Warning: Permanently added '[localhost]:57508' (ECDSA) to the list of known hosts. 2022/10/06 11:17:04 fuzzer started 2022/10/06 11:17:05 dialing manager at localhost:37161 syzkaller login: [ 44.883253] cgroup: Unknown subsys name 'net' [ 44.979828] cgroup: Unknown subsys name 'rlimit' 2022/10/06 11:17:19 syscalls: 2215 2022/10/06 11:17:19 code coverage: enabled 2022/10/06 11:17:19 comparison tracing: enabled 2022/10/06 11:17:19 extra coverage: enabled 2022/10/06 11:17:19 setuid sandbox: enabled 2022/10/06 11:17:19 namespace sandbox: enabled 2022/10/06 11:17:19 Android sandbox: enabled 2022/10/06 11:17:19 fault injection: enabled 2022/10/06 11:17:19 leak checking: enabled 2022/10/06 11:17:19 net packet injection: enabled 2022/10/06 11:17:19 net device setup: enabled 2022/10/06 11:17:19 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/10/06 11:17:19 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/10/06 11:17:19 USB emulation: enabled 2022/10/06 11:17:19 hci packet injection: enabled 2022/10/06 11:17:19 wifi device emulation: failed to parse kernel version (6.0.0-next-20221006) 2022/10/06 11:17:19 802.15.4 emulation: enabled 2022/10/06 11:17:19 fetching corpus: 0, signal 0/2000 (executing program) 2022/10/06 11:17:19 fetching corpus: 35, signal 20201/23582 (executing program) 2022/10/06 11:17:19 fetching corpus: 74, signal 30425/34964 (executing program) 2022/10/06 11:17:19 fetching corpus: 124, signal 41400/46766 (executing program) 2022/10/06 11:17:19 fetching corpus: 174, signal 48737/54870 (executing program) 2022/10/06 11:17:19 fetching corpus: 224, signal 54893/61728 (executing program) 2022/10/06 11:17:19 fetching corpus: 274, signal 57493/65198 (executing program) 2022/10/06 11:17:20 fetching corpus: 324, signal 61475/69821 (executing program) 2022/10/06 11:17:20 fetching corpus: 371, signal 64543/73512 (executing program) 2022/10/06 11:17:20 fetching corpus: 421, signal 66440/76146 (executing program) 2022/10/06 11:17:20 fetching corpus: 470, signal 69750/79822 (executing program) 2022/10/06 11:17:20 fetching corpus: 520, signal 72606/83068 (executing program) 2022/10/06 11:17:20 fetching corpus: 568, signal 74571/85499 (executing program) 2022/10/06 11:17:20 fetching corpus: 616, signal 77734/88890 (executing program) 2022/10/06 11:17:20 fetching corpus: 666, signal 79701/91224 (executing program) 2022/10/06 11:17:20 fetching corpus: 716, signal 82085/93817 (executing program) 2022/10/06 11:17:21 fetching corpus: 766, signal 84390/96217 (executing program) 2022/10/06 11:17:21 fetching corpus: 816, signal 85851/97967 (executing program) 2022/10/06 11:17:21 fetching corpus: 866, signal 87487/99780 (executing program) 2022/10/06 11:17:21 fetching corpus: 916, signal 89654/101963 (executing program) 2022/10/06 11:17:21 fetching corpus: 966, signal 90662/103261 (executing program) 2022/10/06 11:17:21 fetching corpus: 1016, signal 91987/104737 (executing program) 2022/10/06 11:17:21 fetching corpus: 1066, signal 93616/106372 (executing program) 2022/10/06 11:17:21 fetching corpus: 1116, signal 94490/107474 (executing program) 2022/10/06 11:17:21 fetching corpus: 1166, signal 96909/109478 (executing program) 2022/10/06 11:17:21 fetching corpus: 1216, signal 97734/110482 (executing program) 2022/10/06 11:17:22 fetching corpus: 1266, signal 99156/111817 (executing program) 2022/10/06 11:17:22 fetching corpus: 1316, signal 100143/112895 (executing program) 2022/10/06 11:17:22 fetching corpus: 1366, signal 101372/114074 (executing program) 2022/10/06 11:17:22 fetching corpus: 1416, signal 102742/115245 (executing program) 2022/10/06 11:17:22 fetching corpus: 1466, signal 104455/116583 (executing program) 2022/10/06 11:17:22 fetching corpus: 1516, signal 106301/117914 (executing program) 2022/10/06 11:17:22 fetching corpus: 1566, signal 107303/118773 (executing program) 2022/10/06 11:17:22 fetching corpus: 1616, signal 108425/119692 (executing program) 2022/10/06 11:17:22 fetching corpus: 1666, signal 109980/120774 (executing program) 2022/10/06 11:17:23 fetching corpus: 1716, signal 111670/121832 (executing program) 2022/10/06 11:17:23 fetching corpus: 1766, signal 112933/122669 (executing program) 2022/10/06 11:17:23 fetching corpus: 1816, signal 114076/123466 (executing program) 2022/10/06 11:17:23 fetching corpus: 1866, signal 115112/124092 (executing program) 2022/10/06 11:17:23 fetching corpus: 1916, signal 116525/124883 (executing program) 2022/10/06 11:17:23 fetching corpus: 1966, signal 117167/125328 (executing program) 2022/10/06 11:17:23 fetching corpus: 2016, signal 118504/125960 (executing program) 2022/10/06 11:17:24 fetching corpus: 2066, signal 120341/126764 (executing program) 2022/10/06 11:17:24 fetching corpus: 2116, signal 120925/127085 (executing program) 2022/10/06 11:17:24 fetching corpus: 2166, signal 122023/127582 (executing program) 2022/10/06 11:17:24 fetching corpus: 2216, signal 123267/128096 (executing program) 2022/10/06 11:17:24 fetching corpus: 2266, signal 124151/128481 (executing program) 2022/10/06 11:17:24 fetching corpus: 2316, signal 125561/128899 (executing program) 2022/10/06 11:17:24 fetching corpus: 2366, signal 126747/129304 (executing program) 2022/10/06 11:17:24 fetching corpus: 2402, signal 127452/129527 (executing program) 2022/10/06 11:17:24 fetching corpus: 2402, signal 127452/129572 (executing program) 2022/10/06 11:17:24 fetching corpus: 2402, signal 127452/129612 (executing program) 2022/10/06 11:17:24 fetching corpus: 2402, signal 127452/129651 (executing program) 2022/10/06 11:17:24 fetching corpus: 2402, signal 127452/129688 (executing program) 2022/10/06 11:17:24 fetching corpus: 2402, signal 127452/129728 (executing program) 2022/10/06 11:17:24 fetching corpus: 2402, signal 127452/129768 (executing program) 2022/10/06 11:17:24 fetching corpus: 2402, signal 127452/129819 (executing program) 2022/10/06 11:17:24 fetching corpus: 2402, signal 127452/129872 (executing program) 2022/10/06 11:17:24 fetching corpus: 2402, signal 127452/129905 (executing program) 2022/10/06 11:17:24 fetching corpus: 2402, signal 127452/129954 (executing program) 2022/10/06 11:17:24 fetching corpus: 2402, signal 127452/129993 (executing program) 2022/10/06 11:17:24 fetching corpus: 2402, signal 127452/130039 (executing program) 2022/10/06 11:17:24 fetching corpus: 2402, signal 127452/130084 (executing program) 2022/10/06 11:17:24 fetching corpus: 2402, signal 127452/130119 (executing program) 2022/10/06 11:17:24 fetching corpus: 2402, signal 127452/130136 (executing program) 2022/10/06 11:17:24 fetching corpus: 2402, signal 127452/130136 (executing program) 2022/10/06 11:17:27 starting 8 fuzzer processes 11:17:27 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000140)={0x2, 0x0, 0xfffff001}) 11:17:27 executing program 2: syz_mount_image$iso9660(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000001480)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @empty}}) 11:17:27 executing program 1: r0 = io_uring_setup(0x7b5f, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x12, &(0x7f0000000180), 0x1) 11:17:27 executing program 6: perf_event_open(&(0x7f0000001740)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:17:27 executing program 3: syz_emit_ethernet(0x8a, &(0x7f0000000080)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010100, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@generic={0x2, 0xf, "bdbe3c6af51c4143e23450af61"}, @exp_fastopen={0xfe, 0x5, 0xf989, "f6"}, @generic={0x0, 0x9, "fa2eb6ab35ecb5"}, @exp_smc={0xfe, 0x6}, @nop, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @mss={0x2, 0x4}, @exp_fastopen={0xfe, 0x7, 0xf989, "7db37a"}]}}}}}}}, 0x0) 11:17:27 executing program 4: msgctl$IPC_STAT(0x0, 0x2, 0x0) r0 = msgget(0x3, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgget(0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) msgsnd(0x0, &(0x7f0000000300)={0x1, "5107f2b9a800d7ec669207467c6e12747655ba9979f667f8d17020502afbe8f2c674b1f1a374200f005d92f5225c9da85c1653a2d1f33263f9a6ed036e11c551641545d1354bd69b19e7556301028827c63d478cfcec73c50a1afee8c8ac9c42ed1bd5674b6e64abd38621d3d30ace93b7af76ce620fc59908e16e9c27513521a9b9ed3c38c9ea383ee4c6d2d1bb4762f5bbaec1cf1071a835c3240ce335fe6f180308285b2701973779371175f8b649699fe25a0bd26c441f307301fdb06a2d7ab22aa5c8ce4ceaf0946770af3a861ddda18314531c7378cae34d34ade1abde5392e5cae228a722c3b525a36cf206b321d9891d675ddb"}, 0xff, 0x0) msgrcv(r0, &(0x7f00000007c0)={0x0, ""/114}, 0x7a, 0x2, 0x3000) 11:17:27 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=any,cache=none,debug=0']) [ 66.507776] audit: type=1400 audit(1665055047.619:6): avc: denied { execmem } for pid=285 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 11:17:27 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffffffd}]}) [ 67.784784] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 67.786403] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 67.787928] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 67.790948] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 67.792424] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 67.793827] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 67.799722] Bluetooth: hci0: HCI_REQ-0x0c1a [ 67.846963] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 67.848997] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 67.850251] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 67.853134] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 67.854858] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 67.856078] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 67.861264] Bluetooth: hci5: HCI_REQ-0x0c1a [ 67.866899] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 67.868237] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 67.869706] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 67.871211] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 67.875907] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 67.876929] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 67.878102] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 67.879151] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 67.880847] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 67.881999] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 67.882987] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 67.883913] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 67.890188] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 67.891868] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 67.893154] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 67.894168] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 67.895573] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 67.896760] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 67.898370] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 67.899562] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 67.900574] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 67.902244] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 67.903153] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 67.906230] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 67.907752] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 67.908678] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 67.909678] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 67.910535] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 67.912058] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 67.913281] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 67.918281] Bluetooth: hci7: HCI_REQ-0x0c1a [ 67.921522] Bluetooth: hci3: HCI_REQ-0x0c1a [ 67.924440] Bluetooth: hci2: HCI_REQ-0x0c1a [ 67.925378] Bluetooth: hci6: HCI_REQ-0x0c1a [ 67.952341] Bluetooth: hci4: HCI_REQ-0x0c1a [ 69.867073] Bluetooth: hci1: Opcode 0x c03 failed: -110 [ 69.867993] Bluetooth: hci0: command 0x0409 tx timeout [ 69.868619] Bluetooth: hci5: command 0x0409 tx timeout [ 69.994715] Bluetooth: hci4: command 0x0409 tx timeout [ 69.995350] Bluetooth: hci2: command 0x0409 tx timeout [ 69.995862] Bluetooth: hci6: command 0x0409 tx timeout [ 69.996307] Bluetooth: hci7: command 0x0409 tx timeout [ 69.996767] Bluetooth: hci3: command 0x0409 tx timeout [ 71.914788] Bluetooth: hci5: command 0x041b tx timeout [ 71.915507] Bluetooth: hci0: command 0x041b tx timeout [ 72.042741] Bluetooth: hci3: command 0x041b tx timeout [ 72.043431] Bluetooth: hci7: command 0x041b tx timeout [ 72.044117] Bluetooth: hci6: command 0x041b tx timeout [ 72.044802] Bluetooth: hci2: command 0x041b tx timeout [ 72.045427] Bluetooth: hci4: command 0x041b tx timeout [ 72.672410] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 72.688811] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 72.696783] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 72.712765] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 72.717317] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 72.719241] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 72.726647] Bluetooth: hci1: HCI_REQ-0x0c1a [ 73.962728] Bluetooth: hci0: command 0x040f tx timeout [ 73.963158] Bluetooth: hci5: command 0x040f tx timeout [ 74.090724] Bluetooth: hci4: command 0x040f tx timeout [ 74.091119] Bluetooth: hci2: command 0x040f tx timeout [ 74.091472] Bluetooth: hci6: command 0x040f tx timeout [ 74.091860] Bluetooth: hci7: command 0x040f tx timeout [ 74.092227] Bluetooth: hci3: command 0x040f tx timeout [ 74.794778] Bluetooth: hci1: command 0x0409 tx timeout [ 76.010691] Bluetooth: hci5: command 0x0419 tx timeout [ 76.011126] Bluetooth: hci0: command 0x0419 tx timeout [ 76.138721] Bluetooth: hci3: command 0x0419 tx timeout [ 76.139139] Bluetooth: hci7: command 0x0419 tx timeout [ 76.139545] Bluetooth: hci6: command 0x0419 tx timeout [ 76.139965] Bluetooth: hci2: command 0x0419 tx timeout [ 76.140364] Bluetooth: hci4: command 0x0419 tx timeout [ 76.842638] Bluetooth: hci1: command 0x041b tx timeout [ 78.890662] Bluetooth: hci1: command 0x040f tx timeout [ 80.938674] Bluetooth: hci1: command 0x0419 tx timeout 11:18:21 executing program 4: msgctl$IPC_STAT(0x0, 0x2, 0x0) r0 = msgget(0x3, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgget(0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) msgsnd(0x0, &(0x7f0000000300)={0x1, "5107f2b9a800d7ec669207467c6e12747655ba9979f667f8d17020502afbe8f2c674b1f1a374200f005d92f5225c9da85c1653a2d1f33263f9a6ed036e11c551641545d1354bd69b19e7556301028827c63d478cfcec73c50a1afee8c8ac9c42ed1bd5674b6e64abd38621d3d30ace93b7af76ce620fc59908e16e9c27513521a9b9ed3c38c9ea383ee4c6d2d1bb4762f5bbaec1cf1071a835c3240ce335fe6f180308285b2701973779371175f8b649699fe25a0bd26c441f307301fdb06a2d7ab22aa5c8ce4ceaf0946770af3a861ddda18314531c7378cae34d34ade1abde5392e5cae228a722c3b525a36cf206b321d9891d675ddb"}, 0xff, 0x0) msgrcv(r0, &(0x7f00000007c0)={0x0, ""/114}, 0x7a, 0x2, 0x3000) 11:18:22 executing program 4: msgctl$IPC_STAT(0x0, 0x2, 0x0) r0 = msgget(0x3, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgget(0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) msgsnd(0x0, &(0x7f0000000300)={0x1, "5107f2b9a800d7ec669207467c6e12747655ba9979f667f8d17020502afbe8f2c674b1f1a374200f005d92f5225c9da85c1653a2d1f33263f9a6ed036e11c551641545d1354bd69b19e7556301028827c63d478cfcec73c50a1afee8c8ac9c42ed1bd5674b6e64abd38621d3d30ace93b7af76ce620fc59908e16e9c27513521a9b9ed3c38c9ea383ee4c6d2d1bb4762f5bbaec1cf1071a835c3240ce335fe6f180308285b2701973779371175f8b649699fe25a0bd26c441f307301fdb06a2d7ab22aa5c8ce4ceaf0946770af3a861ddda18314531c7378cae34d34ade1abde5392e5cae228a722c3b525a36cf206b321d9891d675ddb"}, 0xff, 0x0) msgrcv(r0, &(0x7f00000007c0)={0x0, ""/114}, 0x7a, 0x2, 0x3000) 11:18:22 executing program 4: msgctl$IPC_STAT(0x0, 0x2, 0x0) r0 = msgget(0x3, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgget(0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) msgsnd(0x0, &(0x7f0000000300)={0x1, "5107f2b9a800d7ec669207467c6e12747655ba9979f667f8d17020502afbe8f2c674b1f1a374200f005d92f5225c9da85c1653a2d1f33263f9a6ed036e11c551641545d1354bd69b19e7556301028827c63d478cfcec73c50a1afee8c8ac9c42ed1bd5674b6e64abd38621d3d30ace93b7af76ce620fc59908e16e9c27513521a9b9ed3c38c9ea383ee4c6d2d1bb4762f5bbaec1cf1071a835c3240ce335fe6f180308285b2701973779371175f8b649699fe25a0bd26c441f307301fdb06a2d7ab22aa5c8ce4ceaf0946770af3a861ddda18314531c7378cae34d34ade1abde5392e5cae228a722c3b525a36cf206b321d9891d675ddb"}, 0xff, 0x0) msgrcv(r0, &(0x7f00000007c0)={0x0, ""/114}, 0x7a, 0x2, 0x3000) 11:18:22 executing program 4: msgctl$IPC_STAT(0x0, 0x2, 0x0) r0 = msgget(0x3, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgget(0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) msgsnd(0x0, &(0x7f0000000300)={0x1, "5107f2b9a800d7ec669207467c6e12747655ba9979f667f8d17020502afbe8f2c674b1f1a374200f005d92f5225c9da85c1653a2d1f33263f9a6ed036e11c551641545d1354bd69b19e7556301028827c63d478cfcec73c50a1afee8c8ac9c42ed1bd5674b6e64abd38621d3d30ace93b7af76ce620fc59908e16e9c27513521a9b9ed3c38c9ea383ee4c6d2d1bb4762f5bbaec1cf1071a835c3240ce335fe6f180308285b2701973779371175f8b649699fe25a0bd26c441f307301fdb06a2d7ab22aa5c8ce4ceaf0946770af3a861ddda18314531c7378cae34d34ade1abde5392e5cae228a722c3b525a36cf206b321d9891d675ddb"}, 0xff, 0x0) msgrcv(r0, &(0x7f00000007c0)={0x0, ""/114}, 0x7a, 0x2, 0x3000) 11:18:22 executing program 4: msgctl$IPC_STAT(0x0, 0x2, 0x0) r0 = msgget(0x3, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgget(0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) msgsnd(0x0, &(0x7f0000000300)={0x1, "5107f2b9a800d7ec669207467c6e12747655ba9979f667f8d17020502afbe8f2c674b1f1a374200f005d92f5225c9da85c1653a2d1f33263f9a6ed036e11c551641545d1354bd69b19e7556301028827c63d478cfcec73c50a1afee8c8ac9c42ed1bd5674b6e64abd38621d3d30ace93b7af76ce620fc59908e16e9c27513521a9b9ed3c38c9ea383ee4c6d2d1bb4762f5bbaec1cf1071a835c3240ce335fe6f180308285b2701973779371175f8b649699fe25a0bd26c441f307301fdb06a2d7ab22aa5c8ce4ceaf0946770af3a861ddda18314531c7378cae34d34ade1abde5392e5cae228a722c3b525a36cf206b321d9891d675ddb"}, 0xff, 0x0) msgrcv(r0, &(0x7f00000007c0)={0x0, ""/114}, 0x7a, 0x2, 0x3000) 11:18:22 executing program 4: msgctl$IPC_STAT(0x0, 0x2, 0x0) r0 = msgget(0x3, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgget(0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) msgsnd(0x0, &(0x7f0000000300)={0x1, "5107f2b9a800d7ec669207467c6e12747655ba9979f667f8d17020502afbe8f2c674b1f1a374200f005d92f5225c9da85c1653a2d1f33263f9a6ed036e11c551641545d1354bd69b19e7556301028827c63d478cfcec73c50a1afee8c8ac9c42ed1bd5674b6e64abd38621d3d30ace93b7af76ce620fc59908e16e9c27513521a9b9ed3c38c9ea383ee4c6d2d1bb4762f5bbaec1cf1071a835c3240ce335fe6f180308285b2701973779371175f8b649699fe25a0bd26c441f307301fdb06a2d7ab22aa5c8ce4ceaf0946770af3a861ddda18314531c7378cae34d34ade1abde5392e5cae228a722c3b525a36cf206b321d9891d675ddb"}, 0xff, 0x0) msgrcv(r0, &(0x7f00000007c0)={0x0, ""/114}, 0x7a, 0x2, 0x3000) 11:18:22 executing program 4: msgctl$IPC_STAT(0x0, 0x2, 0x0) r0 = msgget(0x3, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgget(0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) msgsnd(0x0, &(0x7f0000000300)={0x1, "5107f2b9a800d7ec669207467c6e12747655ba9979f667f8d17020502afbe8f2c674b1f1a374200f005d92f5225c9da85c1653a2d1f33263f9a6ed036e11c551641545d1354bd69b19e7556301028827c63d478cfcec73c50a1afee8c8ac9c42ed1bd5674b6e64abd38621d3d30ace93b7af76ce620fc59908e16e9c27513521a9b9ed3c38c9ea383ee4c6d2d1bb4762f5bbaec1cf1071a835c3240ce335fe6f180308285b2701973779371175f8b649699fe25a0bd26c441f307301fdb06a2d7ab22aa5c8ce4ceaf0946770af3a861ddda18314531c7378cae34d34ade1abde5392e5cae228a722c3b525a36cf206b321d9891d675ddb"}, 0xff, 0x0) msgrcv(r0, &(0x7f00000007c0)={0x0, ""/114}, 0x7a, 0x2, 0x3000) 11:18:22 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=any,cache=none,debug=0']) [ 124.372126] audit: type=1400 audit(1665055105.487:7): avc: denied { open } for pid=3970 comm="syz-executor.6" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 11:18:25 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000140)={0x2, 0x0, 0xfffff001}) 11:18:25 executing program 3: syz_emit_ethernet(0x8a, &(0x7f0000000080)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010100, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@generic={0x2, 0xf, "bdbe3c6af51c4143e23450af61"}, @exp_fastopen={0xfe, 0x5, 0xf989, "f6"}, @generic={0x0, 0x9, "fa2eb6ab35ecb5"}, @exp_smc={0xfe, 0x6}, @nop, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @mss={0x2, 0x4}, @exp_fastopen={0xfe, 0x7, 0xf989, "7db37a"}]}}}}}}}, 0x0) 11:18:25 executing program 6: perf_event_open(&(0x7f0000001740)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:18:25 executing program 2: syz_mount_image$iso9660(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000001480)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @empty}}) 11:18:25 executing program 4: msgctl$IPC_STAT(0x0, 0x2, 0x0) r0 = msgget(0x3, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgget(0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) msgsnd(0x0, &(0x7f0000000300)={0x1, "5107f2b9a800d7ec669207467c6e12747655ba9979f667f8d17020502afbe8f2c674b1f1a374200f005d92f5225c9da85c1653a2d1f33263f9a6ed036e11c551641545d1354bd69b19e7556301028827c63d478cfcec73c50a1afee8c8ac9c42ed1bd5674b6e64abd38621d3d30ace93b7af76ce620fc59908e16e9c27513521a9b9ed3c38c9ea383ee4c6d2d1bb4762f5bbaec1cf1071a835c3240ce335fe6f180308285b2701973779371175f8b649699fe25a0bd26c441f307301fdb06a2d7ab22aa5c8ce4ceaf0946770af3a861ddda18314531c7378cae34d34ade1abde5392e5cae228a722c3b525a36cf206b321d9891d675ddb"}, 0xff, 0x0) msgrcv(r0, &(0x7f00000007c0)={0x0, ""/114}, 0x7a, 0x2, 0x3000) 11:18:25 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffffffd}]}) 11:18:25 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=any,cache=none,debug=0']) 11:18:25 executing program 1: r0 = io_uring_setup(0x7b5f, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x12, &(0x7f0000000180), 0x1) 11:18:25 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=any,cache=none,debug=0']) 11:18:25 executing program 4: msgctl$IPC_STAT(0x0, 0x2, 0x0) r0 = msgget(0x3, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgget(0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) msgsnd(0x0, &(0x7f0000000300)={0x1, "5107f2b9a800d7ec669207467c6e12747655ba9979f667f8d17020502afbe8f2c674b1f1a374200f005d92f5225c9da85c1653a2d1f33263f9a6ed036e11c551641545d1354bd69b19e7556301028827c63d478cfcec73c50a1afee8c8ac9c42ed1bd5674b6e64abd38621d3d30ace93b7af76ce620fc59908e16e9c27513521a9b9ed3c38c9ea383ee4c6d2d1bb4762f5bbaec1cf1071a835c3240ce335fe6f180308285b2701973779371175f8b649699fe25a0bd26c441f307301fdb06a2d7ab22aa5c8ce4ceaf0946770af3a861ddda18314531c7378cae34d34ade1abde5392e5cae228a722c3b525a36cf206b321d9891d675ddb"}, 0xff, 0x0) msgrcv(r0, &(0x7f00000007c0)={0x0, ""/114}, 0x7a, 0x2, 0x3000) 11:18:25 executing program 3: syz_emit_ethernet(0x8a, &(0x7f0000000080)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010100, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@generic={0x2, 0xf, "bdbe3c6af51c4143e23450af61"}, @exp_fastopen={0xfe, 0x5, 0xf989, "f6"}, @generic={0x0, 0x9, "fa2eb6ab35ecb5"}, @exp_smc={0xfe, 0x6}, @nop, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @mss={0x2, 0x4}, @exp_fastopen={0xfe, 0x7, 0xf989, "7db37a"}]}}}}}}}, 0x0) 11:18:25 executing program 1: r0 = io_uring_setup(0x7b5f, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x12, &(0x7f0000000180), 0x1) 11:18:25 executing program 6: perf_event_open(&(0x7f0000001740)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:18:25 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffffffd}]}) 11:18:25 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000140)={0x2, 0x0, 0xfffff001}) 11:18:25 executing program 6: perf_event_open(&(0x7f0000001740)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:18:25 executing program 2: syz_mount_image$iso9660(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000001480)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @empty}}) 11:18:25 executing program 1: r0 = io_uring_setup(0x7b5f, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x12, &(0x7f0000000180), 0x1) 11:18:25 executing program 3: syz_emit_ethernet(0x8a, &(0x7f0000000080)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010100, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@generic={0x2, 0xf, "bdbe3c6af51c4143e23450af61"}, @exp_fastopen={0xfe, 0x5, 0xf989, "f6"}, @generic={0x0, 0x9, "fa2eb6ab35ecb5"}, @exp_smc={0xfe, 0x6}, @nop, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @mss={0x2, 0x4}, @exp_fastopen={0xfe, 0x7, 0xf989, "7db37a"}]}}}}}}}, 0x0) 11:18:25 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffffffd}]}) 11:18:25 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=any,cache=none,debug=0']) 11:18:25 executing program 5: msgctl$IPC_STAT(0x0, 0x2, 0x0) r0 = msgget(0x3, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgget(0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) msgsnd(0x0, &(0x7f0000000300)={0x1, "5107f2b9a800d7ec669207467c6e12747655ba9979f667f8d17020502afbe8f2c674b1f1a374200f005d92f5225c9da85c1653a2d1f33263f9a6ed036e11c551641545d1354bd69b19e7556301028827c63d478cfcec73c50a1afee8c8ac9c42ed1bd5674b6e64abd38621d3d30ace93b7af76ce620fc59908e16e9c27513521a9b9ed3c38c9ea383ee4c6d2d1bb4762f5bbaec1cf1071a835c3240ce335fe6f180308285b2701973779371175f8b649699fe25a0bd26c441f307301fdb06a2d7ab22aa5c8ce4ceaf0946770af3a861ddda18314531c7378cae34d34ade1abde5392e5cae228a722c3b525a36cf206b321d9891d675ddb"}, 0xff, 0x0) msgrcv(r0, &(0x7f00000007c0)={0x0, ""/114}, 0x7a, 0x2, 0x3000) 11:18:25 executing program 2: syz_mount_image$iso9660(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000001480)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @empty}}) 11:18:25 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000140)={0x2, 0x0, 0xfffff001}) 11:18:25 executing program 5: msgctl$IPC_STAT(0x0, 0x2, 0x0) r0 = msgget(0x3, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgget(0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) msgsnd(0x0, &(0x7f0000000300)={0x1, "5107f2b9a800d7ec669207467c6e12747655ba9979f667f8d17020502afbe8f2c674b1f1a374200f005d92f5225c9da85c1653a2d1f33263f9a6ed036e11c551641545d1354bd69b19e7556301028827c63d478cfcec73c50a1afee8c8ac9c42ed1bd5674b6e64abd38621d3d30ace93b7af76ce620fc59908e16e9c27513521a9b9ed3c38c9ea383ee4c6d2d1bb4762f5bbaec1cf1071a835c3240ce335fe6f180308285b2701973779371175f8b649699fe25a0bd26c441f307301fdb06a2d7ab22aa5c8ce4ceaf0946770af3a861ddda18314531c7378cae34d34ade1abde5392e5cae228a722c3b525a36cf206b321d9891d675ddb"}, 0xff, 0x0) msgrcv(r0, &(0x7f00000007c0)={0x0, ""/114}, 0x7a, 0x2, 0x3000) 11:18:25 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=any,cache=none,debug=0']) 11:18:25 executing program 6: msgctl$IPC_STAT(0x0, 0x2, 0x0) r0 = msgget(0x3, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgget(0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) msgsnd(0x0, &(0x7f0000000300)={0x1, "5107f2b9a800d7ec669207467c6e12747655ba9979f667f8d17020502afbe8f2c674b1f1a374200f005d92f5225c9da85c1653a2d1f33263f9a6ed036e11c551641545d1354bd69b19e7556301028827c63d478cfcec73c50a1afee8c8ac9c42ed1bd5674b6e64abd38621d3d30ace93b7af76ce620fc59908e16e9c27513521a9b9ed3c38c9ea383ee4c6d2d1bb4762f5bbaec1cf1071a835c3240ce335fe6f180308285b2701973779371175f8b649699fe25a0bd26c441f307301fdb06a2d7ab22aa5c8ce4ceaf0946770af3a861ddda18314531c7378cae34d34ade1abde5392e5cae228a722c3b525a36cf206b321d9891d675ddb"}, 0xff, 0x0) msgrcv(r0, &(0x7f00000007c0)={0x0, ""/114}, 0x7a, 0x2, 0x3000) 11:18:26 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'ip6_vti0\x00', &(0x7f0000000380)={'ip6gre0\x00', 0x0, 0x29, 0x4, 0x6, 0x1, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80, 0x20, 0x1000, 0xffffffff}}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000440)={@dev={0xfe, 0x80, '\x00', 0x33}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x10001, 0x5, 0x200, 0x0, 0x9e, 0x1000000, r1}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@remote, @ipv4={'\x00', '\xff\xff', @empty}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x6395, 0x0, 0x0, 0x0, 0x5000004}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x4}}, './file0\x00'}) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={@mcast1, @mcast1, @remote, 0x8, 0x2, 0x400, 0x100, 0x3, 0x100000}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x2100c, 0x0) 11:18:26 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) [ 124.945660] audit: type=1400 audit(1665055106.061:8): avc: denied { kernel } for pid=4029 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 11:18:26 executing program 5: msgctl$IPC_STAT(0x0, 0x2, 0x0) r0 = msgget(0x3, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgget(0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) msgsnd(0x0, &(0x7f0000000300)={0x1, "5107f2b9a800d7ec669207467c6e12747655ba9979f667f8d17020502afbe8f2c674b1f1a374200f005d92f5225c9da85c1653a2d1f33263f9a6ed036e11c551641545d1354bd69b19e7556301028827c63d478cfcec73c50a1afee8c8ac9c42ed1bd5674b6e64abd38621d3d30ace93b7af76ce620fc59908e16e9c27513521a9b9ed3c38c9ea383ee4c6d2d1bb4762f5bbaec1cf1071a835c3240ce335fe6f180308285b2701973779371175f8b649699fe25a0bd26c441f307301fdb06a2d7ab22aa5c8ce4ceaf0946770af3a861ddda18314531c7378cae34d34ade1abde5392e5cae228a722c3b525a36cf206b321d9891d675ddb"}, 0xff, 0x0) msgrcv(r0, &(0x7f00000007c0)={0x0, ""/114}, 0x7a, 0x2, 0x3000) [ 124.960440] ------------[ cut here ]------------ [ 124.960471] [ 124.960476] ====================================================== [ 124.960481] WARNING: possible circular locking dependency detected [ 124.960487] 6.0.0-next-20221006 #1 Not tainted [ 124.960498] ------------------------------------------------------ [ 124.960503] syz-executor.1/4031 is trying to acquire lock: [ 124.960513] ffffffff853fac98 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 124.960580] [ 124.960580] but task is already holding lock: [ 124.960584] ffff88800ec74c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 124.960631] [ 124.960631] which lock already depends on the new lock. [ 124.960631] [ 124.960635] [ 124.960635] the existing dependency chain (in reverse order) is: [ 124.960641] [ 124.960641] -> #3 (&ctx->lock){....}-{2:2}: [ 124.960663] _raw_spin_lock+0x2a/0x40 [ 124.960683] __perf_event_task_sched_out+0x53b/0x18d0 [ 124.960701] __schedule+0xedd/0x2470 [ 124.960726] preempt_schedule_common+0x45/0xc0 [ 124.960752] __cond_resched+0x17/0x30 [ 124.960777] __mutex_lock+0xa3/0x14d0 [ 124.960803] __do_sys_perf_event_open+0x1eec/0x32c0 [ 124.960822] do_syscall_64+0x3b/0x90 [ 124.960839] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 124.960862] [ 124.960862] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 124.960884] _raw_spin_lock_nested+0x30/0x40 [ 124.960903] raw_spin_rq_lock_nested+0x1e/0x30 [ 124.960924] task_fork_fair+0x63/0x4d0 [ 124.960951] sched_cgroup_fork+0x3d0/0x540 [ 124.960974] copy_process+0x4183/0x6e20 [ 124.960992] kernel_clone+0xe7/0x890 [ 124.961007] user_mode_thread+0xad/0xf0 [ 124.961023] rest_init+0x24/0x250 [ 124.961044] arch_call_rest_init+0xf/0x14 [ 124.961063] start_kernel+0x4c6/0x4eb [ 124.961079] secondary_startup_64_no_verify+0xe0/0xeb [ 124.961101] [ 124.961101] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 124.961123] _raw_spin_lock_irqsave+0x39/0x60 [ 124.961142] try_to_wake_up+0xab/0x1930 [ 124.961164] up+0x75/0xb0 [ 124.961189] __up_console_sem+0x6e/0x80 [ 124.961214] console_unlock+0x46a/0x590 [ 124.961240] vt_ioctl+0x2822/0x2ca0 [ 124.961260] tty_ioctl+0x785/0x16b0 [ 124.961278] __x64_sys_ioctl+0x19a/0x210 [ 124.961300] do_syscall_64+0x3b/0x90 [ 124.961316] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 124.961339] [ 124.961339] -> #0 ((console_sem).lock){....}-{2:2}: [ 124.961361] __lock_acquire+0x2a02/0x5e70 [ 124.961388] lock_acquire+0x1a2/0x530 [ 124.961413] _raw_spin_lock_irqsave+0x39/0x60 [ 124.961433] down_trylock+0xe/0x70 [ 124.961459] __down_trylock_console_sem+0x3b/0xd0 [ 124.961485] vprintk_emit+0x16b/0x560 [ 124.961511] vprintk+0x84/0xa0 [ 124.961536] _printk+0xba/0xf1 [ 124.961556] report_bug.cold+0x72/0xab [ 124.961571] handle_bug+0x3c/0x70 [ 124.961587] exc_invalid_op+0x14/0x50 [ 124.961603] asm_exc_invalid_op+0x16/0x20 [ 124.961625] group_sched_out.part.0+0x2c7/0x460 [ 124.961654] ctx_sched_out+0x8f1/0xc10 [ 124.961680] __perf_event_task_sched_out+0x6d0/0x18d0 [ 124.961698] __schedule+0xedd/0x2470 [ 124.961722] preempt_schedule_common+0x45/0xc0 [ 124.961749] __cond_resched+0x17/0x30 [ 124.961773] __mutex_lock+0xa3/0x14d0 [ 124.961799] __do_sys_perf_event_open+0x1eec/0x32c0 [ 124.961818] do_syscall_64+0x3b/0x90 [ 124.961834] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 124.961856] [ 124.961856] other info that might help us debug this: [ 124.961856] [ 124.961860] Chain exists of: [ 124.961860] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 124.961860] [ 124.961884] Possible unsafe locking scenario: [ 124.961884] [ 124.961888] CPU0 CPU1 [ 124.961892] ---- ---- [ 124.961895] lock(&ctx->lock); [ 124.961905] lock(&rq->__lock); [ 124.961915] lock(&ctx->lock); [ 124.961925] lock((console_sem).lock); [ 124.961934] [ 124.961934] *** DEADLOCK *** [ 124.961934] [ 124.961937] 2 locks held by syz-executor.1/4031: [ 124.961948] #0: ffff88806ce37e98 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 124.961998] #1: ffff88800ec74c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 124.962041] [ 124.962041] stack backtrace: [ 124.962045] CPU: 0 PID: 4031 Comm: syz-executor.1 Not tainted 6.0.0-next-20221006 #1 [ 124.962065] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 124.962076] Call Trace: [ 124.962081] [ 124.962087] dump_stack_lvl+0x8b/0xb3 [ 124.962106] check_noncircular+0x263/0x2e0 [ 124.962133] ? format_decode+0x26c/0xb50 [ 124.962160] ? print_circular_bug+0x450/0x450 [ 124.962188] ? simple_strtoul+0x30/0x30 [ 124.962215] ? mark_lock.part.0+0xef/0x2f70 [ 124.962242] ? format_decode+0x26c/0xb50 [ 124.962272] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 124.962300] __lock_acquire+0x2a02/0x5e70 [ 124.962335] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 124.962371] lock_acquire+0x1a2/0x530 [ 124.962398] ? down_trylock+0xe/0x70 [ 124.962428] ? lock_release+0x750/0x750 [ 124.962461] ? vprintk+0x84/0xa0 [ 124.962490] _raw_spin_lock_irqsave+0x39/0x60 [ 124.962510] ? down_trylock+0xe/0x70 [ 124.962538] down_trylock+0xe/0x70 [ 124.962566] ? vprintk+0x84/0xa0 [ 124.962593] __down_trylock_console_sem+0x3b/0xd0 [ 124.962622] vprintk_emit+0x16b/0x560 [ 124.962660] vprintk+0x84/0xa0 [ 124.962688] _printk+0xba/0xf1 [ 124.962709] ? record_print_text.cold+0x16/0x16 [ 124.962736] ? report_bug.cold+0x66/0xab [ 124.962754] ? group_sched_out.part.0+0x2c7/0x460 [ 124.962784] report_bug.cold+0x72/0xab [ 124.962804] handle_bug+0x3c/0x70 [ 124.962821] exc_invalid_op+0x14/0x50 [ 124.962839] asm_exc_invalid_op+0x16/0x20 [ 124.962862] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 124.962895] Code: 5e 41 5f e9 5b a5 ef ff e8 56 a5 ef ff 65 8b 1d 1b fe ab 7e 31 ff 89 de e8 f6 a1 ef ff 85 db 0f 84 8a 00 00 00 e8 39 a5 ef ff <0f> 0b e9 a5 fe ff ff e8 2d a5 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 124.962913] RSP: 0018:ffff88803de9f978 EFLAGS: 00010006 [ 124.962928] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 124.962940] RDX: ffff88803de79ac0 RSI: ffffffff815677b7 RDI: 0000000000000005 [ 124.962952] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 124.962964] R10: 0000000000000000 R11: ffffffff865b601b R12: ffff88800ec74c00 [ 124.962976] R13: ffff88806ce3d2c0 R14: ffffffff8547d200 R15: 0000000000000002 [ 124.962994] ? group_sched_out.part.0+0x2c7/0x460 [ 124.963026] ? group_sched_out.part.0+0x2c7/0x460 [ 124.963058] ctx_sched_out+0x8f1/0xc10 [ 124.963090] __perf_event_task_sched_out+0x6d0/0x18d0 [ 124.963113] ? lock_is_held_type+0xd7/0x130 [ 124.963138] ? __perf_cgroup_move+0x160/0x160 [ 124.963155] ? set_next_entity+0x304/0x550 [ 124.963183] ? update_curr+0x267/0x740 [ 124.963213] ? lock_is_held_type+0xd7/0x130 [ 124.963238] __schedule+0xedd/0x2470 [ 124.963268] ? io_schedule_timeout+0x150/0x150 [ 124.963294] ? find_held_lock+0x2c/0x110 [ 124.963321] ? lock_is_held_type+0xd7/0x130 [ 124.963344] ? __cond_resched+0x17/0x30 [ 124.963371] preempt_schedule_common+0x45/0xc0 [ 124.963400] __cond_resched+0x17/0x30 [ 124.963426] __mutex_lock+0xa3/0x14d0 [ 124.963455] ? lock_is_held_type+0xd7/0x130 [ 124.963478] ? __do_sys_perf_event_open+0x1eec/0x32c0 [ 124.963500] ? mutex_lock_io_nested+0x1310/0x1310 [ 124.963529] ? lock_release+0x3b2/0x750 [ 124.963557] ? __up_read+0x192/0x730 [ 124.963581] ? up_write+0x520/0x520 [ 124.963604] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 124.963629] __do_sys_perf_event_open+0x1eec/0x32c0 [ 124.963655] ? perf_compat_ioctl+0x130/0x130 [ 124.963673] ? xfd_validate_state+0x59/0x180 [ 124.963710] ? syscall_enter_from_user_mode+0x1d/0x50 [ 124.963734] ? syscall_enter_from_user_mode+0x1d/0x50 [ 124.963762] do_syscall_64+0x3b/0x90 [ 124.963779] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 124.963803] RIP: 0033:0x7f340282ab19 [ 124.963816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 124.963834] RSP: 002b:00007f33ffda0188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 124.963852] RAX: ffffffffffffffda RBX: 00007f340293df60 RCX: 00007f340282ab19 [ 124.963864] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000000020000080 [ 124.963876] RBP: 00007f3402884f6d R08: 0000000000000000 R09: 0000000000000000 [ 124.963888] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 124.963899] R13: 00007ffc1f8cdf0f R14: 00007f33ffda0300 R15: 0000000000022000 [ 124.963920] [ 125.051063] WARNING: CPU: 0 PID: 4031 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 125.051960] Modules linked in: [ 125.052279] CPU: 0 PID: 4031 Comm: syz-executor.1 Not tainted 6.0.0-next-20221006 #1 [ 125.053030] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 125.053827] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 125.054377] Code: 5e 41 5f e9 5b a5 ef ff e8 56 a5 ef ff 65 8b 1d 1b fe ab 7e 31 ff 89 de e8 f6 a1 ef ff 85 db 0f 84 8a 00 00 00 e8 39 a5 ef ff <0f> 0b e9 a5 fe ff ff e8 2d a5 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 125.056112] RSP: 0018:ffff88803de9f978 EFLAGS: 00010006 [ 125.056630] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 125.057315] RDX: ffff88803de79ac0 RSI: ffffffff815677b7 RDI: 0000000000000005 [ 125.058004] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 125.058703] R10: 0000000000000000 R11: ffffffff865b601b R12: ffff88800ec74c00 [ 125.059398] R13: ffff88806ce3d2c0 R14: ffffffff8547d200 R15: 0000000000000002 [ 125.060090] FS: 00007f33ffda0700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 125.060868] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 125.061436] CR2: 0000001b2db21000 CR3: 000000003c188000 CR4: 0000000000350ef0 [ 125.062132] Call Trace: [ 125.062393] [ 125.062627] ctx_sched_out+0x8f1/0xc10 [ 125.063055] __perf_event_task_sched_out+0x6d0/0x18d0 [ 125.063563] ? lock_is_held_type+0xd7/0x130 [ 125.063989] ? __perf_cgroup_move+0x160/0x160 [ 125.064429] ? set_next_entity+0x304/0x550 [ 125.064855] ? update_curr+0x267/0x740 [ 125.065251] ? lock_is_held_type+0xd7/0x130 [ 125.065680] __schedule+0xedd/0x2470 [ 125.066063] ? io_schedule_timeout+0x150/0x150 [ 125.066517] ? find_held_lock+0x2c/0x110 [ 125.066936] ? lock_is_held_type+0xd7/0x130 [ 125.067359] ? __cond_resched+0x17/0x30 [ 125.067765] preempt_schedule_common+0x45/0xc0 [ 125.068228] __cond_resched+0x17/0x30 [ 125.068612] __mutex_lock+0xa3/0x14d0 [ 125.069001] ? lock_is_held_type+0xd7/0x130 [ 125.069433] ? __do_sys_perf_event_open+0x1eec/0x32c0 [ 125.069931] ? mutex_lock_io_nested+0x1310/0x1310 [ 125.070411] ? lock_release+0x3b2/0x750 [ 125.070822] ? __up_read+0x192/0x730 [ 125.071198] ? up_write+0x520/0x520 [ 125.071569] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 125.072073] __do_sys_perf_event_open+0x1eec/0x32c0 [ 125.072566] ? perf_compat_ioctl+0x130/0x130 [ 125.073003] ? xfd_validate_state+0x59/0x180 [ 125.073452] ? syscall_enter_from_user_mode+0x1d/0x50 [ 125.073953] ? syscall_enter_from_user_mode+0x1d/0x50 [ 125.074462] do_syscall_64+0x3b/0x90 [ 125.074843] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 125.075345] RIP: 0033:0x7f340282ab19 [ 125.075715] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 125.077415] RSP: 002b:00007f33ffda0188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 125.078144] RAX: ffffffffffffffda RBX: 00007f340293df60 RCX: 00007f340282ab19 [ 125.078840] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000000020000080 [ 125.079521] RBP: 00007f3402884f6d R08: 0000000000000000 R09: 0000000000000000 [ 125.080203] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 125.080871] R13: 00007ffc1f8cdf0f R14: 00007f33ffda0300 R15: 0000000000022000 [ 125.081546] [ 125.081776] irq event stamp: 852 [ 125.082109] hardirqs last enabled at (851): [] _raw_spin_unlock_irqrestore+0x28/0x60 [ 125.082997] hardirqs last disabled at (852): [] __schedule+0x1225/0x2470 [ 125.083792] softirqs last enabled at (722): [] __irq_exit_rcu+0x11b/0x180 [ 125.084602] softirqs last disabled at (695): [] __irq_exit_rcu+0x11b/0x180 [ 125.085408] ---[ end trace 0000000000000000 ]--- [ 125.104937] loop1: detected capacity change from 0 to 256 11:18:26 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=any,cache=none,debug=0']) 11:18:26 executing program 6: msgctl$IPC_STAT(0x0, 0x2, 0x0) r0 = msgget(0x3, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgget(0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) msgsnd(0x0, &(0x7f0000000300)={0x1, "5107f2b9a800d7ec669207467c6e12747655ba9979f667f8d17020502afbe8f2c674b1f1a374200f005d92f5225c9da85c1653a2d1f33263f9a6ed036e11c551641545d1354bd69b19e7556301028827c63d478cfcec73c50a1afee8c8ac9c42ed1bd5674b6e64abd38621d3d30ace93b7af76ce620fc59908e16e9c27513521a9b9ed3c38c9ea383ee4c6d2d1bb4762f5bbaec1cf1071a835c3240ce335fe6f180308285b2701973779371175f8b649699fe25a0bd26c441f307301fdb06a2d7ab22aa5c8ce4ceaf0946770af3a861ddda18314531c7378cae34d34ade1abde5392e5cae228a722c3b525a36cf206b321d9891d675ddb"}, 0xff, 0x0) msgrcv(r0, &(0x7f00000007c0)={0x0, ""/114}, 0x7a, 0x2, 0x3000) [ 125.143528] loop1: detected capacity change from 0 to 256 11:18:26 executing program 7: r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0) 11:18:26 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000001980)=[{{&(0x7f0000000000)={0x2, 0x4e24, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x4008884) dup2(r0, r1) 11:18:26 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, &(0x7f0000000040)) 11:18:26 executing program 4: keyctl$KEYCTL_PKEY_VERIFY(0x18, 0x0, &(0x7f0000000980)={'enc=', 'pkcs1', ' hash=', {'sha3-224-ce\x00'}}, 0x0, 0x0) 11:18:26 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 11:18:26 executing program 7: r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0) 11:18:26 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 11:18:26 executing program 6: msgctl$IPC_STAT(0x0, 0x2, 0x0) r0 = msgget(0x3, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgget(0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) msgsnd(0x0, &(0x7f0000000300)={0x1, "5107f2b9a800d7ec669207467c6e12747655ba9979f667f8d17020502afbe8f2c674b1f1a374200f005d92f5225c9da85c1653a2d1f33263f9a6ed036e11c551641545d1354bd69b19e7556301028827c63d478cfcec73c50a1afee8c8ac9c42ed1bd5674b6e64abd38621d3d30ace93b7af76ce620fc59908e16e9c27513521a9b9ed3c38c9ea383ee4c6d2d1bb4762f5bbaec1cf1071a835c3240ce335fe6f180308285b2701973779371175f8b649699fe25a0bd26c441f307301fdb06a2d7ab22aa5c8ce4ceaf0946770af3a861ddda18314531c7378cae34d34ade1abde5392e5cae228a722c3b525a36cf206b321d9891d675ddb"}, 0xff, 0x0) msgrcv(r0, &(0x7f00000007c0)={0x0, ""/114}, 0x7a, 0x2, 0x3000) 11:18:26 executing program 4: keyctl$KEYCTL_PKEY_VERIFY(0x18, 0x0, &(0x7f0000000980)={'enc=', 'pkcs1', ' hash=', {'sha3-224-ce\x00'}}, 0x0, 0x0) 11:18:26 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000001980)=[{{&(0x7f0000000000)={0x2, 0x4e24, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x4008884) dup2(r0, r1) 11:18:26 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'ip6_vti0\x00', &(0x7f0000000380)={'ip6gre0\x00', 0x0, 0x29, 0x4, 0x6, 0x1, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80, 0x20, 0x1000, 0xffffffff}}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000440)={@dev={0xfe, 0x80, '\x00', 0x33}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x10001, 0x5, 0x200, 0x0, 0x9e, 0x1000000, r1}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@remote, @ipv4={'\x00', '\xff\xff', @empty}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x6395, 0x0, 0x0, 0x0, 0x5000004}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x4}}, './file0\x00'}) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={@mcast1, @mcast1, @remote, 0x8, 0x2, 0x400, 0x100, 0x3, 0x100000}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x2100c, 0x0) 11:18:26 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, &(0x7f0000000040)) 11:18:26 executing program 2: r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0) [ 125.336488] loop1: detected capacity change from 0 to 256 11:18:26 executing program 4: keyctl$KEYCTL_PKEY_VERIFY(0x18, 0x0, &(0x7f0000000980)={'enc=', 'pkcs1', ' hash=', {'sha3-224-ce\x00'}}, 0x0, 0x0) 11:18:26 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, &(0x7f0000000040)) 11:18:26 executing program 7: r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0) 11:18:26 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000001980)=[{{&(0x7f0000000000)={0x2, 0x4e24, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x4008884) dup2(r0, r1) 11:18:26 executing program 6: r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0) 11:18:26 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'ip6_vti0\x00', &(0x7f0000000380)={'ip6gre0\x00', 0x0, 0x29, 0x4, 0x6, 0x1, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80, 0x20, 0x1000, 0xffffffff}}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000440)={@dev={0xfe, 0x80, '\x00', 0x33}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x10001, 0x5, 0x200, 0x0, 0x9e, 0x1000000, r1}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@remote, @ipv4={'\x00', '\xff\xff', @empty}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x6395, 0x0, 0x0, 0x0, 0x5000004}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x4}}, './file0\x00'}) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={@mcast1, @mcast1, @remote, 0x8, 0x2, 0x400, 0x100, 0x3, 0x100000}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x2100c, 0x0) 11:18:26 executing program 2: r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0) [ 125.442714] loop1: detected capacity change from 0 to 256 11:18:26 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, &(0x7f0000000040)) 11:18:26 executing program 7: r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0) 11:18:26 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000001980)=[{{&(0x7f0000000000)={0x2, 0x4e24, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x4008884) dup2(r0, r1) 11:18:26 executing program 4: keyctl$KEYCTL_PKEY_VERIFY(0x18, 0x0, &(0x7f0000000980)={'enc=', 'pkcs1', ' hash=', {'sha3-224-ce\x00'}}, 0x0, 0x0) 11:18:26 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 11:18:26 executing program 6: r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0) 11:18:26 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000001980)=[{{&(0x7f0000000000)={0x2, 0x4e24, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x4008884) dup2(r0, r1) 11:18:26 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'ip6_vti0\x00', &(0x7f0000000380)={'ip6gre0\x00', 0x0, 0x29, 0x4, 0x6, 0x1, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80, 0x20, 0x1000, 0xffffffff}}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000440)={@dev={0xfe, 0x80, '\x00', 0x33}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x10001, 0x5, 0x200, 0x0, 0x9e, 0x1000000, r1}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@remote, @ipv4={'\x00', '\xff\xff', @empty}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x6395, 0x0, 0x0, 0x0, 0x5000004}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x4}}, './file0\x00'}) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={@mcast1, @mcast1, @remote, 0x8, 0x2, 0x400, 0x100, 0x3, 0x100000}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x2100c, 0x0) 11:18:26 executing program 2: r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0) 11:18:26 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'ip6_vti0\x00', &(0x7f0000000380)={'ip6gre0\x00', 0x0, 0x29, 0x4, 0x6, 0x1, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80, 0x20, 0x1000, 0xffffffff}}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000440)={@dev={0xfe, 0x80, '\x00', 0x33}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x10001, 0x5, 0x200, 0x0, 0x9e, 0x1000000, r1}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@remote, @ipv4={'\x00', '\xff\xff', @empty}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x6395, 0x0, 0x0, 0x0, 0x5000004}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x4}}, './file0\x00'}) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={@mcast1, @mcast1, @remote, 0x8, 0x2, 0x400, 0x100, 0x3, 0x100000}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x2100c, 0x0) [ 125.574812] loop1: detected capacity change from 0 to 256 [ 125.577079] loop7: detected capacity change from 0 to 256 11:18:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'ip6_vti0\x00', &(0x7f0000000380)={'ip6gre0\x00', 0x0, 0x29, 0x4, 0x6, 0x1, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80, 0x20, 0x1000, 0xffffffff}}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000440)={@dev={0xfe, 0x80, '\x00', 0x33}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x10001, 0x5, 0x200, 0x0, 0x9e, 0x1000000, r1}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@remote, @ipv4={'\x00', '\xff\xff', @empty}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x6395, 0x0, 0x0, 0x0, 0x5000004}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x4}}, './file0\x00'}) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={@mcast1, @mcast1, @remote, 0x8, 0x2, 0x400, 0x100, 0x3, 0x100000}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x2100c, 0x0) 11:18:26 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 11:18:26 executing program 6: r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0) 11:18:26 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 11:18:26 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000001980)=[{{&(0x7f0000000000)={0x2, 0x4e24, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x4008884) dup2(r0, r1) [ 125.653599] hrtimer: interrupt took 15960 ns 11:18:26 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'ip6_vti0\x00', &(0x7f0000000380)={'ip6gre0\x00', 0x0, 0x29, 0x4, 0x6, 0x1, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80, 0x20, 0x1000, 0xffffffff}}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000440)={@dev={0xfe, 0x80, '\x00', 0x33}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x10001, 0x5, 0x200, 0x0, 0x9e, 0x1000000, r1}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@remote, @ipv4={'\x00', '\xff\xff', @empty}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x6395, 0x0, 0x0, 0x0, 0x5000004}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x4}}, './file0\x00'}) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={@mcast1, @mcast1, @remote, 0x8, 0x2, 0x400, 0x100, 0x3, 0x100000}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x2100c, 0x0) [ 125.694237] loop7: detected capacity change from 0 to 256 [ 125.766493] loop5: detected capacity change from 0 to 256 11:18:27 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'ip6_vti0\x00', &(0x7f0000000380)={'ip6gre0\x00', 0x0, 0x29, 0x4, 0x6, 0x1, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80, 0x20, 0x1000, 0xffffffff}}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000440)={@dev={0xfe, 0x80, '\x00', 0x33}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x10001, 0x5, 0x200, 0x0, 0x9e, 0x1000000, r1}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@remote, @ipv4={'\x00', '\xff\xff', @empty}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x6395, 0x0, 0x0, 0x0, 0x5000004}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x4}}, './file0\x00'}) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={@mcast1, @mcast1, @remote, 0x8, 0x2, 0x400, 0x100, 0x3, 0x100000}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x2100c, 0x0) 11:18:27 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'ip6_vti0\x00', &(0x7f0000000380)={'ip6gre0\x00', 0x0, 0x29, 0x4, 0x6, 0x1, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80, 0x20, 0x1000, 0xffffffff}}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000440)={@dev={0xfe, 0x80, '\x00', 0x33}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x10001, 0x5, 0x200, 0x0, 0x9e, 0x1000000, r1}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@remote, @ipv4={'\x00', '\xff\xff', @empty}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x6395, 0x0, 0x0, 0x0, 0x5000004}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x4}}, './file0\x00'}) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={@mcast1, @mcast1, @remote, 0x8, 0x2, 0x400, 0x100, 0x3, 0x100000}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x2100c, 0x0) 11:18:27 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000001980)=[{{&(0x7f0000000000)={0x2, 0x4e24, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x4008884) dup2(r0, r1) 11:18:27 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 11:18:27 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 11:18:27 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 11:18:27 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 11:18:27 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9ce326fd36d22f886656430c24da160784af9e"}) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) dup2(r1, r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000001a00)) socketpair(0x11, 0xa, 0xfffffffa, &(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup2(r5, r5) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001a00)) recvmmsg$unix(r4, &(0x7f0000000c80)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/65, 0x41}, {&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/84, 0x54}, {&(0x7f00000003c0)=""/106, 0x6a}, {&(0x7f0000000440)=""/217, 0xd9}, {&(0x7f0000000540)=""/101, 0x65}], 0x6}}, {{&(0x7f0000000640), 0x6e, &(0x7f0000000b40)=[{&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/198, 0xc6}, {&(0x7f0000000140)=""/38, 0x26}, {&(0x7f0000000840)=""/54, 0x36}, {&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000000940)=""/247, 0xf7}, {&(0x7f0000000a40)=""/229, 0xe5}], 0x7, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}}], 0x2, 0x2020, &(0x7f0000000d00)={0x77359400}) r7 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x881) write$binfmt_elf32(r7, &(0x7f0000000180)=ANY=[], 0xfffffecb) [ 125.928212] loop7: detected capacity change from 0 to 256 11:18:27 executing program 7: r0 = open$dir(&(0x7f0000000200)='.\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 11:18:27 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9ce326fd36d22f886656430c24da160784af9e"}) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) dup2(r1, r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000001a00)) socketpair(0x11, 0xa, 0xfffffffa, &(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup2(r5, r5) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001a00)) recvmmsg$unix(r4, &(0x7f0000000c80)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/65, 0x41}, {&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/84, 0x54}, {&(0x7f00000003c0)=""/106, 0x6a}, {&(0x7f0000000440)=""/217, 0xd9}, {&(0x7f0000000540)=""/101, 0x65}], 0x6}}, {{&(0x7f0000000640), 0x6e, &(0x7f0000000b40)=[{&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/198, 0xc6}, {&(0x7f0000000140)=""/38, 0x26}, {&(0x7f0000000840)=""/54, 0x36}, {&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000000940)=""/247, 0xf7}, {&(0x7f0000000a40)=""/229, 0xe5}], 0x7, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}}], 0x2, 0x2020, &(0x7f0000000d00)={0x77359400}) r7 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x881) write$binfmt_elf32(r7, &(0x7f0000000180)=ANY=[], 0xfffffecb) 11:18:27 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 11:18:27 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9ce326fd36d22f886656430c24da160784af9e"}) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) dup2(r1, r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000001a00)) socketpair(0x11, 0xa, 0xfffffffa, &(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup2(r5, r5) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001a00)) recvmmsg$unix(r4, &(0x7f0000000c80)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/65, 0x41}, {&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/84, 0x54}, {&(0x7f00000003c0)=""/106, 0x6a}, {&(0x7f0000000440)=""/217, 0xd9}, {&(0x7f0000000540)=""/101, 0x65}], 0x6}}, {{&(0x7f0000000640), 0x6e, &(0x7f0000000b40)=[{&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/198, 0xc6}, {&(0x7f0000000140)=""/38, 0x26}, {&(0x7f0000000840)=""/54, 0x36}, {&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000000940)=""/247, 0xf7}, {&(0x7f0000000a40)=""/229, 0xe5}], 0x7, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}}], 0x2, 0x2020, &(0x7f0000000d00)={0x77359400}) r7 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x881) write$binfmt_elf32(r7, &(0x7f0000000180)=ANY=[], 0xfffffecb) 11:18:27 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 11:18:27 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9ce326fd36d22f886656430c24da160784af9e"}) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) dup2(r1, r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000001a00)) socketpair(0x11, 0xa, 0xfffffffa, &(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup2(r5, r5) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001a00)) recvmmsg$unix(r4, &(0x7f0000000c80)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/65, 0x41}, {&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/84, 0x54}, {&(0x7f00000003c0)=""/106, 0x6a}, {&(0x7f0000000440)=""/217, 0xd9}, {&(0x7f0000000540)=""/101, 0x65}], 0x6}}, {{&(0x7f0000000640), 0x6e, &(0x7f0000000b40)=[{&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/198, 0xc6}, {&(0x7f0000000140)=""/38, 0x26}, {&(0x7f0000000840)=""/54, 0x36}, {&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000000940)=""/247, 0xf7}, {&(0x7f0000000a40)=""/229, 0xe5}], 0x7, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}}], 0x2, 0x2020, &(0x7f0000000d00)={0x77359400}) r7 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x881) write$binfmt_elf32(r7, &(0x7f0000000180)=ANY=[], 0xfffffecb) 11:18:27 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) [ 126.375704] loop5: detected capacity change from 0 to 256 11:18:27 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 11:18:27 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9ce326fd36d22f886656430c24da160784af9e"}) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) dup2(r1, r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000001a00)) socketpair(0x11, 0xa, 0xfffffffa, &(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup2(r5, r5) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001a00)) recvmmsg$unix(r4, &(0x7f0000000c80)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/65, 0x41}, {&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/84, 0x54}, {&(0x7f00000003c0)=""/106, 0x6a}, {&(0x7f0000000440)=""/217, 0xd9}, {&(0x7f0000000540)=""/101, 0x65}], 0x6}}, {{&(0x7f0000000640), 0x6e, &(0x7f0000000b40)=[{&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/198, 0xc6}, {&(0x7f0000000140)=""/38, 0x26}, {&(0x7f0000000840)=""/54, 0x36}, {&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000000940)=""/247, 0xf7}, {&(0x7f0000000a40)=""/229, 0xe5}], 0x7, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}}], 0x2, 0x2020, &(0x7f0000000d00)={0x77359400}) r7 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x881) write$binfmt_elf32(r7, &(0x7f0000000180)=ANY=[], 0xfffffecb) 11:18:27 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 11:18:28 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9ce326fd36d22f886656430c24da160784af9e"}) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) dup2(r1, r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000001a00)) socketpair(0x11, 0xa, 0xfffffffa, &(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup2(r5, r5) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001a00)) recvmmsg$unix(r4, &(0x7f0000000c80)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/65, 0x41}, {&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/84, 0x54}, {&(0x7f00000003c0)=""/106, 0x6a}, {&(0x7f0000000440)=""/217, 0xd9}, {&(0x7f0000000540)=""/101, 0x65}], 0x6}}, {{&(0x7f0000000640), 0x6e, &(0x7f0000000b40)=[{&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/198, 0xc6}, {&(0x7f0000000140)=""/38, 0x26}, {&(0x7f0000000840)=""/54, 0x36}, {&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000000940)=""/247, 0xf7}, {&(0x7f0000000a40)=""/229, 0xe5}], 0x7, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}}], 0x2, 0x2020, &(0x7f0000000d00)={0x77359400}) r7 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x881) write$binfmt_elf32(r7, &(0x7f0000000180)=ANY=[], 0xfffffecb) 11:18:28 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 11:18:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'ip6_vti0\x00', &(0x7f0000000380)={'ip6gre0\x00', 0x0, 0x29, 0x4, 0x6, 0x1, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80, 0x20, 0x1000, 0xffffffff}}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000440)={@dev={0xfe, 0x80, '\x00', 0x33}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x10001, 0x5, 0x200, 0x0, 0x9e, 0x1000000, r1}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@remote, @ipv4={'\x00', '\xff\xff', @empty}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x6395, 0x0, 0x0, 0x0, 0x5000004}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x4}}, './file0\x00'}) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={@mcast1, @mcast1, @remote, 0x8, 0x2, 0x400, 0x100, 0x3, 0x100000}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x2100c, 0x0) [ 126.927857] loop5: detected capacity change from 0 to 256 11:18:28 executing program 7: r0 = open$dir(&(0x7f0000000200)='.\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 11:18:28 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9ce326fd36d22f886656430c24da160784af9e"}) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) dup2(r1, r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000001a00)) socketpair(0x11, 0xa, 0xfffffffa, &(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup2(r5, r5) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001a00)) recvmmsg$unix(r4, &(0x7f0000000c80)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/65, 0x41}, {&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/84, 0x54}, {&(0x7f00000003c0)=""/106, 0x6a}, {&(0x7f0000000440)=""/217, 0xd9}, {&(0x7f0000000540)=""/101, 0x65}], 0x6}}, {{&(0x7f0000000640), 0x6e, &(0x7f0000000b40)=[{&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/198, 0xc6}, {&(0x7f0000000140)=""/38, 0x26}, {&(0x7f0000000840)=""/54, 0x36}, {&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000000940)=""/247, 0xf7}, {&(0x7f0000000a40)=""/229, 0xe5}], 0x7, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}}], 0x2, 0x2020, &(0x7f0000000d00)={0x77359400}) r7 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x881) write$binfmt_elf32(r7, &(0x7f0000000180)=ANY=[], 0xfffffecb) 11:18:28 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9ce326fd36d22f886656430c24da160784af9e"}) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) dup2(r1, r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000001a00)) socketpair(0x11, 0xa, 0xfffffffa, &(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup2(r5, r5) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001a00)) recvmmsg$unix(r4, &(0x7f0000000c80)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/65, 0x41}, {&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/84, 0x54}, {&(0x7f00000003c0)=""/106, 0x6a}, {&(0x7f0000000440)=""/217, 0xd9}, {&(0x7f0000000540)=""/101, 0x65}], 0x6}}, {{&(0x7f0000000640), 0x6e, &(0x7f0000000b40)=[{&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/198, 0xc6}, {&(0x7f0000000140)=""/38, 0x26}, {&(0x7f0000000840)=""/54, 0x36}, {&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000000940)=""/247, 0xf7}, {&(0x7f0000000a40)=""/229, 0xe5}], 0x7, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}}], 0x2, 0x2020, &(0x7f0000000d00)={0x77359400}) r7 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x881) write$binfmt_elf32(r7, &(0x7f0000000180)=ANY=[], 0xfffffecb) 11:18:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9ce326fd36d22f886656430c24da160784af9e"}) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) dup2(r1, r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000001a00)) socketpair(0x11, 0xa, 0xfffffffa, &(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup2(r5, r5) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001a00)) recvmmsg$unix(r4, &(0x7f0000000c80)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/65, 0x41}, {&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/84, 0x54}, {&(0x7f00000003c0)=""/106, 0x6a}, {&(0x7f0000000440)=""/217, 0xd9}, {&(0x7f0000000540)=""/101, 0x65}], 0x6}}, {{&(0x7f0000000640), 0x6e, &(0x7f0000000b40)=[{&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/198, 0xc6}, {&(0x7f0000000140)=""/38, 0x26}, {&(0x7f0000000840)=""/54, 0x36}, {&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000000940)=""/247, 0xf7}, {&(0x7f0000000a40)=""/229, 0xe5}], 0x7, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}}], 0x2, 0x2020, &(0x7f0000000d00)={0x77359400}) r7 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x881) write$binfmt_elf32(r7, &(0x7f0000000180)=ANY=[], 0xfffffecb) 11:18:28 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9ce326fd36d22f886656430c24da160784af9e"}) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) dup2(r1, r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000001a00)) socketpair(0x11, 0xa, 0xfffffffa, &(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup2(r5, r5) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001a00)) recvmmsg$unix(r4, &(0x7f0000000c80)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/65, 0x41}, {&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/84, 0x54}, {&(0x7f00000003c0)=""/106, 0x6a}, {&(0x7f0000000440)=""/217, 0xd9}, {&(0x7f0000000540)=""/101, 0x65}], 0x6}}, {{&(0x7f0000000640), 0x6e, &(0x7f0000000b40)=[{&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/198, 0xc6}, {&(0x7f0000000140)=""/38, 0x26}, {&(0x7f0000000840)=""/54, 0x36}, {&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000000940)=""/247, 0xf7}, {&(0x7f0000000a40)=""/229, 0xe5}], 0x7, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}}], 0x2, 0x2020, &(0x7f0000000d00)={0x77359400}) r7 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x881) write$binfmt_elf32(r7, &(0x7f0000000180)=ANY=[], 0xfffffecb) 11:18:28 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9ce326fd36d22f886656430c24da160784af9e"}) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) dup2(r1, r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000001a00)) socketpair(0x11, 0xa, 0xfffffffa, &(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup2(r5, r5) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001a00)) recvmmsg$unix(r4, &(0x7f0000000c80)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/65, 0x41}, {&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/84, 0x54}, {&(0x7f00000003c0)=""/106, 0x6a}, {&(0x7f0000000440)=""/217, 0xd9}, {&(0x7f0000000540)=""/101, 0x65}], 0x6}}, {{&(0x7f0000000640), 0x6e, &(0x7f0000000b40)=[{&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/198, 0xc6}, {&(0x7f0000000140)=""/38, 0x26}, {&(0x7f0000000840)=""/54, 0x36}, {&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000000940)=""/247, 0xf7}, {&(0x7f0000000a40)=""/229, 0xe5}], 0x7, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}}], 0x2, 0x2020, &(0x7f0000000d00)={0x77359400}) r7 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x881) write$binfmt_elf32(r7, &(0x7f0000000180)=ANY=[], 0xfffffecb) 11:18:28 executing program 4: perf_event_open(&(0x7f0000000c80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x4) 11:18:28 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9ce326fd36d22f886656430c24da160784af9e"}) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) dup2(r1, r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000001a00)) socketpair(0x11, 0xa, 0xfffffffa, &(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup2(r5, r5) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001a00)) recvmmsg$unix(r4, &(0x7f0000000c80)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/65, 0x41}, {&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/84, 0x54}, {&(0x7f00000003c0)=""/106, 0x6a}, {&(0x7f0000000440)=""/217, 0xd9}, {&(0x7f0000000540)=""/101, 0x65}], 0x6}}, {{&(0x7f0000000640), 0x6e, &(0x7f0000000b40)=[{&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/198, 0xc6}, {&(0x7f0000000140)=""/38, 0x26}, {&(0x7f0000000840)=""/54, 0x36}, {&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000000940)=""/247, 0xf7}, {&(0x7f0000000a40)=""/229, 0xe5}], 0x7, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}}], 0x2, 0x2020, &(0x7f0000000d00)={0x77359400}) r7 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x881) write$binfmt_elf32(r7, &(0x7f0000000180)=ANY=[], 0xfffffecb) 11:18:28 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9ce326fd36d22f886656430c24da160784af9e"}) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) dup2(r1, r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000001a00)) socketpair(0x11, 0xa, 0xfffffffa, &(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup2(r5, r5) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001a00)) recvmmsg$unix(r4, &(0x7f0000000c80)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/65, 0x41}, {&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/84, 0x54}, {&(0x7f00000003c0)=""/106, 0x6a}, {&(0x7f0000000440)=""/217, 0xd9}, {&(0x7f0000000540)=""/101, 0x65}], 0x6}}, {{&(0x7f0000000640), 0x6e, &(0x7f0000000b40)=[{&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/198, 0xc6}, {&(0x7f0000000140)=""/38, 0x26}, {&(0x7f0000000840)=""/54, 0x36}, {&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000000940)=""/247, 0xf7}, {&(0x7f0000000a40)=""/229, 0xe5}], 0x7, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}}], 0x2, 0x2020, &(0x7f0000000d00)={0x77359400}) r7 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x881) write$binfmt_elf32(r7, &(0x7f0000000180)=ANY=[], 0xfffffecb) 11:18:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9ce326fd36d22f886656430c24da160784af9e"}) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) dup2(r1, r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000001a00)) socketpair(0x11, 0xa, 0xfffffffa, &(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup2(r5, r5) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001a00)) recvmmsg$unix(r4, &(0x7f0000000c80)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/65, 0x41}, {&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/84, 0x54}, {&(0x7f00000003c0)=""/106, 0x6a}, {&(0x7f0000000440)=""/217, 0xd9}, {&(0x7f0000000540)=""/101, 0x65}], 0x6}}, {{&(0x7f0000000640), 0x6e, &(0x7f0000000b40)=[{&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/198, 0xc6}, {&(0x7f0000000140)=""/38, 0x26}, {&(0x7f0000000840)=""/54, 0x36}, {&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000000940)=""/247, 0xf7}, {&(0x7f0000000a40)=""/229, 0xe5}], 0x7, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}}], 0x2, 0x2020, &(0x7f0000000d00)={0x77359400}) r7 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x881) write$binfmt_elf32(r7, &(0x7f0000000180)=ANY=[], 0xfffffecb) 11:18:28 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, &(0x7f0000000140)={0x0, 0x0, 0x40000}, 0x20) 11:18:28 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9ce326fd36d22f886656430c24da160784af9e"}) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) dup2(r1, r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000001a00)) socketpair(0x11, 0xa, 0xfffffffa, &(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup2(r5, r5) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001a00)) recvmmsg$unix(r4, &(0x7f0000000c80)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/65, 0x41}, {&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/84, 0x54}, {&(0x7f00000003c0)=""/106, 0x6a}, {&(0x7f0000000440)=""/217, 0xd9}, {&(0x7f0000000540)=""/101, 0x65}], 0x6}}, {{&(0x7f0000000640), 0x6e, &(0x7f0000000b40)=[{&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/198, 0xc6}, {&(0x7f0000000140)=""/38, 0x26}, {&(0x7f0000000840)=""/54, 0x36}, {&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000000940)=""/247, 0xf7}, {&(0x7f0000000a40)=""/229, 0xe5}], 0x7, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}}], 0x2, 0x2020, &(0x7f0000000d00)={0x77359400}) r7 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x881) write$binfmt_elf32(r7, &(0x7f0000000180)=ANY=[], 0xfffffecb) 11:18:28 executing program 7: r0 = open$dir(&(0x7f0000000200)='.\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 11:18:28 executing program 4: perf_event_open(&(0x7f0000000c80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x4) 11:18:28 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r0) 11:18:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9ce326fd36d22f886656430c24da160784af9e"}) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) dup2(r1, r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000001a00)) socketpair(0x11, 0xa, 0xfffffffa, &(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup2(r5, r5) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001a00)) recvmmsg$unix(r4, &(0x7f0000000c80)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/65, 0x41}, {&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/84, 0x54}, {&(0x7f00000003c0)=""/106, 0x6a}, {&(0x7f0000000440)=""/217, 0xd9}, {&(0x7f0000000540)=""/101, 0x65}], 0x6}}, {{&(0x7f0000000640), 0x6e, &(0x7f0000000b40)=[{&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/198, 0xc6}, {&(0x7f0000000140)=""/38, 0x26}, {&(0x7f0000000840)=""/54, 0x36}, {&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000000940)=""/247, 0xf7}, {&(0x7f0000000a40)=""/229, 0xe5}], 0x7, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}}], 0x2, 0x2020, &(0x7f0000000d00)={0x77359400}) r7 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x881) write$binfmt_elf32(r7, &(0x7f0000000180)=ANY=[], 0xfffffecb) 11:18:28 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, &(0x7f0000000140)={0x0, 0x0, 0x40000}, 0x20) 11:18:28 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000540)={@multicast, @link_local, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev, @rand_addr, @empty, @local}}}}, 0x0) 11:18:28 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000002d80), 0x0, 0x0) read$snapshot(r0, &(0x7f0000002dc0)=""/74, 0x4a) 11:18:28 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r0) 11:18:28 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, &(0x7f0000000140)={0x0, 0x0, 0x40000}, 0x20) 11:18:28 executing program 4: perf_event_open(&(0x7f0000000c80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x4) 11:18:28 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000540)={@multicast, @link_local, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev, @rand_addr, @empty, @local}}}}, 0x0) 11:18:28 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r0) 11:18:28 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000002d80), 0x0, 0x0) read$snapshot(r0, &(0x7f0000002dc0)=""/74, 0x4a) 11:18:28 executing program 7: r0 = open$dir(&(0x7f0000000200)='.\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 11:18:28 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r0) 11:18:28 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xdc800, 0x19, &(0x7f0000000200)=[{&(0x7f0000010000)="00000000000000000000000000000000000000000000000000000000000000ffffff00ffffff000000000000000000ffffff00ffffff000000000000000000ffffff00ffffff000000000000000000ffffff00ffffff000000000000000055aa", 0x60, 0x1a0}, {&(0x7f0000010100)="4244db8cf0c2db8cf0c2818000060003003501b800000800000020000004000000180000054344524f4d000000000000000000000000000000000000000000000000000000000000006b000060000000c00000010000000700000001000000000000000000000000000000000000000000000000000000000000000000000000000000006000018f000c00000000000000000000c000019b0018000000000000", 0xa0, 0x400}, {&(0x7f0000010200)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x200, 0x600}, {&(0x7f0000010400)="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"/1408, 0x580, 0x8000}, {&(0x7f0000010a00)="ff43443030310100"/32, 0x20, 0x8800}, {&(0x7f0000010b00)="01001700000001000000050018000000010046494c4530000000000000000000", 0x20, 0x9800}, {&(0x7f0000010c00)="01000000001700010000050000000018000146494c4530000000000000000000", 0x20, 0xa800}, {&(0x7f0000010d00)="2200170000000000001700080000000008007809140b2a3a080200000100000101002200170000000000001700080000000008007809140b2a3a080200000100000101012c00190000000000001964000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b31002600180000000000001800080000000008007809140b2a3a08020000010000010546494c45302a001a0000000000001a0a0000000000000a7809140b2a3a08000000010000010846494c45312e3b31002a001b0000000000001b28230000000023287809140b2a3a08000000010000010846494c45322e3b31002a00200000000000002028230000000023287809140b2a3a08000000010000010846494c45332e3b3100"/288, 0x120, 0xb800}, {&(0x7f0000010f00)="2200180000000000001800080000000008007809140b2a3a080200000100000101002200170000000000001700080000000008007809140b2a3a080200000100000101012a0025000000000000251a0400000000041a7809140b2a3a08000000010000010846494c45302e3b3100"/128, 0x80, 0xc000}, {&(0x7f0000011000)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0xc800}, {&(0x7f0000011100)='syzkallers\x00'/32, 0x20, 0xd000}, {&(0x7f0000011200)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x12800}, {&(0x7f0000011700)="000000000000000001000003000000000000000000000000000000000000000002000007000000300000002f00"/64, 0x40, 0xc8000}, {&(0x7f0000011800)="0000000000000000000000000000000000000000000000008000000000000000", 0x20, 0xc80e0}, {&(0x7f0000011900)="00000000000000000000000000000000000000000000000001f800f80078000e", 0x20, 0xc81e0}, {&(0x7f0000011a00)="00000000000000000100000300000002000000030000000b000000010000000402000025000000600000005b00"/64, 0x40, 0xce000}, {&(0x7f0000011b00)="000000000000000000000000000000000000000000000000f800000000000000", 0x20, 0xce0e0}, {&(0x7f0000011c00)="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"/1216, 0x4c0, 0xce1e0}, {&(0x7f0000012100)="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", 0x220, 0xce7e0}, {&(0x7f0000012400)="00000000000000000000000000000000000000000000000041e1000000000000", 0x20, 0xcfbc0}, {&(0x7f0000012500)="000000000000000001000003000000000000000000000000000000000000000002000025000000100000000f00000000200000ff00"/64, 0x40, 0xda000}, {&(0x7f0000012600)="000000000000000000000000000000000000000000000000020a010000000000", 0x20, 0xda060}, {&(0x7f0000012700)="0000000000000000000000000000000000000000000000008000000000000000", 0x20, 0xda0e0}, {&(0x7f0000012800)="00000000000000000000000000000000000000000000000001f800f80078000e", 0x20, 0xda1e0}, {&(0x7f0000012900)="4244db8cf0c2db8cf0c2010000000003002401b800000800000020000004000000100194054344524f4d0000000000000000000000000000000000000000000000000000000000000005000060000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000c00000000000000000000c000000c0018000000000000", 0xa0, 0xdc000}], 0x0, &(0x7f0000012a00)) [ 127.483886] loop6: detected capacity change from 0 to 3520 11:18:28 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r0) 11:18:28 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000002d80), 0x0, 0x0) read$snapshot(r0, &(0x7f0000002dc0)=""/74, 0x4a) 11:18:28 executing program 4: perf_event_open(&(0x7f0000000c80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x4) 11:18:28 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000540)={@multicast, @link_local, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev, @rand_addr, @empty, @local}}}}, 0x0) 11:18:28 executing program 7: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/schedstat\x00', 0x0, 0x0) ftruncate(r0, 0x0) 11:18:28 executing program 6: r0 = socket(0x1, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 11:18:28 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, &(0x7f0000000140)={0x0, 0x0, 0x40000}, 0x20) 11:18:28 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r0) 11:18:28 executing program 7: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/schedstat\x00', 0x0, 0x0) ftruncate(r0, 0x0) 11:18:28 executing program 6: r0 = socket(0x1, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 11:18:28 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r0) 11:18:28 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000002d80), 0x0, 0x0) read$snapshot(r0, &(0x7f0000002dc0)=""/74, 0x4a) 11:18:28 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000540)={@multicast, @link_local, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev, @rand_addr, @empty, @local}}}}, 0x0) 11:18:28 executing program 6: r0 = socket(0x1, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 11:18:28 executing program 0: mkdir(&(0x7f0000003b80)='./file0\x00', 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = syz_io_uring_setup(0xeaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000380)) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x7fffdf003000, 0x0, 0x4002012, r1, 0x10000000) 11:18:28 executing program 7: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/schedstat\x00', 0x0, 0x0) ftruncate(r0, 0x0) 11:18:28 executing program 0: mkdir(&(0x7f0000003b80)='./file0\x00', 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = syz_io_uring_setup(0xeaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000380)) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x7fffdf003000, 0x0, 0x4002012, r1, 0x10000000) 11:18:28 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) 11:18:28 executing program 7: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/schedstat\x00', 0x0, 0x0) ftruncate(r0, 0x0) 11:18:28 executing program 6: r0 = socket(0x1, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 11:18:28 executing program 5: keyctl$KEYCTL_CAPABILITIES(0x8, 0x0, 0xfffffffffffffda5) 11:18:28 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), 0xffffffffffffffff) syz_open_procfs$userns(0x0, &(0x7f0000000780)) 11:18:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r0, 0x0, 0x30, 0x0, &(0x7f00000002c0)) 11:18:28 executing program 1: mkdir(&(0x7f0000003b80)='./file0\x00', 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = syz_io_uring_setup(0xeaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000380)) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x7fffdf003000, 0x0, 0x4002012, r1, 0x10000000) 11:18:28 executing program 5: keyctl$KEYCTL_CAPABILITIES(0x8, 0x0, 0xfffffffffffffda5) 11:18:28 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) 11:18:29 executing program 6: r0 = io_uring_setup(0x73ba, &(0x7f0000000280)) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) 11:18:29 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001b80)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c, 0x0, 0x0, &(0x7f0000001c40)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @multicast2}}}}, @pktinfo={{0x24, 0x29, 0x32, {@empty}}}], 0x50}}], 0x2, 0x0) 11:18:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r0, 0x0, 0x30, 0x0, &(0x7f00000002c0)) 11:18:29 executing program 5: keyctl$KEYCTL_CAPABILITIES(0x8, 0x0, 0xfffffffffffffda5) 11:18:29 executing program 1: mkdir(&(0x7f0000003b80)='./file0\x00', 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = syz_io_uring_setup(0xeaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000380)) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x7fffdf003000, 0x0, 0x4002012, r1, 0x10000000) 11:18:29 executing program 0: mkdir(&(0x7f0000003b80)='./file0\x00', 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = syz_io_uring_setup(0xeaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000380)) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x7fffdf003000, 0x0, 0x4002012, r1, 0x10000000) 11:18:29 executing program 6: r0 = io_uring_setup(0x73ba, &(0x7f0000000280)) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) 11:18:29 executing program 5: keyctl$KEYCTL_CAPABILITIES(0x8, 0x0, 0xfffffffffffffda5) 11:18:29 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) 11:18:29 executing program 1: mkdir(&(0x7f0000003b80)='./file0\x00', 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = syz_io_uring_setup(0xeaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000380)) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x7fffdf003000, 0x0, 0x4002012, r1, 0x10000000) 11:18:29 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001b80)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c, 0x0, 0x0, &(0x7f0000001c40)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @multicast2}}}}, @pktinfo={{0x24, 0x29, 0x32, {@empty}}}], 0x50}}], 0x2, 0x0) 11:18:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r0, 0x0, 0x30, 0x0, &(0x7f00000002c0)) 11:18:29 executing program 6: r0 = io_uring_setup(0x73ba, &(0x7f0000000280)) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) 11:18:29 executing program 5: io_setup(0x1f, &(0x7f00000000c0)=0x0) io_submit(r0, 0x1ffffffffffffd46, &(0x7f00000000c0)) 11:18:29 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) 11:18:29 executing program 3: geteuid() 11:18:29 executing program 0: mkdir(&(0x7f0000003b80)='./file0\x00', 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = syz_io_uring_setup(0xeaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000380)) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x7fffdf003000, 0x0, 0x4002012, r1, 0x10000000) 11:18:29 executing program 3: geteuid() 11:18:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r0, 0x0, 0x30, 0x0, &(0x7f00000002c0)) 11:18:29 executing program 5: io_setup(0x1f, &(0x7f00000000c0)=0x0) io_submit(r0, 0x1ffffffffffffd46, &(0x7f00000000c0)) 11:18:29 executing program 6: r0 = io_uring_setup(0x73ba, &(0x7f0000000280)) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) 11:18:29 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001b80)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c, 0x0, 0x0, &(0x7f0000001c40)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @multicast2}}}}, @pktinfo={{0x24, 0x29, 0x32, {@empty}}}], 0x50}}], 0x2, 0x0) [ 128.378735] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 11:18:29 executing program 3: geteuid() 11:18:29 executing program 5: io_setup(0x1f, &(0x7f00000000c0)=0x0) io_submit(r0, 0x1ffffffffffffd46, &(0x7f00000000c0)) 11:18:29 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001b80)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c, 0x0, 0x0, &(0x7f0000001c40)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @multicast2}}}}, @pktinfo={{0x24, 0x29, 0x32, {@empty}}}], 0x50}}], 0x2, 0x0) 11:18:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000001cc0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 11:18:29 executing program 4: syz_emit_ethernet(0x7e, &(0x7f0000000000)={@local, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @remote}, @source_quench={0xc, 0x5, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, 0x0, @loopback, @broadcast, {[@ssrr={0x89, 0xf, 0x0, [@broadcast, @broadcast, @private]}, @rr={0x7, 0x3}, @lsrr={0x83, 0xb, 0x0, [@multicast1, @rand_addr]}, @lsrr={0x83, 0x7, 0x0, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0xf, 0x0, [@broadcast, @dev, @loopback]}, @timestamp_prespec={0x44, 0xc, 0x0, 0x3, 0x0, [{@private}]}]}}}}}}}, 0x0) 11:18:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000a940)=[{&(0x7f0000003fc0)={0x28, 0x2e, 0x711, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0xffffffff}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@private}, @typed={0x8, 0x0, 0x0, 0x0, @pid}]}, 0x28}], 0x1}, 0x0) 11:18:29 executing program 6: sched_getaffinity(0x0, 0x8, &(0x7f0000000000)) 11:18:29 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') lseek(r1, 0x0, 0x1) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000003c0)="5bf20b22a8e54362d1b4c4dc05ebbc8bb357260beb146bb53358be99f3b5760fcf7a8eb94efe0ef2285ff2c79d5255f4fe75c11f2f410073b56f3dbb4b250dd4f074042c8cca87fc6de323658f4ba389a682e6ef9374c92caca46e16cf47cc0d60ec26abcd21e02bfee98523ef828a7fc9a8ac75d3ba5d04933880d362ab98c02c688c62aa403d6b154a46a1448e6f1af0bc744203f1a594bed0d71b549f69575cefca0084d4621d7b4a7683900998b0456c88c6fb0c92b5029deb125f41ddbbd805dde760603216c0651a6e6003c68fc97dfe526e8460d80b5a13bd51c94791fae56921fe32a8b5ad15ef9df243992d36dfaf241788788433246c55d991ca18") r2 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r2, 0x3a, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000040)={0x6, 0x232, 0x81, 0x20, 0x3, 0xfc00}) ioctl$KDSKBSENT(r0, 0x4b52, 0x0) 11:18:29 executing program 3: geteuid() 11:18:29 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') lseek(r1, 0x0, 0x1) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000003c0)="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") r2 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r2, 0x3a, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000040)={0x6, 0x232, 0x81, 0x20, 0x3, 0xfc00}) ioctl$KDSKBSENT(r0, 0x4b52, 0x0) 11:18:29 executing program 5: io_setup(0x1f, &(0x7f00000000c0)=0x0) io_submit(r0, 0x1ffffffffffffd46, &(0x7f00000000c0)) 11:18:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000a940)=[{&(0x7f0000003fc0)={0x28, 0x2e, 0x711, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0xffffffff}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@private}, @typed={0x8, 0x0, 0x0, 0x0, @pid}]}, 0x28}], 0x1}, 0x0) 11:18:29 executing program 4: syz_emit_ethernet(0x7e, &(0x7f0000000000)={@local, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @remote}, @source_quench={0xc, 0x5, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, 0x0, @loopback, @broadcast, {[@ssrr={0x89, 0xf, 0x0, [@broadcast, @broadcast, @private]}, @rr={0x7, 0x3}, @lsrr={0x83, 0xb, 0x0, [@multicast1, @rand_addr]}, @lsrr={0x83, 0x7, 0x0, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0xf, 0x0, [@broadcast, @dev, @loopback]}, @timestamp_prespec={0x44, 0xc, 0x0, 0x3, 0x0, [{@private}]}]}}}}}}}, 0x0) 11:18:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000001cc0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 11:18:29 executing program 6: sched_getaffinity(0x0, 0x8, &(0x7f0000000000)) 11:18:29 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') lseek(r1, 0x0, 0x1) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000003c0)="5bf20b22a8e54362d1b4c4dc05ebbc8bb357260beb146bb53358be99f3b5760fcf7a8eb94efe0ef2285ff2c79d5255f4fe75c11f2f410073b56f3dbb4b250dd4f074042c8cca87fc6de323658f4ba389a682e6ef9374c92caca46e16cf47cc0d60ec26abcd21e02bfee98523ef828a7fc9a8ac75d3ba5d04933880d362ab98c02c688c62aa403d6b154a46a1448e6f1af0bc744203f1a594bed0d71b549f69575cefca0084d4621d7b4a7683900998b0456c88c6fb0c92b5029deb125f41ddbbd805dde760603216c0651a6e6003c68fc97dfe526e8460d80b5a13bd51c94791fae56921fe32a8b5ad15ef9df243992d36dfaf241788788433246c55d991ca18") r2 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r2, 0x3a, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000040)={0x6, 0x232, 0x81, 0x20, 0x3, 0xfc00}) ioctl$KDSKBSENT(r0, 0x4b52, 0x0) [ 128.525927] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 11:18:29 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') lseek(r1, 0x0, 0x1) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000003c0)="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") r2 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r2, 0x3a, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000040)={0x6, 0x232, 0x81, 0x20, 0x3, 0xfc00}) ioctl$KDSKBSENT(r0, 0x4b52, 0x0) 11:18:29 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') lseek(r1, 0x0, 0x1) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000003c0)="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") r2 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r2, 0x3a, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000040)={0x6, 0x232, 0x81, 0x20, 0x3, 0xfc00}) ioctl$KDSKBSENT(r0, 0x4b52, 0x0) 11:18:29 executing program 6: sched_getaffinity(0x0, 0x8, &(0x7f0000000000)) 11:18:29 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') lseek(r1, 0x0, 0x1) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000003c0)="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") r2 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r2, 0x3a, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000040)={0x6, 0x232, 0x81, 0x20, 0x3, 0xfc00}) ioctl$KDSKBSENT(r0, 0x4b52, 0x0) 11:18:29 executing program 4: syz_emit_ethernet(0x7e, &(0x7f0000000000)={@local, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @remote}, @source_quench={0xc, 0x5, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, 0x0, @loopback, @broadcast, {[@ssrr={0x89, 0xf, 0x0, [@broadcast, @broadcast, @private]}, @rr={0x7, 0x3}, @lsrr={0x83, 0xb, 0x0, [@multicast1, @rand_addr]}, @lsrr={0x83, 0x7, 0x0, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0xf, 0x0, [@broadcast, @dev, @loopback]}, @timestamp_prespec={0x44, 0xc, 0x0, 0x3, 0x0, [{@private}]}]}}}}}}}, 0x0) 11:18:29 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') lseek(r1, 0x0, 0x1) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000003c0)="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") r2 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r2, 0x3a, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000040)={0x6, 0x232, 0x81, 0x20, 0x3, 0xfc00}) ioctl$KDSKBSENT(r0, 0x4b52, 0x0) 11:18:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000a940)=[{&(0x7f0000003fc0)={0x28, 0x2e, 0x711, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0xffffff VM DIAGNOSIS: 11:18:26 Registers: info registers vcpu 0 RAX=0000000000000039 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff823c0801 RDI=ffffffff8765c9e0 RBP=ffffffff8765c9a0 RSP=ffff88803de9f3c0 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000039 R11=0000000000000001 R12=0000000000000039 R13=ffffffff8765c9a0 R14=0000000000000010 R15=ffffffff823c07f0 RIP=ffffffff823c0859 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f33ffda0700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2db21000 CR3=000000003c188000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000080000002 RBX=8000000039a9e007 RCX=ffffffff816a4298 RDX=ffff88800faa0000 RSI=0000000000000000 RDI=0000000000000007 RBP=ffff88803b038550 RSP=ffff888015e97738 R8 =0000000000000007 R9 =0000000000000000 R10=8000000039a9e007 R11=0000000000000001 R12=0000000000000010 R13=dffffc0000000000 R14=8000000039a9e007 R15=0000000000000000 RIP=ffffffff81461cf7 RFL=00000282 [--S----] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555556419400 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2e028000 CR3=000000000f3c6000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000