c03 failed: -110 [ 58.157928] Bluetooth: hci2: command 0x0409 tx timeout [ 58.220586] Bluetooth: hci6: command 0x0409 tx timeout [ 58.221171] Bluetooth: hci3: command 0x0409 tx timeout [ 58.348601] Bluetooth: hci7: command 0x0409 tx timeout [ 60.140544] Bluetooth: hci0: command 0x041b tx timeout [ 60.141642] Bluetooth: hci1: command 0x041b tx timeout [ 60.204614] Bluetooth: hci2: command 0x041b tx timeout [ 60.268558] Bluetooth: hci3: command 0x041b tx timeout [ 60.268986] Bluetooth: hci6: command 0x041b tx timeout [ 60.396616] Bluetooth: hci7: command 0x041b tx timeout [ 61.126028] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 61.136468] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 61.137624] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 61.146849] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 61.156115] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 61.174271] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 61.192538] Bluetooth: hci5: HCI_REQ-0x0c1a [ 62.188752] Bluetooth: hci1: command 0x040f tx timeout [ 62.188775] Bluetooth: hci0: command 0x040f tx timeout [ 62.252532] Bluetooth: hci2: command 0x040f tx timeout [ 62.316544] Bluetooth: hci6: command 0x040f tx timeout [ 62.316986] Bluetooth: hci3: command 0x040f tx timeout [ 62.444535] Bluetooth: hci7: command 0x040f tx timeout [ 63.148754] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 63.212736] Bluetooth: hci5: command 0x0409 tx timeout [ 64.236577] Bluetooth: hci0: command 0x0419 tx timeout [ 64.237699] Bluetooth: hci1: command 0x0419 tx timeout [ 64.300601] Bluetooth: hci2: command 0x0419 tx timeout [ 64.364704] Bluetooth: hci3: command 0x0419 tx timeout [ 64.365469] Bluetooth: hci6: command 0x0419 tx timeout [ 64.492697] Bluetooth: hci7: command 0x0419 tx timeout [ 65.260585] Bluetooth: hci5: command 0x041b tx timeout [ 67.308549] Bluetooth: hci5: command 0x040f tx timeout [ 67.820588] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 69.356599] Bluetooth: hci5: command 0x0419 tx timeout [ 70.281343] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 70.286032] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 70.289008] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 70.299909] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 70.301330] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 70.305604] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 70.310614] Bluetooth: hci4: HCI_REQ-0x0c1a [ 72.364629] Bluetooth: hci4: command 0x0409 tx timeout [ 74.412634] Bluetooth: hci4: command 0x041b tx timeout [ 76.460545] Bluetooth: hci4: command 0x040f tx timeout [ 78.508578] Bluetooth: hci4: command 0x0419 tx timeout 11:04:46 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') pread64(r0, &(0x7f0000000180)=""/16, 0x2f00, 0x0) 11:04:46 executing program 2: socket(0x29, 0x0, 0x0) 11:04:46 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001b80)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c, 0x0, 0x0, &(0x7f0000001c40)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @multicast2}}}}, @pktinfo={{0x24, 0x29, 0x32, {@empty}}}], 0x50}}], 0x2, 0x0) 11:04:46 executing program 6: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00') readlink(&(0x7f0000000680)='./file1\x00', &(0x7f0000000100)=""/251, 0xfb) readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000000200)=""/209, 0xd1) 11:04:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)={0x2c, 0x2c, 0x1, 0x0, 0x0, "", [@typed={0x11, 0x0, 0x0, 0x0, @binary="d8c93112d53774fb2e1ea05d01"}, @nested={0x5, 0xa, 0x0, 0x1, [@generic="c9"]}]}, 0x2c}], 0x1}, 0x0) 11:04:46 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000017a00), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000180)) 11:04:46 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) recvfrom(r0, 0x0, 0x0, 0x1, 0x0, 0x0) 11:04:46 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000080), 0x4) 11:04:46 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000017a00), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000180)) 11:04:46 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001b80)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c, 0x0, 0x0, &(0x7f0000001c40)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @multicast2}}}}, @pktinfo={{0x24, 0x29, 0x32, {@empty}}}], 0x50}}], 0x2, 0x0) 11:04:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)={0x2c, 0x2c, 0x1, 0x0, 0x0, "", [@typed={0x11, 0x0, 0x0, 0x0, @binary="d8c93112d53774fb2e1ea05d01"}, @nested={0x5, 0xa, 0x0, 0x1, [@generic="c9"]}]}, 0x2c}], 0x1}, 0x0) 11:04:46 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') pread64(r0, &(0x7f0000000180)=""/16, 0x2f00, 0x0) 11:04:46 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) recvfrom(r0, 0x0, 0x0, 0x1, 0x0, 0x0) 11:04:46 executing program 6: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00') readlink(&(0x7f0000000680)='./file1\x00', &(0x7f0000000100)=""/251, 0xfb) readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000000200)=""/209, 0xd1) 11:04:46 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000080), 0x4) 11:04:46 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000017a00), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000180)) 11:04:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)={0x2c, 0x2c, 0x1, 0x0, 0x0, "", [@typed={0x11, 0x0, 0x0, 0x0, @binary="d8c93112d53774fb2e1ea05d01"}, @nested={0x5, 0xa, 0x0, 0x1, [@generic="c9"]}]}, 0x2c}], 0x1}, 0x0) 11:04:46 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') pread64(r0, &(0x7f0000000180)=""/16, 0x2f00, 0x0) 11:04:46 executing program 2: socket(0x29, 0x0, 0x0) 11:04:46 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001b80)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c, 0x0, 0x0, &(0x7f0000001c40)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @multicast2}}}}, @pktinfo={{0x24, 0x29, 0x32, {@empty}}}], 0x50}}], 0x2, 0x0) 11:04:46 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) recvfrom(r0, 0x0, 0x0, 0x1, 0x0, 0x0) 11:04:46 executing program 6: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00') readlink(&(0x7f0000000680)='./file1\x00', &(0x7f0000000100)=""/251, 0xfb) readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000000200)=""/209, 0xd1) 11:04:46 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000080), 0x4) 11:04:46 executing program 7: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00') readlink(&(0x7f0000000680)='./file1\x00', &(0x7f0000000100)=""/251, 0xfb) readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000000200)=""/209, 0xd1) 11:04:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') pread64(r0, &(0x7f0000000180)=""/16, 0x2f00, 0x0) 11:04:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 11:04:46 executing program 0: syz_mount_image$iso9660(&(0x7f0000001840), &(0x7f0000001880)='./file1\x00', 0x0, 0x1, &(0x7f0000001900)=[{&(0x7f00000018c0)="da", 0x1}], 0x0, &(0x7f0000001940)={[{}, {@mode}, {@sbsector}, {@block={'block', 0x3d, 0x200}}], [{@appraise}]}) 11:04:46 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004f00)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f00000004c0)=[@hopopts_2292={{0x18}}], 0x18}}, {{&(0x7f0000000580)={0xa, 0x0, 0x0, @private1}, 0x1c, &(0x7f0000001c00)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x2, 0x0) 11:04:46 executing program 5: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CDROM_GET_MCN(0xffffffffffffffff, 0x5311, 0x0) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, 0x0, 0x20000005) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) 11:04:46 executing program 6: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x80) [ 113.404292] audit: type=1400 audit(1664967887.032:7): avc: denied { open } for pid=4008 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 113.407091] audit: type=1400 audit(1664967887.032:8): avc: denied { kernel } for pid=4008 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 113.427655] ------------[ cut here ]------------ 11:04:47 executing program 2: socket(0x29, 0x0, 0x0) [ 113.427693] [ 113.427699] ====================================================== [ 113.427705] WARNING: possible circular locking dependency detected [ 113.427713] 6.0.0-next-20221005 #1 Not tainted [ 113.427725] ------------------------------------------------------ [ 113.427731] syz-executor.5/4015 is trying to acquire lock: [ 113.427743] ffffffff853faaf8 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 113.427814] [ 113.427814] but task is already holding lock: [ 113.427819] ffff88800f166420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 113.427870] [ 113.427870] which lock already depends on the new lock. [ 113.427870] [ 113.427876] [ 113.427876] the existing dependency chain (in reverse order) is: [ 113.427882] [ 113.427882] -> #3 (&ctx->lock){....}-{2:2}: [ 113.427909] _raw_spin_lock+0x2a/0x40 [ 113.427932] __perf_event_task_sched_out+0x53b/0x18d0 [ 113.427954] __schedule+0xedd/0x2470 [ 113.427983] schedule+0xda/0x1b0 [ 113.428011] exit_to_user_mode_prepare+0x114/0x1a0 [ 113.428034] syscall_exit_to_user_mode+0x19/0x40 [ 113.428061] do_syscall_64+0x48/0x90 [ 113.428080] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 113.428107] [ 113.428107] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 113.428133] _raw_spin_lock_nested+0x30/0x40 [ 113.428156] raw_spin_rq_lock_nested+0x1e/0x30 [ 113.428180] task_fork_fair+0x63/0x4d0 [ 113.428214] sched_cgroup_fork+0x3d0/0x540 [ 113.428242] copy_process+0x4183/0x6e20 [ 113.428262] kernel_clone+0xe7/0x890 [ 113.428281] user_mode_thread+0xad/0xf0 [ 113.428302] rest_init+0x24/0x250 [ 113.428327] arch_call_rest_init+0xf/0x14 [ 113.428364] start_kernel+0x4c6/0x4eb [ 113.428413] secondary_startup_64_no_verify+0xe0/0xeb [ 113.428453] [ 113.428453] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 113.428484] _raw_spin_lock_irqsave+0x39/0x60 [ 113.428507] try_to_wake_up+0xab/0x1930 [ 113.428533] up+0x75/0xb0 [ 113.428562] __up_console_sem+0x6e/0x80 [ 113.428593] console_unlock+0x46a/0x590 [ 113.428624] vprintk_emit+0x1bd/0x560 [ 113.428655] vprintk+0x84/0xa0 [ 113.428687] _printk+0xba/0xf1 [ 113.428710] kauditd_hold_skb.cold+0x3f/0x4e [ 113.428744] kauditd_send_queue+0x233/0x290 [ 113.428773] kauditd_thread+0x5f9/0x9c0 [ 113.428800] kthread+0x2ed/0x3a0 [ 113.428828] ret_from_fork+0x22/0x30 [ 113.428852] [ 113.428852] -> #0 ((console_sem).lock){....}-{2:2}: [ 113.428879] __lock_acquire+0x2a02/0x5e70 [ 113.428912] lock_acquire+0x1a2/0x530 [ 113.428943] _raw_spin_lock_irqsave+0x39/0x60 [ 113.428965] down_trylock+0xe/0x70 [ 113.428996] __down_trylock_console_sem+0x3b/0xd0 [ 113.429028] vprintk_emit+0x16b/0x560 [ 113.429060] vprintk+0x84/0xa0 [ 113.429091] _printk+0xba/0xf1 [ 113.429113] report_bug.cold+0x72/0xab [ 113.429146] handle_bug+0x3c/0x70 [ 113.429164] exc_invalid_op+0x14/0x50 [ 113.429183] asm_exc_invalid_op+0x16/0x20 [ 113.429208] group_sched_out.part.0+0x2c7/0x460 [ 113.429243] ctx_sched_out+0x8f1/0xc10 [ 113.429276] __perf_event_task_sched_out+0x6d0/0x18d0 [ 113.429297] __schedule+0xedd/0x2470 [ 113.429326] schedule+0xda/0x1b0 [ 113.429353] exit_to_user_mode_prepare+0x114/0x1a0 [ 113.429380] syscall_exit_to_user_mode+0x19/0x40 [ 113.429420] do_syscall_64+0x48/0x90 [ 113.429448] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 113.429476] [ 113.429476] other info that might help us debug this: [ 113.429476] [ 113.429481] Chain exists of: [ 113.429481] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 113.429481] [ 113.429512] Possible unsafe locking scenario: [ 113.429512] [ 113.429516] CPU0 CPU1 [ 113.429521] ---- ---- [ 113.429525] lock(&ctx->lock); [ 113.429536] lock(&rq->__lock); [ 113.429548] lock(&ctx->lock); [ 113.429560] lock((console_sem).lock); [ 113.429572] [ 113.429572] *** DEADLOCK *** [ 113.429572] [ 113.429576] 2 locks held by syz-executor.5/4015: [ 113.429589] #0: ffff88806ce37e98 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 113.429649] #1: ffff88800f166420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 113.429701] [ 113.429701] stack backtrace: [ 113.429706] CPU: 0 PID: 4015 Comm: syz-executor.5 Not tainted 6.0.0-next-20221005 #1 [ 113.429730] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 113.429743] Call Trace: [ 113.429749] [ 113.429757] dump_stack_lvl+0x8b/0xb3 [ 113.429806] check_noncircular+0x263/0x2e0 [ 113.429839] ? format_decode+0x26c/0xb50 [ 113.429871] ? print_circular_bug+0x450/0x450 [ 113.429906] ? simple_strtoul+0x30/0x30 [ 113.429939] ? format_decode+0x26c/0xb50 [ 113.429977] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 113.430013] __lock_acquire+0x2a02/0x5e70 [ 113.430059] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 113.430106] lock_acquire+0x1a2/0x530 [ 113.430140] ? down_trylock+0xe/0x70 [ 113.430176] ? lock_release+0x750/0x750 [ 113.430219] ? vprintk+0x84/0xa0 [ 113.430256] _raw_spin_lock_irqsave+0x39/0x60 [ 113.430280] ? down_trylock+0xe/0x70 [ 113.430313] down_trylock+0xe/0x70 [ 113.430346] ? vprintk+0x84/0xa0 [ 113.430387] __down_trylock_console_sem+0x3b/0xd0 [ 113.430434] vprintk_emit+0x16b/0x560 [ 113.430472] vprintk+0x84/0xa0 [ 113.430507] _printk+0xba/0xf1 [ 113.430532] ? record_print_text.cold+0x16/0x16 [ 113.430567] ? report_bug.cold+0x66/0xab [ 113.430605] ? group_sched_out.part.0+0x2c7/0x460 [ 113.430641] report_bug.cold+0x72/0xab [ 113.430681] handle_bug+0x3c/0x70 [ 113.430701] exc_invalid_op+0x14/0x50 [ 113.430723] asm_exc_invalid_op+0x16/0x20 [ 113.430750] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 113.430789] Code: 5e 41 5f e9 8b ae ef ff e8 86 ae ef ff 65 8b 1d 2b 08 ac 7e 31 ff 89 de e8 26 ab ef ff 85 db 0f 84 8a 00 00 00 e8 69 ae ef ff <0f> 0b e9 a5 fe ff ff e8 5d ae ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 113.430812] RSP: 0018:ffff88803e09fc48 EFLAGS: 00010006 [ 113.430830] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 113.430845] RDX: ffff88803e090000 RSI: ffffffff81566da7 RDI: 0000000000000005 [ 113.430860] RBP: ffff888008660b90 R08: 0000000000000005 R09: 0000000000000001 [ 113.430875] R10: 0000000000000000 R11: ffffffff865b601b R12: ffff88800f166400 [ 113.430891] R13: ffff88806ce3d2c0 R14: ffffffff8547d040 R15: 0000000000000002 [ 113.430915] ? group_sched_out.part.0+0x2c7/0x460 [ 113.430955] ? group_sched_out.part.0+0x2c7/0x460 [ 113.430996] ctx_sched_out+0x8f1/0xc10 [ 113.431036] __perf_event_task_sched_out+0x6d0/0x18d0 [ 113.431066] ? lock_is_held_type+0xd7/0x130 [ 113.431096] ? __perf_cgroup_move+0x160/0x160 [ 113.431117] ? set_next_entity+0x304/0x550 [ 113.431152] ? update_curr+0x267/0x740 [ 113.431190] ? lock_is_held_type+0xd7/0x130 [ 113.431220] __schedule+0xedd/0x2470 [ 113.431257] ? io_schedule_timeout+0x150/0x150 [ 113.431293] ? rcu_read_lock_sched_held+0x3e/0x80 [ 113.431334] schedule+0xda/0x1b0 [ 113.431368] exit_to_user_mode_prepare+0x114/0x1a0 [ 113.431404] syscall_exit_to_user_mode+0x19/0x40 [ 113.431434] do_syscall_64+0x48/0x90 [ 113.431455] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 113.431483] RIP: 0033:0x7f348b9d8b19 [ 113.431499] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 113.431521] RSP: 002b:00007f3488f4e218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 113.431542] RAX: 0000000000000001 RBX: 00007f348baebf68 RCX: 00007f348b9d8b19 [ 113.431557] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f348baebf6c [ 113.431571] RBP: 00007f348baebf60 R08: 000000000000000e R09: 0000000000000000 [ 113.431586] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f348baebf6c [ 113.431600] R13: 00007ffc8239009f R14: 00007f3488f4e300 R15: 0000000000022000 [ 113.431629] [ 113.534824] WARNING: CPU: 0 PID: 4015 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 113.535934] Modules linked in: [ 113.536325] CPU: 0 PID: 4015 Comm: syz-executor.5 Not tainted 6.0.0-next-20221005 #1 [ 113.537261] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 113.538239] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 113.538906] Code: 5e 41 5f e9 8b ae ef ff e8 86 ae ef ff 65 8b 1d 2b 08 ac 7e 31 ff 89 de e8 26 ab ef ff 85 db 0f 84 8a 00 00 00 e8 69 ae ef ff <0f> 0b e9 a5 fe ff ff e8 5d ae ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 113.541039] RSP: 0018:ffff88803e09fc48 EFLAGS: 00010006 [ 113.541697] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 113.542570] RDX: ffff88803e090000 RSI: ffffffff81566da7 RDI: 0000000000000005 [ 113.543418] RBP: ffff888008660b90 R08: 0000000000000005 R09: 0000000000000001 [ 113.544444] R10: 0000000000000000 R11: ffffffff865b601b R12: ffff88800f166400 [ 113.545482] R13: ffff88806ce3d2c0 R14: ffffffff8547d040 R15: 0000000000000002 [ 113.546564] FS: 00007f3488f4e700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 113.547722] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 113.548571] CR2: 00007ffc31801d28 CR3: 0000000019ea4000 CR4: 0000000000350ef0 [ 113.549668] Call Trace: [ 113.550070] [ 113.550434] ctx_sched_out+0x8f1/0xc10 [ 113.551106] __perf_event_task_sched_out+0x6d0/0x18d0 [ 113.551906] ? lock_is_held_type+0xd7/0x130 [ 113.552568] ? __perf_cgroup_move+0x160/0x160 [ 113.553225] ? set_next_entity+0x304/0x550 [ 113.553893] ? update_curr+0x267/0x740 [ 113.554502] ? lock_is_held_type+0xd7/0x130 [ 113.555144] __schedule+0xedd/0x2470 [ 113.555745] ? io_schedule_timeout+0x150/0x150 [ 113.556446] ? rcu_read_lock_sched_held+0x3e/0x80 [ 113.557171] schedule+0xda/0x1b0 [ 113.557709] exit_to_user_mode_prepare+0x114/0x1a0 [ 113.558464] syscall_exit_to_user_mode+0x19/0x40 [ 113.559169] do_syscall_64+0x48/0x90 [ 113.559760] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 113.560539] RIP: 0033:0x7f348b9d8b19 [ 113.561098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 113.563863] RSP: 002b:00007f3488f4e218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 113.565023] RAX: 0000000000000001 RBX: 00007f348baebf68 RCX: 00007f348b9d8b19 [ 113.566141] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f348baebf6c [ 113.567200] RBP: 00007f348baebf60 R08: 000000000000000e R09: 0000000000000000 [ 113.568292] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f348baebf6c [ 113.569390] R13: 00007ffc8239009f R14: 00007f3488f4e300 R15: 0000000000022000 [ 113.570516] [ 113.570885] irq event stamp: 610 [ 113.571416] hardirqs last enabled at (609): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 113.572851] hardirqs last disabled at (610): [] __schedule+0x1225/0x2470 [ 113.574117] softirqs last enabled at (110): [] __irq_exit_rcu+0x11b/0x180 [ 113.575398] softirqs last disabled at (105): [] __irq_exit_rcu+0x11b/0x180 [ 113.576694] ---[ end trace 0000000000000000 ]--- 11:04:47 executing program 7: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00') readlink(&(0x7f0000000680)='./file1\x00', &(0x7f0000000100)=""/251, 0xfb) readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000000200)=""/209, 0xd1) 11:04:47 executing program 6: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x80) 11:04:47 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004f00)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f00000004c0)=[@hopopts_2292={{0x18}}], 0x18}}, {{&(0x7f0000000580)={0xa, 0x0, 0x0, @private1}, 0x1c, &(0x7f0000001c00)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x2, 0x0) [ 113.637495] hrtimer: interrupt took 27451 ns 11:04:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') pread64(r0, &(0x7f0000000180)=""/16, 0x2f00, 0x0) 11:04:47 executing program 0: syz_mount_image$iso9660(&(0x7f0000001840), &(0x7f0000001880)='./file1\x00', 0x0, 0x1, &(0x7f0000001900)=[{&(0x7f00000018c0)="da", 0x1}], 0x0, &(0x7f0000001940)={[{}, {@mode}, {@sbsector}, {@block={'block', 0x3d, 0x200}}], [{@appraise}]}) 11:04:47 executing program 7: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00') readlink(&(0x7f0000000680)='./file1\x00', &(0x7f0000000100)=""/251, 0xfb) readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000000200)=""/209, 0xd1) 11:04:47 executing program 6: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x80) 11:04:47 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004f00)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f00000004c0)=[@hopopts_2292={{0x18}}], 0x18}}, {{&(0x7f0000000580)={0xa, 0x0, 0x0, @private1}, 0x1c, &(0x7f0000001c00)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x2, 0x0) 11:04:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 11:04:47 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 11:04:47 executing program 5: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CDROM_GET_MCN(0xffffffffffffffff, 0x5311, 0x0) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, 0x0, 0x20000005) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) 11:04:47 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004f00)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f00000004c0)=[@hopopts_2292={{0x18}}], 0x18}}, {{&(0x7f0000000580)={0xa, 0x0, 0x0, @private1}, 0x1c, &(0x7f0000001c00)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x2, 0x0) 11:04:47 executing program 6: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x80) 11:04:47 executing program 0: syz_mount_image$iso9660(&(0x7f0000001840), &(0x7f0000001880)='./file1\x00', 0x0, 0x1, &(0x7f0000001900)=[{&(0x7f00000018c0)="da", 0x1}], 0x0, &(0x7f0000001940)={[{}, {@mode}, {@sbsector}, {@block={'block', 0x3d, 0x200}}], [{@appraise}]}) 11:04:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') pread64(r0, &(0x7f0000000180)=""/16, 0x2f00, 0x0) 11:04:47 executing program 7: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CDROM_GET_MCN(0xffffffffffffffff, 0x5311, 0x0) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, 0x0, 0x20000005) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) [ 114.237950] syz-executor.2 (4033) used greatest stack depth: 23512 bytes left 11:04:48 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 11:04:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 11:04:48 executing program 5: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CDROM_GET_MCN(0xffffffffffffffff, 0x5311, 0x0) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, 0x0, 0x20000005) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) 11:04:48 executing program 0: syz_mount_image$iso9660(&(0x7f0000001840), &(0x7f0000001880)='./file1\x00', 0x0, 0x1, &(0x7f0000001900)=[{&(0x7f00000018c0)="da", 0x1}], 0x0, &(0x7f0000001940)={[{}, {@mode}, {@sbsector}, {@block={'block', 0x3d, 0x200}}], [{@appraise}]}) 11:04:48 executing program 4: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CDROM_GET_MCN(0xffffffffffffffff, 0x5311, 0x0) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, 0x0, 0x20000005) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) 11:04:48 executing program 1: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CDROM_GET_MCN(0xffffffffffffffff, 0x5311, 0x0) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, 0x0, 0x20000005) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) 11:04:48 executing program 7: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CDROM_GET_MCN(0xffffffffffffffff, 0x5311, 0x0) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, 0x0, 0x20000005) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) 11:04:48 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 11:04:48 executing program 5: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CDROM_GET_MCN(0xffffffffffffffff, 0x5311, 0x0) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, 0x0, 0x20000005) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) 11:04:48 executing program 4: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CDROM_GET_MCN(0xffffffffffffffff, 0x5311, 0x0) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, 0x0, 0x20000005) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) 11:04:48 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 11:04:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 11:04:48 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 11:04:48 executing program 4: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CDROM_GET_MCN(0xffffffffffffffff, 0x5311, 0x0) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, 0x0, 0x20000005) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) 11:04:48 executing program 7: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CDROM_GET_MCN(0xffffffffffffffff, 0x5311, 0x0) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, 0x0, 0x20000005) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) 11:04:48 executing program 1: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CDROM_GET_MCN(0xffffffffffffffff, 0x5311, 0x0) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, 0x0, 0x20000005) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) 11:04:48 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 11:04:48 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 11:04:48 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 11:04:48 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 11:04:48 executing program 1: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CDROM_GET_MCN(0xffffffffffffffff, 0x5311, 0x0) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, 0x0, 0x20000005) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x43}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) 11:04:48 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 11:04:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 11:04:48 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 11:04:48 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @dev}}) 11:04:48 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000003400)) 11:04:48 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 11:04:48 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @dev}}) 11:04:48 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 11:04:49 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000003400)) 11:04:49 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @dev}}) 11:04:49 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000b00), 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0xd1d) 11:04:49 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 11:04:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f00000004c0)=0x1) 11:04:49 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 11:04:49 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x8, @none}, 0xe) 11:04:49 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @dev}}) 11:04:49 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x8, @none}, 0xe) 11:04:49 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000b00), 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0xd1d) 11:04:49 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000003400)) 11:04:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f00000004c0)=0x1) 11:04:49 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 11:04:49 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x8, @none}, 0xe) 11:04:49 executing program 5: syz_emit_vhci(&(0x7f0000000000)=@HCI_ACLDATA_PKT={0x2, {0xc9, 0x0, 0x0, 0xc}, @l2cap_cid_le_signaling={{0x8}, @l2cap_ecred_reconf_req={{0x19, 0x0, 0x4}}}}, 0x11) 11:04:49 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x8, @none}, 0xe) 11:04:49 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x8, @none}, 0xe) 11:04:49 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000003400)) 11:04:49 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000b00), 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0xd1d) 11:04:49 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 11:04:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f00000004c0)=0x1) 11:04:49 executing program 5: syz_emit_vhci(&(0x7f0000000000)=@HCI_ACLDATA_PKT={0x2, {0xc9, 0x0, 0x0, 0xc}, @l2cap_cid_le_signaling={{0x8}, @l2cap_ecred_reconf_req={{0x19, 0x0, 0x4}}}}, 0x11) 11:04:49 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x8, @none}, 0xe) 11:04:49 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x8, @none}, 0xe) 11:04:49 executing program 5: syz_emit_vhci(&(0x7f0000000000)=@HCI_ACLDATA_PKT={0x2, {0xc9, 0x0, 0x0, 0xc}, @l2cap_cid_le_signaling={{0x8}, @l2cap_ecred_reconf_req={{0x19, 0x0, 0x4}}}}, 0x11) 11:04:49 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000b00), 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0xd1d) 11:04:49 executing program 4: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x400, 0x0) fcntl$setstatus(r0, 0x4, 0x400) 11:04:49 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 11:04:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f00000004c0)=0x1) 11:04:49 executing program 5: syz_emit_vhci(&(0x7f0000000000)=@HCI_ACLDATA_PKT={0x2, {0xc9, 0x0, 0x0, 0xc}, @l2cap_cid_le_signaling={{0x8}, @l2cap_ecred_reconf_req={{0x19, 0x0, 0x4}}}}, 0x11) 11:04:49 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}}, {{0xa, 0x0, 0x0, @private2}}}, 0xff3a) 11:04:49 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}}, {{0xa, 0x0, 0x0, @private2}}}, 0xff3a) 11:04:49 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}}, {{0xa, 0x0, 0x0, @private2}}}, 0xff3a) 11:04:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010100)='RRaA\x00'/32, 0x20, 0x800}, {&(0x7f0000010200)="00000000727241610100000007000000000000000000000000000000000055aa", 0x20, 0x9e0}, {&(0x7f0000010300)="601c6d6b646f736617e43c00088020000200000004f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60, 0x3000}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x10000}, {&(0x7f0000010500)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x10800}, {&(0x7f0000010600)="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", 0x120, 0x11000}, {&(0x7f0000010800)="2e2020202020202020202010001fe870325132510000e87032510300000000002e2e20202020202020202010001fe870325132510000e870325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202020001fe870325132510000e870325104001a040000", 0x80, 0x51000}, {&(0x7f0000010900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x91000}, {&(0x7f0000010e00)='syzkallers\x00'/32, 0x20, 0xd1000}, {&(0x7f0000010f00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x151000}], 0x0, &(0x7f0000011000)) 11:04:49 executing program 3: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_cmd_status={{0xf, 0x4}, {0x1, 0xfa, 0x41b}}}, 0x7) 11:04:49 executing program 7: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x56a, 0x302, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x40, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x81, {0x9, 0x21, 0xfff8, 0xff, 0x1, {0x22, 0x4c6}}, {{}, [{{0x9, 0x5, 0x2, 0x3, 0x0, 0x8}}]}}}]}}]}}, 0x0) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000200)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd8c, 0x22, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x4, 0x2, 0x3, 0x1, 0x2, 0x6, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0xd6c}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x2d}}}}}]}}]}}, 0x0) 11:04:49 executing program 6: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000280)={0x1ff, 0x0, 'client1\x00', 0x0, "17e14b6adf597130", "238acf78eb8a5c666bceba243d0a38e1df323dc042efb000"}) 11:04:49 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f00000010c0), 0x4) 11:04:49 executing program 4: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x400, 0x0) fcntl$setstatus(r0, 0x4, 0x400) 11:04:49 executing program 1: mlockall(0x2) 11:04:49 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}}, {{0xa, 0x0, 0x0, @private2}}}, 0xff3a) [ 116.258018] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 116.271010] loop5: detected capacity change from 0 to 5392 [ 116.273204] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 116.275645] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 116.284237] misc raw-gadget: fail, usb_gadget_register_driver returned -16 11:04:49 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f00000010c0), 0x4) 11:04:49 executing program 6: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000280)={0x1ff, 0x0, 'client1\x00', 0x0, "17e14b6adf597130", "238acf78eb8a5c666bceba243d0a38e1df323dc042efb000"}) 11:04:49 executing program 1: mlockall(0x2) 11:04:49 executing program 4: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x400, 0x0) fcntl$setstatus(r0, 0x4, 0x400) 11:04:50 executing program 3: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_cmd_status={{0xf, 0x4}, {0x1, 0xfa, 0x41b}}}, 0x7) 11:04:50 executing program 2: semop(0x0, &(0x7f0000000000)=[{}], 0x1) semget(0x1, 0x3, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x0) 11:04:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010100)='RRaA\x00'/32, 0x20, 0x800}, {&(0x7f0000010200)="00000000727241610100000007000000000000000000000000000000000055aa", 0x20, 0x9e0}, {&(0x7f0000010300)="601c6d6b646f736617e43c00088020000200000004f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60, 0x3000}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x10000}, {&(0x7f0000010500)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x10800}, {&(0x7f0000010600)="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", 0x120, 0x11000}, {&(0x7f0000010800)="2e2020202020202020202010001fe870325132510000e87032510300000000002e2e20202020202020202010001fe870325132510000e870325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202020001fe870325132510000e870325104001a040000", 0x80, 0x51000}, {&(0x7f0000010900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x91000}, {&(0x7f0000010e00)='syzkallers\x00'/32, 0x20, 0xd1000}, {&(0x7f0000010f00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x151000}], 0x0, &(0x7f0000011000)) 11:04:50 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f00000010c0), 0x4) 11:04:50 executing program 6: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000280)={0x1ff, 0x0, 'client1\x00', 0x0, "17e14b6adf597130", "238acf78eb8a5c666bceba243d0a38e1df323dc042efb000"}) [ 116.519217] loop5: detected capacity change from 0 to 5392 [ 116.789053] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 116.790735] misc raw-gadget: fail, usb_gadget_register_driver returned -16 11:04:50 executing program 4: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x400, 0x0) fcntl$setstatus(r0, 0x4, 0x400) 11:04:50 executing program 1: mlockall(0x2) 11:04:50 executing program 3: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_cmd_status={{0xf, 0x4}, {0x1, 0xfa, 0x41b}}}, 0x7) 11:04:50 executing program 2: semop(0x0, &(0x7f0000000000)=[{}], 0x1) semget(0x1, 0x3, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x0) 11:04:50 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f00000010c0), 0x4) 11:04:50 executing program 6: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000280)={0x1ff, 0x0, 'client1\x00', 0x0, "17e14b6adf597130", "238acf78eb8a5c666bceba243d0a38e1df323dc042efb000"}) 11:04:50 executing program 7: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x56a, 0x302, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x40, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x81, {0x9, 0x21, 0xfff8, 0xff, 0x1, {0x22, 0x4c6}}, {{}, [{{0x9, 0x5, 0x2, 0x3, 0x0, 0x8}}]}}}]}}]}}, 0x0) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000200)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd8c, 0x22, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x4, 0x2, 0x3, 0x1, 0x2, 0x6, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0xd6c}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x2d}}}}}]}}]}}, 0x0) 11:04:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010100)='RRaA\x00'/32, 0x20, 0x800}, {&(0x7f0000010200)="00000000727241610100000007000000000000000000000000000000000055aa", 0x20, 0x9e0}, {&(0x7f0000010300)="601c6d6b646f736617e43c00088020000200000004f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60, 0x3000}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x10000}, {&(0x7f0000010500)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x10800}, {&(0x7f0000010600)="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", 0x120, 0x11000}, {&(0x7f0000010800)="2e2020202020202020202010001fe870325132510000e87032510300000000002e2e20202020202020202010001fe870325132510000e870325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202020001fe870325132510000e870325104001a040000", 0x80, 0x51000}, {&(0x7f0000010900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x91000}, {&(0x7f0000010e00)='syzkallers\x00'/32, 0x20, 0xd1000}, {&(0x7f0000010f00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x151000}], 0x0, &(0x7f0000011000)) [ 116.877540] loop5: detected capacity change from 0 to 5392 11:04:50 executing program 3: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_cmd_status={{0xf, 0x4}, {0x1, 0xfa, 0x41b}}}, 0x7) 11:04:50 executing program 2: semop(0x0, &(0x7f0000000000)=[{}], 0x1) semget(0x1, 0x3, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x0) [ 116.888203] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 116.889095] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 116.900872] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 116.902241] misc raw-gadget: fail, usb_gadget_register_driver returned -16 11:04:50 executing program 1: mlockall(0x2) 11:04:50 executing program 0: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x4001813, r2, 0x0) 11:04:50 executing program 6: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, 0x0) 11:04:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@report={0x4c, 0x1e, 0x107, 0x0, 0x0, {0x0, {@in6=@mcast2, @in=@broadcast}}}, 0x4c}}, 0x0) 11:04:50 executing program 2: semop(0x0, &(0x7f0000000000)=[{}], 0x1) semget(0x1, 0x3, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x0) 11:04:50 executing program 6: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, 0x0) [ 117.046619] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 117.077751] audit: type=1400 audit(1664967890.705:9): avc: denied { read } for pid=4251 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 117.444272] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 11:04:51 executing program 0: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x4001813, r2, 0x0) 11:04:51 executing program 6: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, 0x0) 11:04:51 executing program 3: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, 0x0) 11:04:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010100)='RRaA\x00'/32, 0x20, 0x800}, {&(0x7f0000010200)="00000000727241610100000007000000000000000000000000000000000055aa", 0x20, 0x9e0}, {&(0x7f0000010300)="601c6d6b646f736617e43c00088020000200000004f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60, 0x3000}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x10000}, {&(0x7f0000010500)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x10800}, {&(0x7f0000010600)="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", 0x120, 0x11000}, {&(0x7f0000010800)="2e2020202020202020202010001fe870325132510000e87032510300000000002e2e20202020202020202010001fe870325132510000e870325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202020001fe870325132510000e870325104001a040000", 0x80, 0x51000}, {&(0x7f0000010900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x91000}, {&(0x7f0000010e00)='syzkallers\x00'/32, 0x20, 0xd1000}, {&(0x7f0000010f00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x151000}], 0x0, &(0x7f0000011000)) 11:04:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@report={0x4c, 0x1e, 0x107, 0x0, 0x0, {0x0, {@in6=@mcast2, @in=@broadcast}}}, 0x4c}}, 0x0) 11:04:51 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) r1 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000300)={{0x2}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) shmctl$SHM_LOCK(r1, 0xb) 11:04:51 executing program 7: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x56a, 0x302, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x40, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x81, {0x9, 0x21, 0xfff8, 0xff, 0x1, {0x22, 0x4c6}}, {{}, [{{0x9, 0x5, 0x2, 0x3, 0x0, 0x8}}]}}}]}}]}}, 0x0) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000200)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd8c, 0x22, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x4, 0x2, 0x3, 0x1, 0x2, 0x6, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0xd6c}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x2d}}}}}]}}]}}, 0x0) 11:04:51 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x4001813, r2, 0x0) [ 117.472032] loop5: detected capacity change from 0 to 5392 [ 117.501280] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 117.512969] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 117.522460] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy 11:04:51 executing program 6: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, 0x0) 11:04:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@report={0x4c, 0x1e, 0x107, 0x0, 0x0, {0x0, {@in6=@mcast2, @in=@broadcast}}}, 0x4c}}, 0x0) [ 117.535447] misc raw-gadget: fail, usb_gadget_register_driver returned -16 11:04:51 executing program 3: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, 0x0) 11:04:51 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) r1 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000300)={{0x2}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) shmctl$SHM_LOCK(r1, 0xb) [ 117.568333] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 11:04:51 executing program 0: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x4001813, r2, 0x0) 11:04:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@report={0x4c, 0x1e, 0x107, 0x0, 0x0, {0x0, {@in6=@mcast2, @in=@broadcast}}}, 0x4c}}, 0x0) 11:04:51 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x4001813, r2, 0x0) [ 117.665431] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 11:04:51 executing program 3: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, 0x0) 11:04:51 executing program 0: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x4001813, r2, 0x0) 11:04:51 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) r1 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000300)={{0x2}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) shmctl$SHM_LOCK(r1, 0xb) 11:04:51 executing program 6: syz_mount_image$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) r1 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000300)={{0x2}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) shmctl$SHM_LOCK(r1, 0xb) 11:04:51 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x4001813, r2, 0x0) 11:04:51 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) r1 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000300)={{0x2}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) shmctl$SHM_LOCK(r1, 0xb) 11:04:51 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) r1 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000300)={{0x2}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) shmctl$SHM_LOCK(r1, 0xb) 11:04:51 executing program 7: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x56a, 0x302, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x40, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x81, {0x9, 0x21, 0xfff8, 0xff, 0x1, {0x22, 0x4c6}}, {{}, [{{0x9, 0x5, 0x2, 0x3, 0x0, 0x8}}]}}}]}}]}}, 0x0) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000200)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd8c, 0x22, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x4, 0x2, 0x3, 0x1, 0x2, 0x6, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0xd6c}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x2d}}}}}]}}]}}, 0x0) [ 118.172160] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 118.178919] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 118.198252] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 118.200285] misc raw-gadget: fail, usb_gadget_register_driver returned -16 11:04:51 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) r1 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000300)={{0x2}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) shmctl$SHM_LOCK(r1, 0xb) 11:04:51 executing program 6: syz_mount_image$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) r1 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000300)={{0x2}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) shmctl$SHM_LOCK(r1, 0xb) 11:04:51 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) r1 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000300)={{0x2}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) shmctl$SHM_LOCK(r1, 0xb) 11:04:51 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) r1 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000300)={{0x2}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) shmctl$SHM_LOCK(r1, 0xb) 11:04:51 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) r1 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000300)={{0x2}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) shmctl$SHM_LOCK(r1, 0xb) 11:04:52 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) r1 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000300)={{0x2}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) shmctl$SHM_LOCK(r1, 0xb) 11:04:52 executing program 3: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x4001813, r2, 0x0) 11:04:52 executing program 0: syz_emit_ethernet(0x2e, &(0x7f0000000000)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, @multicast2, @rand_addr=0xe0000000}, {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0) 11:04:52 executing program 6: syz_mount_image$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r0, 0x0) r1 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000300)={{0x2}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) shmctl$SHM_LOCK(r1, 0xb) 11:04:52 executing program 5: syz_genetlink_get_family_id$fou(&(0x7f0000000000), 0xffffffffffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) clone3(&(0x7f0000001800)={0x248000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 11:04:52 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r0 = socket(0x11, 0x803, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001a40), 0xffffffffffffffff) io_uring_setup(0x641a, &(0x7f0000001d40)) 11:04:52 executing program 1: getcwd(0x0, 0x31) 11:04:52 executing program 1: getcwd(0x0, 0x31) 11:04:52 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@getsa={0x3c, 0x12, 0x1, 0x0, 0x0, {@in=@multicast1, 0x0, 0xa}, [@srcaddr={0x14, 0xd, @in=@loopback}]}, 0x3c}}, 0x0) 11:04:52 executing program 3: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x4001813, r2, 0x0) 11:04:52 executing program 0: syz_emit_ethernet(0x2e, &(0x7f0000000000)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, @multicast2, @rand_addr=0xe0000000}, {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0) 11:04:52 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@getsa={0x3c, 0x12, 0x1, 0x0, 0x0, {@in=@multicast1, 0x0, 0xa}, [@srcaddr={0x14, 0xd, @in=@loopback}]}, 0x3c}}, 0x0) 11:04:52 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000002600)=[{{&(0x7f0000000100)={0x2, 0x4e27, @remote}, 0x10, 0x0, 0x0, &(0x7f0000001400)=[@ip_retopts={{0x30, 0x0, 0x7, {[@timestamp={0x44, 0x20, 0x1c, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}], 0x30}}], 0x1, 0x0) 11:04:52 executing program 1: getcwd(0x0, 0x31) 11:04:52 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r0 = socket(0x11, 0x803, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001a40), 0xffffffffffffffff) io_uring_setup(0x641a, &(0x7f0000001d40)) 11:04:52 executing program 0: syz_emit_ethernet(0x2e, &(0x7f0000000000)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, @multicast2, @rand_addr=0xe0000000}, {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0) 11:04:52 executing program 3: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x4001813, r2, 0x0) 11:04:52 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000002600)=[{{&(0x7f0000000100)={0x2, 0x4e27, @remote}, 0x10, 0x0, 0x0, &(0x7f0000001400)=[@ip_retopts={{0x30, 0x0, 0x7, {[@timestamp={0x44, 0x20, 0x1c, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}], 0x30}}], 0x1, 0x0) 11:04:52 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r0 = socket(0x11, 0x803, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001a40), 0xffffffffffffffff) io_uring_setup(0x641a, &(0x7f0000001d40)) 11:04:52 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000002600)=[{{&(0x7f0000000100)={0x2, 0x4e27, @remote}, 0x10, 0x0, 0x0, &(0x7f0000001400)=[@ip_retopts={{0x30, 0x0, 0x7, {[@timestamp={0x44, 0x20, 0x1c, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}], 0x30}}], 0x1, 0x0) 11:04:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @random="7700c24d06a7", @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @private}, {0x0, 0x0, 0x0, @dev}}}}}, 0x0) 11:04:52 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@getsa={0x3c, 0x12, 0x1, 0x0, 0x0, {@in=@multicast1, 0x0, 0xa}, [@srcaddr={0x14, 0xd, @in=@loopback}]}, 0x3c}}, 0x0) 11:04:52 executing program 5: r0 = epoll_create(0x4) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f00000000c0)={0x80000004}) 11:04:52 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000001440), 0x0, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, 0x0) 11:04:52 executing program 0: syz_emit_ethernet(0x2e, &(0x7f0000000000)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, @multicast2, @rand_addr=0xe0000000}, {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0) 11:04:52 executing program 1: getcwd(0x0, 0x31) 11:04:52 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@getsa={0x3c, 0x12, 0x1, 0x0, 0x0, {@in=@multicast1, 0x0, 0xa}, [@srcaddr={0x14, 0xd, @in=@loopback}]}, 0x3c}}, 0x0) 11:04:53 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @random="7700c24d06a7", @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @private}, {0x0, 0x0, 0x0, @dev}}}}}, 0x0) 11:04:53 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000002600)=[{{&(0x7f0000000100)={0x2, 0x4e27, @remote}, 0x10, 0x0, 0x0, &(0x7f0000001400)=[@ip_retopts={{0x30, 0x0, 0x7, {[@timestamp={0x44, 0x20, 0x1c, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}], 0x30}}], 0x1, 0x0) 11:04:53 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000001440), 0x0, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, 0x0) 11:04:53 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @random="7700c24d06a7", @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @private}, {0x0, 0x0, 0x0, @dev}}}}}, 0x0) 11:04:53 executing program 5: r0 = epoll_create(0x4) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f00000000c0)={0x80000004}) 11:04:53 executing program 0: r0 = epoll_create(0x4) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f00000000c0)={0x80000004}) 11:04:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000000)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@FILEID_INO32_GEN={0x8, 0x1, {0x8}}, 0x0) [ 119.490091] loop1: detected capacity change from 0 to 40 11:04:53 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r0 = socket(0x11, 0x803, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001a40), 0xffffffffffffffff) io_uring_setup(0x641a, &(0x7f0000001d40)) 11:04:53 executing program 7: openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x28000, 0x0) 11:04:53 executing program 0: r0 = epoll_create(0x4) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f00000000c0)={0x80000004}) 11:04:53 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000001440), 0x0, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, 0x0) 11:04:53 executing program 5: r0 = epoll_create(0x4) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f00000000c0)={0x80000004}) 11:04:53 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000013c0), 0xffffffffffffffff) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000001580)={&(0x7f0000001380), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000001900), 0xffffffffffffffff) 11:04:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000000)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@FILEID_INO32_GEN={0x8, 0x1, {0x8}}, 0x0) [ 119.651091] loop1: detected capacity change from 0 to 40 11:04:53 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @random="7700c24d06a7", @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @private}, {0x0, 0x0, 0x0, @dev}}}}}, 0x0) 11:04:53 executing program 0: r0 = epoll_create(0x4) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f00000000c0)={0x80000004}) 11:04:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000000)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@FILEID_INO32_GEN={0x8, 0x1, {0x8}}, 0x0) 11:04:53 executing program 5: r0 = epoll_create(0x4) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f00000000c0)={0x80000004}) 11:04:53 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) 11:04:53 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000001440), 0x0, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, 0x0) 11:04:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000000)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@FILEID_INO32_GEN={0x8, 0x1, {0x8}}, 0x0) 11:04:53 executing program 7: r0 = syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000080)="c79afba5e7c9d867f08f8f1919990d56a9168fad39839bad2664ace34b367e69eea0199ea1fb4133e1b318f3a87ecd1a9c961de7", 0x34, 0x6}, {&(0x7f00000000c0)="cc5bf141b6dcf8605aead1fa2080d79bea6be4462ecf4cd5839a738d687511501429152ca29bfd29c74d6b1e38111815d91dcedba0d2f47f6ad6d4469080859aed6822b97b0fdb61d0a757fbb83d3d4a8743c0677affda228a4bdb3300f29d419afc", 0x62, 0x8001}, {&(0x7f0000000140)="a3df08059a716f0115c8fab4eadc7d6a876884da4032824c6309a6713b4a7c6d6646d062dd2386cc1e9a06bb021e37c8ab4028f7aa52d85e4f1c93df13f7e55852", 0x41, 0x8}], 0x1000, &(0x7f0000000240)={[{'$X)-*+'}, {'['}, {}, {'>'}, {}], [{@subj_role={'subj_role', 0x3d, '@@'}}]}) fchmodat(r0, &(0x7f0000000280)='./file0\x00', 0x120) r1 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)={'#! ', './file1', [{0x20, '^:!!'}], 0xa, "84f3bd4edca266bf3e6c1ac62818db99247bdfe7091bfa8fe8a28f287f4a44d5fad800bfa01e4584a925092289d64de96156717229dc134fef512f45"}, 0x4c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000380)) setxattr$security_selinux(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000000440)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x2) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000480), 0x88000, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000500)='./file1\x00', &(0x7f0000000540)=""/4096, 0x1000) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000015c0)='cgroup.threads\x00', 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001600)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000001540)="c59ce5cee3c1080bb9daf24098ddff200d67781068e86146953fad76d8ca6eecbb1c5b0ee782893b36a53420c259b2a06ecd8bdf71957302a08d3e9fa39759ba8e2e51e1713600bf1fd02a3cb8ca43805de0675cf909cbf38cccfaad02a5b117766eef64c57668a6a255ca41757d17a6df94", 0x72, r4}, 0x68) dup(r3) connect(r2, &(0x7f00000017c0)=@ethernet={0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x43}}, 0x80) syz_mount_image$iso9660(&(0x7f0000001840), &(0x7f0000001880)='./file1\x00', 0x7, 0x1, &(0x7f0000001900)=[{&(0x7f00000018c0)="da19bd1b305a8ab1946136ccee751a79819b055a1445160dd3d5088eea1eddc0b4066aabf43832", 0x27, 0x3}], 0x10001, &(0x7f0000001940)={[{}, {@mode={'mode', 0x3d, 0x8}}, {@nocompress}, {@sbsector={'sbsector', 0x3d, 0x8}}, {@check_strict}, {@hide}, {@hide}, {@nojoliet}, {@block={'block', 0x3d, 0x200}}, {@block={'block', 0x3d, 0x200}}], [{@appraise}, {@appraise_type}]}) [ 119.794568] loop7: detected capacity change from 0 to 128 [ 119.800560] loop2: detected capacity change from 0 to 40 [ 119.826289] loop1: detected capacity change from 0 to 40 [ 119.826938] loop7: detected capacity change from 0 to 128 11:04:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000000)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@FILEID_INO32_GEN={0x8, 0x1, {0x8}}, 0x0) 11:04:53 executing program 7: r0 = syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000080)="c79afba5e7c9d867f08f8f1919990d56a9168fad39839bad2664ace34b367e69eea0199ea1fb4133e1b318f3a87ecd1a9c961de7", 0x34, 0x6}, {&(0x7f00000000c0)="cc5bf141b6dcf8605aead1fa2080d79bea6be4462ecf4cd5839a738d687511501429152ca29bfd29c74d6b1e38111815d91dcedba0d2f47f6ad6d4469080859aed6822b97b0fdb61d0a757fbb83d3d4a8743c0677affda228a4bdb3300f29d419afc", 0x62, 0x8001}, {&(0x7f0000000140)="a3df08059a716f0115c8fab4eadc7d6a876884da4032824c6309a6713b4a7c6d6646d062dd2386cc1e9a06bb021e37c8ab4028f7aa52d85e4f1c93df13f7e55852", 0x41, 0x8}], 0x1000, &(0x7f0000000240)={[{'$X)-*+'}, {'['}, {}, {'>'}, {}], [{@subj_role={'subj_role', 0x3d, '@@'}}]}) fchmodat(r0, &(0x7f0000000280)='./file0\x00', 0x120) r1 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)={'#! ', './file1', [{0x20, '^:!!'}], 0xa, "84f3bd4edca266bf3e6c1ac62818db99247bdfe7091bfa8fe8a28f287f4a44d5fad800bfa01e4584a925092289d64de96156717229dc134fef512f45"}, 0x4c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000380)) setxattr$security_selinux(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000000440)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x2) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000480), 0x88000, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000500)='./file1\x00', &(0x7f0000000540)=""/4096, 0x1000) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000015c0)='cgroup.threads\x00', 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001600)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000001540)="c59ce5cee3c1080bb9daf24098ddff200d67781068e86146953fad76d8ca6eecbb1c5b0ee782893b36a53420c259b2a06ecd8bdf71957302a08d3e9fa39759ba8e2e51e1713600bf1fd02a3cb8ca43805de0675cf909cbf38cccfaad02a5b117766eef64c57668a6a255ca41757d17a6df94", 0x72, r4}, 0x68) dup(r3) connect(r2, &(0x7f00000017c0)=@ethernet={0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x43}}, 0x80) syz_mount_image$iso9660(&(0x7f0000001840), &(0x7f0000001880)='./file1\x00', 0x7, 0x1, &(0x7f0000001900)=[{&(0x7f00000018c0)="da19bd1b305a8ab1946136ccee751a79819b055a1445160dd3d5088eea1eddc0b4066aabf43832", 0x27, 0x3}], 0x10001, &(0x7f0000001940)={[{}, {@mode={'mode', 0x3d, 0x8}}, {@nocompress}, {@sbsector={'sbsector', 0x3d, 0x8}}, {@check_strict}, {@hide}, {@hide}, {@nojoliet}, {@block={'block', 0x3d, 0x200}}, {@block={'block', 0x3d, 0x200}}], [{@appraise}, {@appraise_type}]}) [ 119.880205] loop7: detected capacity change from 0 to 128 [ 119.901606] loop2: detected capacity change from 0 to 40 [ 119.946826] loop4: detected capacity change from 0 to 128 11:04:53 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) 11:04:53 executing program 4: r0 = syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000080)="c79afba5e7c9d867f08f8f1919990d56a9168fad39839bad2664ace34b367e69eea0199ea1fb4133e1b318f3a87ecd1a9c961de7", 0x34, 0x6}, {&(0x7f00000000c0)="cc5bf141b6dcf8605aead1fa2080d79bea6be4462ecf4cd5839a738d687511501429152ca29bfd29c74d6b1e38111815d91dcedba0d2f47f6ad6d4469080859aed6822b97b0fdb61d0a757fbb83d3d4a8743c0677affda228a4bdb3300f29d419afc", 0x62, 0x8001}, {&(0x7f0000000140)="a3df08059a716f0115c8fab4eadc7d6a876884da4032824c6309a6713b4a7c6d6646d062dd2386cc1e9a06bb021e37c8ab4028f7aa52d85e4f1c93df13f7e55852", 0x41, 0x8}], 0x1000, &(0x7f0000000240)={[{'$X)-*+'}, {'['}, {}, {'>'}, {}], [{@subj_role={'subj_role', 0x3d, '@@'}}]}) fchmodat(r0, &(0x7f0000000280)='./file0\x00', 0x120) r1 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)={'#! ', './file1', [{0x20, '^:!!'}], 0xa, "84f3bd4edca266bf3e6c1ac62818db99247bdfe7091bfa8fe8a28f287f4a44d5fad800bfa01e4584a925092289d64de96156717229dc134fef512f45"}, 0x4c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000380)) setxattr$security_selinux(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000000440)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x2) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000480), 0x88000, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000500)='./file1\x00', &(0x7f0000000540)=""/4096, 0x1000) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000015c0)='cgroup.threads\x00', 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001600)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000001540)="c59ce5cee3c1080bb9daf24098ddff200d67781068e86146953fad76d8ca6eecbb1c5b0ee782893b36a53420c259b2a06ecd8bdf71957302a08d3e9fa39759ba8e2e51e1713600bf1fd02a3cb8ca43805de0675cf909cbf38cccfaad02a5b117766eef64c57668a6a255ca41757d17a6df94", 0x72, r4}, 0x68) dup(r3) connect(r2, &(0x7f00000017c0)=@ethernet={0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x43}}, 0x80) syz_mount_image$iso9660(&(0x7f0000001840), &(0x7f0000001880)='./file1\x00', 0x7, 0x1, &(0x7f0000001900)=[{&(0x7f00000018c0)="da19bd1b305a8ab1946136ccee751a79819b055a1445160dd3d5088eea1eddc0b4066aabf43832", 0x27, 0x3}], 0x10001, &(0x7f0000001940)={[{}, {@mode={'mode', 0x3d, 0x8}}, {@nocompress}, {@sbsector={'sbsector', 0x3d, 0x8}}, {@check_strict}, {@hide}, {@hide}, {@nojoliet}, {@block={'block', 0x3d, 0x200}}, {@block={'block', 0x3d, 0x200}}], [{@appraise}, {@appraise_type}]}) [ 119.959716] loop0: detected capacity change from 0 to 128 [ 119.967598] loop7: detected capacity change from 0 to 128 [ 119.969274] loop5: detected capacity change from 0 to 128 11:04:53 executing program 0: r0 = syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000080)="c79afba5e7c9d867f08f8f1919990d56a9168fad39839bad2664ace34b367e69eea0199ea1fb4133e1b318f3a87ecd1a9c961de7", 0x34, 0x6}, {&(0x7f00000000c0)="cc5bf141b6dcf8605aead1fa2080d79bea6be4462ecf4cd5839a738d687511501429152ca29bfd29c74d6b1e38111815d91dcedba0d2f47f6ad6d4469080859aed6822b97b0fdb61d0a757fbb83d3d4a8743c0677affda228a4bdb3300f29d419afc", 0x62, 0x8001}, {&(0x7f0000000140)="a3df08059a716f0115c8fab4eadc7d6a876884da4032824c6309a6713b4a7c6d6646d062dd2386cc1e9a06bb021e37c8ab4028f7aa52d85e4f1c93df13f7e55852", 0x41, 0x8}], 0x1000, &(0x7f0000000240)={[{'$X)-*+'}, {'['}, {}, {'>'}, {}], [{@subj_role={'subj_role', 0x3d, '@@'}}]}) fchmodat(r0, &(0x7f0000000280)='./file0\x00', 0x120) r1 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)={'#! ', './file1', [{0x20, '^:!!'}], 0xa, "84f3bd4edca266bf3e6c1ac62818db99247bdfe7091bfa8fe8a28f287f4a44d5fad800bfa01e4584a925092289d64de96156717229dc134fef512f45"}, 0x4c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000380)) setxattr$security_selinux(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000000440)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x2) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000480), 0x88000, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000500)='./file1\x00', &(0x7f0000000540)=""/4096, 0x1000) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000015c0)='cgroup.threads\x00', 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001600)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000001540)="c59ce5cee3c1080bb9daf24098ddff200d67781068e86146953fad76d8ca6eecbb1c5b0ee782893b36a53420c259b2a06ecd8bdf71957302a08d3e9fa39759ba8e2e51e1713600bf1fd02a3cb8ca43805de0675cf909cbf38cccfaad02a5b117766eef64c57668a6a255ca41757d17a6df94", 0x72, r4}, 0x68) dup(r3) connect(r2, &(0x7f00000017c0)=@ethernet={0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x43}}, 0x80) syz_mount_image$iso9660(&(0x7f0000001840), &(0x7f0000001880)='./file1\x00', 0x7, 0x1, &(0x7f0000001900)=[{&(0x7f00000018c0)="da19bd1b305a8ab1946136ccee751a79819b055a1445160dd3d5088eea1eddc0b4066aabf43832", 0x27, 0x3}], 0x10001, &(0x7f0000001940)={[{}, {@mode={'mode', 0x3d, 0x8}}, {@nocompress}, {@sbsector={'sbsector', 0x3d, 0x8}}, {@check_strict}, {@hide}, {@hide}, {@nojoliet}, {@block={'block', 0x3d, 0x200}}, {@block={'block', 0x3d, 0x200}}], [{@appraise}, {@appraise_type}]}) 11:04:53 executing program 5: r0 = syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000080)="c79afba5e7c9d867f08f8f1919990d56a9168fad39839bad2664ace34b367e69eea0199ea1fb4133e1b318f3a87ecd1a9c961de7", 0x34, 0x6}, {&(0x7f00000000c0)="cc5bf141b6dcf8605aead1fa2080d79bea6be4462ecf4cd5839a738d687511501429152ca29bfd29c74d6b1e38111815d91dcedba0d2f47f6ad6d4469080859aed6822b97b0fdb61d0a757fbb83d3d4a8743c0677affda228a4bdb3300f29d419afc", 0x62, 0x8001}, {&(0x7f0000000140)="a3df08059a716f0115c8fab4eadc7d6a876884da4032824c6309a6713b4a7c6d6646d062dd2386cc1e9a06bb021e37c8ab4028f7aa52d85e4f1c93df13f7e55852", 0x41, 0x8}], 0x1000, &(0x7f0000000240)={[{'$X)-*+'}, {'['}, {}, {'>'}, {}], [{@subj_role={'subj_role', 0x3d, '@@'}}]}) fchmodat(r0, &(0x7f0000000280)='./file0\x00', 0x120) r1 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)={'#! ', './file1', [{0x20, '^:!!'}], 0xa, "84f3bd4edca266bf3e6c1ac62818db99247bdfe7091bfa8fe8a28f287f4a44d5fad800bfa01e4584a925092289d64de96156717229dc134fef512f45"}, 0x4c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000380)) setxattr$security_selinux(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000000440)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x2) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000480), 0x88000, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000500)='./file1\x00', &(0x7f0000000540)=""/4096, 0x1000) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000015c0)='cgroup.threads\x00', 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001600)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000001540)="c59ce5cee3c1080bb9daf24098ddff200d67781068e86146953fad76d8ca6eecbb1c5b0ee782893b36a53420c259b2a06ecd8bdf71957302a08d3e9fa39759ba8e2e51e1713600bf1fd02a3cb8ca43805de0675cf909cbf38cccfaad02a5b117766eef64c57668a6a255ca41757d17a6df94", 0x72, r4}, 0x68) dup(r3) connect(r2, &(0x7f00000017c0)=@ethernet={0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x43}}, 0x80) syz_mount_image$iso9660(&(0x7f0000001840), &(0x7f0000001880)='./file1\x00', 0x7, 0x1, &(0x7f0000001900)=[{&(0x7f00000018c0)="da19bd1b305a8ab1946136ccee751a79819b055a1445160dd3d5088eea1eddc0b4066aabf43832", 0x27, 0x3}], 0x10001, &(0x7f0000001940)={[{}, {@mode={'mode', 0x3d, 0x8}}, {@nocompress}, {@sbsector={'sbsector', 0x3d, 0x8}}, {@check_strict}, {@hide}, {@hide}, {@nojoliet}, {@block={'block', 0x3d, 0x200}}, {@block={'block', 0x3d, 0x200}}], [{@appraise}, {@appraise_type}]}) 11:04:53 executing program 3: r0 = syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000080)="c79afba5e7c9d867f08f8f1919990d56a9168fad39839bad2664ace34b367e69eea0199ea1fb4133e1b318f3a87ecd1a9c961de7", 0x34, 0x6}, {&(0x7f00000000c0)="cc5bf141b6dcf8605aead1fa2080d79bea6be4462ecf4cd5839a738d687511501429152ca29bfd29c74d6b1e38111815d91dcedba0d2f47f6ad6d4469080859aed6822b97b0fdb61d0a757fbb83d3d4a8743c0677affda228a4bdb3300f29d419afc", 0x62, 0x8001}, {&(0x7f0000000140)="a3df08059a716f0115c8fab4eadc7d6a876884da4032824c6309a6713b4a7c6d6646d062dd2386cc1e9a06bb021e37c8ab4028f7aa52d85e4f1c93df13f7e55852", 0x41, 0x8}], 0x1000, &(0x7f0000000240)={[{'$X)-*+'}, {'['}, {}, {'>'}, {}], [{@subj_role={'subj_role', 0x3d, '@@'}}]}) fchmodat(r0, &(0x7f0000000280)='./file0\x00', 0x120) r1 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)={'#! ', './file1', [{0x20, '^:!!'}], 0xa, "84f3bd4edca266bf3e6c1ac62818db99247bdfe7091bfa8fe8a28f287f4a44d5fad800bfa01e4584a925092289d64de96156717229dc134fef512f45"}, 0x4c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000380)) setxattr$security_selinux(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000000440)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x2) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000480), 0x88000, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000500)='./file1\x00', &(0x7f0000000540)=""/4096, 0x1000) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000015c0)='cgroup.threads\x00', 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001600)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000001540)="c59ce5cee3c1080bb9daf24098ddff200d67781068e86146953fad76d8ca6eecbb1c5b0ee782893b36a53420c259b2a06ecd8bdf71957302a08d3e9fa39759ba8e2e51e1713600bf1fd02a3cb8ca43805de0675cf909cbf38cccfaad02a5b117766eef64c57668a6a255ca41757d17a6df94", 0x72, r4}, 0x68) dup(r3) connect(r2, &(0x7f00000017c0)=@ethernet={0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x43}}, 0x80) syz_mount_image$iso9660(&(0x7f0000001840), &(0x7f0000001880)='./file1\x00', 0x7, 0x1, &(0x7f0000001900)=[{&(0x7f00000018c0)="da19bd1b305a8ab1946136ccee751a79819b055a1445160dd3d5088eea1eddc0b4066aabf43832", 0x27, 0x3}], 0x10001, &(0x7f0000001940)={[{}, {@mode={'mode', 0x3d, 0x8}}, {@nocompress}, {@sbsector={'sbsector', 0x3d, 0x8}}, {@check_strict}, {@hide}, {@hide}, {@nojoliet}, {@block={'block', 0x3d, 0x200}}, {@block={'block', 0x3d, 0x200}}], [{@appraise}, {@appraise_type}]}) 11:04:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000000)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@FILEID_INO32_GEN={0x8, 0x1, {0x8}}, 0x0) 11:04:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000000)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) open_by_handle_at(r0, &(0x7f0000000240)=@FILEID_INO32_GEN={0x8, 0x1, {0x8}}, 0x0) 11:04:53 executing program 7: r0 = syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000080)="c79afba5e7c9d867f08f8f1919990d56a9168fad39839bad2664ace34b367e69eea0199ea1fb4133e1b318f3a87ecd1a9c961de7", 0x34, 0x6}, {&(0x7f00000000c0)="cc5bf141b6dcf8605aead1fa2080d79bea6be4462ecf4cd5839a738d687511501429152ca29bfd29c74d6b1e38111815d91dcedba0d2f47f6ad6d4469080859aed6822b97b0fdb61d0a757fbb83d3d4a8743c0677affda228a4bdb3300f29d419afc", 0x62, 0x8001}, {&(0x7f0000000140)="a3df08059a716f0115c8fab4eadc7d6a876884da4032824c6309a6713b4a7c6d6646d062dd2386cc1e9a06bb021e37c8ab4028f7aa52d85e4f1c93df13f7e55852", 0x41, 0x8}], 0x1000, &(0x7f0000000240)={[{'$X)-*+'}, {'['}, {}, {'>'}, {}], [{@subj_role={'subj_role', 0x3d, '@@'}}]}) fchmodat(r0, &(0x7f0000000280)='./file0\x00', 0x120) r1 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)={'#! ', './file1', [{0x20, '^:!!'}], 0xa, "84f3bd4edca266bf3e6c1ac62818db99247bdfe7091bfa8fe8a28f287f4a44d5fad800bfa01e4584a925092289d64de96156717229dc134fef512f45"}, 0x4c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000380)) setxattr$security_selinux(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000000440)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x2) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000480), 0x88000, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000500)='./file1\x00', &(0x7f0000000540)=""/4096, 0x1000) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000015c0)='cgroup.threads\x00', 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001600)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000001540)="c59ce5cee3c1080bb9daf24098ddff200d67781068e86146953fad76d8ca6eecbb1c5b0ee782893b36a53420c259b2a06ecd8bdf71957302a08d3e9fa39759ba8e2e51e1713600bf1fd02a3cb8ca43805de0675cf909cbf38cccfaad02a5b117766eef64c57668a6a255ca41757d17a6df94", 0x72, r4}, 0x68) dup(r3) connect(r2, &(0x7f00000017c0)=@ethernet={0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x43}}, 0x80) syz_mount_image$iso9660(&(0x7f0000001840), &(0x7f0000001880)='./file1\x00', 0x7, 0x1, &(0x7f0000001900)=[{&(0x7f00000018c0)="da19bd1b305a8ab1946136ccee751a79819b055a1445160dd3d5088eea1eddc0b4066aabf43832", 0x27, 0x3}], 0x10001, &(0x7f0000001940)={[{}, {@mode={'mode', 0x3d, 0x8}}, {@nocompress}, {@sbsector={'sbsector', 0x3d, 0x8}}, {@check_strict}, {@hide}, {@hide}, {@nojoliet}, {@block={'block', 0x3d, 0x200}}, {@block={'block', 0x3d, 0x200}}], [{@appraise}, {@appraise_type}]}) [ 119.985051] loop3: detected capacity change from 0 to 128 [ 119.997509] loop1: detected capacity change from 0 to 40 11:04:53 executing program 0: r0 = syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000080)="c79afba5e7c9d867f08f8f1919990d56a9168fad39839bad2664ace34b367e69eea0199ea1fb4133e1b318f3a87ecd1a9c961de7", 0x34, 0x6}, {&(0x7f00000000c0)="cc5bf141b6dcf8605aead1fa2080d79bea6be4462ecf4cd5839a738d687511501429152ca29bfd29c74d6b1e38111815d91dcedba0d2f47f6ad6d4469080859aed6822b97b0fdb61d0a757fbb83d3d4a8743c0677affda228a4bdb3300f29d419afc", 0x62, 0x8001}, {&(0x7f0000000140)="a3df08059a716f0115c8fab4eadc7d6a876884da4032824c6309a6713b4a7c6d6646d062dd2386cc1e9a06bb021e37c8ab4028f7aa52d85e4f1c93df13f7e55852", 0x41, 0x8}], 0x1000, &(0x7f0000000240)={[{'$X)-*+'}, {'['}, {}, {'>'}, {}], [{@subj_role={'subj_role', 0x3d, '@@'}}]}) fchmodat(r0, &(0x7f0000000280)='./file0\x00', 0x120) r1 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)={'#! ', './file1', [{0x20, '^:!!'}], 0xa, "84f3bd4edca266bf3e6c1ac62818db99247bdfe7091bfa8fe8a28f287f4a44d5fad800bfa01e4584a925092289d64de96156717229dc134fef512f45"}, 0x4c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000380)) setxattr$security_selinux(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000000440)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x2) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000480), 0x88000, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000500)='./file1\x00', &(0x7f0000000540)=""/4096, 0x1000) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000015c0)='cgroup.threads\x00', 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001600)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000001540)="c59ce5cee3c1080bb9daf24098ddff200d67781068e86146953fad76d8ca6eecbb1c5b0ee782893b36a53420c259b2a06ecd8bdf71957302a08d3e9fa39759ba8e2e51e1713600bf1fd02a3cb8ca43805de0675cf909cbf38cccfaad02a5b117766eef64c57668a6a255ca41757d17a6df94", 0x72, r4}, 0x68) dup(r3) connect(r2, &(0x7f00000017c0)=@ethernet={0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x43}}, 0x80) syz_mount_image$iso9660(&(0x7f0000001840), &(0x7f0000001880)='./file1\x00', 0x7, 0x1, &(0x7f0000001900)=[{&(0x7f00000018c0)="da19bd1b305a8ab1946136ccee751a79819b055a1445160dd3d5088eea1eddc0b4066aabf43832", 0x27, 0x3}], 0x10001, &(0x7f0000001940)={[{}, {@mode={'mode', 0x3d, 0x8}}, {@nocompress}, {@sbsector={'sbsector', 0x3d, 0x8}}, {@check_strict}, {@hide}, {@hide}, {@nojoliet}, {@block={'block', 0x3d, 0x200}}, {@block={'block', 0x3d, 0x200}}], [{@appraise}, {@appraise_type}]}) 11:04:53 executing program 7: r0 = syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000080)="c79afba5e7c9d867f08f8f1919990d56a9168fad39839bad2664ace34b367e69eea0199ea1fb4133e1b318f3a87ecd1a9c961de7", 0x34, 0x6}, {&(0x7f00000000c0)="cc5bf141b6dcf8605aead1fa2080d79bea6be4462ecf4cd5839a738d687511501429152ca29bfd29c74d6b1e38111815d91dcedba0d2f47f6ad6d4469080859aed6822b97b0fdb61d0a757fbb83d3d4a8743c0677affda228a4bdb3300f29d419afc", 0x62, 0x8001}, {&(0x7f0000000140)="a3df08059a716f0115c8fab4eadc7d6a876884da4032824c6309a6713b4a7c6d6646d062dd2386cc1e9a06bb021e37c8ab4028f7aa52d85e4f1c93df13f7e55852", 0x41, 0x8}], 0x1000, &(0x7f0000000240)={[{'$X)-*+'}, {'['}, {}, {'>'}, {}], [{@subj_role={'subj_role', 0x3d, '@@'}}]}) fchmodat(r0, &(0x7f0000000280)='./file0\x00', 0x120) r1 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)={'#! ', './file1', [{0x20, '^:!!'}], 0xa, "84f3bd4edca266bf3e6c1ac62818db99247bdfe7091bfa8fe8a28f287f4a44d5fad800bfa01e4584a925092289d64de96156717229dc134fef512f45"}, 0x4c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000380)) setxattr$security_selinux(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000000440)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x2) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000480), 0x88000, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000500)='./file1\x00', &(0x7f0000000540)=""/4096, 0x1000) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000015c0)='cgroup.threads\x00', 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001600)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd VM DIAGNOSIS: 11:04:47 Registers: info registers vcpu 0 RAX=0000000000000020 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff823bda91 RDI=ffffffff8765c9a0 RBP=ffffffff8765c960 RSP=ffff88803e09f690 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000020 R11=0000000000000001 R12=0000000000000020 R13=ffffffff8765c960 R14=0000000000000010 R15=ffffffff823bda80 RIP=ffffffff823bdae9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f3488f4e700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffc31801d28 CR3=0000000019ea4000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00007f348babf7c000007f348babf7c8 XMM02=00007f348babf7e000007f348babf7c0 XMM03=00007f348babf7c800007f348babf7c0 XMM04=ffffffffffffffffffffffff00000000 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=800000003865b007 RCX=ffffffff81691f8f RDX=ffff88803e035040 RSI=0000000000000000 RDI=0000000000000007 RBP=ffff88803dc6a118 RSP=ffff88803e067640 R8 =0000000000000007 R9 =0000000000000000 R10=800000003865b007 R11=0000000000000001 R12=ffff88803e067a30 R13=800000003865b007 R14=dffffc0000000000 R15=00007ff5e8bea000 RIP=ffffffff814617f5 RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fc763622000 CR3=000000000d0ec000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000