Warning: Permanently added '[localhost]:22019' (ECDSA) to the list of known hosts. 2022/09/14 12:30:45 fuzzer started 2022/09/14 12:30:45 dialing manager at localhost:33849 syzkaller login: [ 44.000198] cgroup: Unknown subsys name 'net' [ 44.099090] cgroup: Unknown subsys name 'rlimit' 2022/09/14 12:30:59 syscalls: 2215 2022/09/14 12:30:59 code coverage: enabled 2022/09/14 12:30:59 comparison tracing: enabled 2022/09/14 12:30:59 extra coverage: enabled 2022/09/14 12:30:59 setuid sandbox: enabled 2022/09/14 12:30:59 namespace sandbox: enabled 2022/09/14 12:30:59 Android sandbox: enabled 2022/09/14 12:30:59 fault injection: enabled 2022/09/14 12:30:59 leak checking: enabled 2022/09/14 12:30:59 net packet injection: enabled 2022/09/14 12:30:59 net device setup: enabled 2022/09/14 12:30:59 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/14 12:30:59 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/14 12:30:59 USB emulation: enabled 2022/09/14 12:30:59 hci packet injection: enabled 2022/09/14 12:30:59 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220914) 2022/09/14 12:30:59 802.15.4 emulation: enabled 2022/09/14 12:30:59 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/14 12:31:00 fetching corpus: 50, signal 32579/36029 (executing program) 2022/09/14 12:31:00 fetching corpus: 100, signal 45324/50122 (executing program) 2022/09/14 12:31:00 fetching corpus: 150, signal 59321/65162 (executing program) 2022/09/14 12:31:00 fetching corpus: 200, signal 67190/74119 (executing program) 2022/09/14 12:31:00 fetching corpus: 250, signal 76016/83823 (executing program) 2022/09/14 12:31:01 fetching corpus: 300, signal 82522/91224 (executing program) 2022/09/14 12:31:01 fetching corpus: 350, signal 86212/95837 (executing program) 2022/09/14 12:31:01 fetching corpus: 400, signal 89700/100182 (executing program) 2022/09/14 12:31:01 fetching corpus: 450, signal 93756/105015 (executing program) 2022/09/14 12:31:01 fetching corpus: 500, signal 96535/108572 (executing program) 2022/09/14 12:31:01 fetching corpus: 550, signal 99499/112287 (executing program) 2022/09/14 12:31:01 fetching corpus: 600, signal 103747/117128 (executing program) 2022/09/14 12:31:02 fetching corpus: 650, signal 106930/120857 (executing program) 2022/09/14 12:31:02 fetching corpus: 700, signal 109905/124399 (executing program) 2022/09/14 12:31:02 fetching corpus: 750, signal 112030/127199 (executing program) 2022/09/14 12:31:02 fetching corpus: 800, signal 115170/130810 (executing program) 2022/09/14 12:31:02 fetching corpus: 850, signal 117210/133435 (executing program) 2022/09/14 12:31:02 fetching corpus: 900, signal 119030/135832 (executing program) 2022/09/14 12:31:02 fetching corpus: 950, signal 121303/138541 (executing program) 2022/09/14 12:31:02 fetching corpus: 1000, signal 123345/141074 (executing program) 2022/09/14 12:31:02 fetching corpus: 1050, signal 125170/143307 (executing program) 2022/09/14 12:31:03 fetching corpus: 1100, signal 127075/145599 (executing program) 2022/09/14 12:31:03 fetching corpus: 1150, signal 128754/147653 (executing program) 2022/09/14 12:31:03 fetching corpus: 1200, signal 130109/149476 (executing program) 2022/09/14 12:31:03 fetching corpus: 1250, signal 131845/151545 (executing program) 2022/09/14 12:31:03 fetching corpus: 1300, signal 133575/153636 (executing program) 2022/09/14 12:31:03 fetching corpus: 1350, signal 135893/156059 (executing program) 2022/09/14 12:31:03 fetching corpus: 1400, signal 138753/158792 (executing program) 2022/09/14 12:31:04 fetching corpus: 1450, signal 139774/160166 (executing program) 2022/09/14 12:31:04 fetching corpus: 1500, signal 142180/162459 (executing program) 2022/09/14 12:31:04 fetching corpus: 1550, signal 144313/164658 (executing program) 2022/09/14 12:31:04 fetching corpus: 1600, signal 146666/166901 (executing program) 2022/09/14 12:31:04 fetching corpus: 1650, signal 148003/168384 (executing program) 2022/09/14 12:31:04 fetching corpus: 1700, signal 149326/169879 (executing program) 2022/09/14 12:31:04 fetching corpus: 1750, signal 151074/171682 (executing program) 2022/09/14 12:31:05 fetching corpus: 1800, signal 153235/173650 (executing program) 2022/09/14 12:31:05 fetching corpus: 1850, signal 154904/175250 (executing program) 2022/09/14 12:31:05 fetching corpus: 1900, signal 156249/176717 (executing program) 2022/09/14 12:31:05 fetching corpus: 1950, signal 157660/178128 (executing program) 2022/09/14 12:31:05 fetching corpus: 2000, signal 158928/179505 (executing program) 2022/09/14 12:31:05 fetching corpus: 2050, signal 159956/180625 (executing program) 2022/09/14 12:31:05 fetching corpus: 2100, signal 161729/182194 (executing program) 2022/09/14 12:31:06 fetching corpus: 2150, signal 162762/183273 (executing program) 2022/09/14 12:31:06 fetching corpus: 2200, signal 163878/184344 (executing program) 2022/09/14 12:31:06 fetching corpus: 2250, signal 164971/185455 (executing program) 2022/09/14 12:31:06 fetching corpus: 2300, signal 165600/186241 (executing program) 2022/09/14 12:31:06 fetching corpus: 2350, signal 166724/187345 (executing program) 2022/09/14 12:31:06 fetching corpus: 2400, signal 167759/188286 (executing program) 2022/09/14 12:31:06 fetching corpus: 2450, signal 169239/189422 (executing program) 2022/09/14 12:31:07 fetching corpus: 2500, signal 170558/190515 (executing program) 2022/09/14 12:31:07 fetching corpus: 2550, signal 172435/191818 (executing program) 2022/09/14 12:31:07 fetching corpus: 2600, signal 174536/193169 (executing program) 2022/09/14 12:31:07 fetching corpus: 2650, signal 175395/193932 (executing program) 2022/09/14 12:31:07 fetching corpus: 2700, signal 176324/194693 (executing program) 2022/09/14 12:31:07 fetching corpus: 2750, signal 177357/195475 (executing program) 2022/09/14 12:31:07 fetching corpus: 2800, signal 179168/196598 (executing program) 2022/09/14 12:31:08 fetching corpus: 2850, signal 181350/197842 (executing program) 2022/09/14 12:31:08 fetching corpus: 2900, signal 182157/198507 (executing program) 2022/09/14 12:31:08 fetching corpus: 2950, signal 183167/199186 (executing program) 2022/09/14 12:31:08 fetching corpus: 3000, signal 183936/199782 (executing program) 2022/09/14 12:31:08 fetching corpus: 3050, signal 185979/200833 (executing program) 2022/09/14 12:31:08 fetching corpus: 3100, signal 187013/201472 (executing program) 2022/09/14 12:31:09 fetching corpus: 3150, signal 187974/202091 (executing program) 2022/09/14 12:31:09 fetching corpus: 3200, signal 188637/202536 (executing program) 2022/09/14 12:31:09 fetching corpus: 3250, signal 189742/203185 (executing program) 2022/09/14 12:31:09 fetching corpus: 3300, signal 190580/203712 (executing program) 2022/09/14 12:31:09 fetching corpus: 3350, signal 191308/204160 (executing program) 2022/09/14 12:31:09 fetching corpus: 3400, signal 192546/204899 (executing program) 2022/09/14 12:31:09 fetching corpus: 3450, signal 193187/205298 (executing program) 2022/09/14 12:31:10 fetching corpus: 3500, signal 193774/205608 (executing program) 2022/09/14 12:31:10 fetching corpus: 3550, signal 194860/206151 (executing program) 2022/09/14 12:31:10 fetching corpus: 3600, signal 196263/206687 (executing program) 2022/09/14 12:31:10 fetching corpus: 3650, signal 197367/207074 (executing program) 2022/09/14 12:31:10 fetching corpus: 3700, signal 197863/207333 (executing program) 2022/09/14 12:31:10 fetching corpus: 3750, signal 198269/207574 (executing program) 2022/09/14 12:31:10 fetching corpus: 3800, signal 199074/207861 (executing program) 2022/09/14 12:31:11 fetching corpus: 3850, signal 199677/208111 (executing program) 2022/09/14 12:31:11 fetching corpus: 3900, signal 200484/208496 (executing program) 2022/09/14 12:31:11 fetching corpus: 3950, signal 201172/208748 (executing program) 2022/09/14 12:31:11 fetching corpus: 4000, signal 201905/208976 (executing program) 2022/09/14 12:31:11 fetching corpus: 4050, signal 202484/209181 (executing program) 2022/09/14 12:31:11 fetching corpus: 4100, signal 203111/209350 (executing program) 2022/09/14 12:31:11 fetching corpus: 4150, signal 203818/209531 (executing program) 2022/09/14 12:31:11 fetching corpus: 4151, signal 203822/209589 (executing program) 2022/09/14 12:31:11 fetching corpus: 4151, signal 203822/209656 (executing program) 2022/09/14 12:31:11 fetching corpus: 4151, signal 203822/209724 (executing program) 2022/09/14 12:31:11 fetching corpus: 4151, signal 203822/209782 (executing program) 2022/09/14 12:31:11 fetching corpus: 4151, signal 203822/209854 (executing program) 2022/09/14 12:31:11 fetching corpus: 4151, signal 203822/209916 (executing program) 2022/09/14 12:31:11 fetching corpus: 4151, signal 203822/209981 (executing program) 2022/09/14 12:31:11 fetching corpus: 4151, signal 203822/210036 (executing program) 2022/09/14 12:31:11 fetching corpus: 4151, signal 203822/210122 (executing program) 2022/09/14 12:31:11 fetching corpus: 4151, signal 203822/210207 (executing program) 2022/09/14 12:31:11 fetching corpus: 4151, signal 203822/210269 (executing program) 2022/09/14 12:31:11 fetching corpus: 4151, signal 203822/210342 (executing program) 2022/09/14 12:31:12 fetching corpus: 4151, signal 203822/210377 (executing program) 2022/09/14 12:31:12 fetching corpus: 4151, signal 203822/210377 (executing program) 2022/09/14 12:31:13 starting 8 fuzzer processes 12:31:13 executing program 0: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x1d, r0) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, r0) 12:31:13 executing program 1: r0 = syz_io_uring_setup(0x30b3, &(0x7f0000000000), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000200), 0x0) 12:31:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r0, 0x560d) 12:31:14 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0) chdir(0x0) mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c61756469742c6d61736b3d5e5be1ea336e491c524d652bec0a3bf017f0597ee593d6f9f83d519609312daaf06e280ff293c15770bbe997047461f07485829824346bf13ce96305b1a992a25e319da471b47e6f2090256c1595177a901781175eb4941f1d299255353ecce1c76d3e1cb134c11f60a8d4b95120616164d501b1bde9aeb858a692fe0b464c40f77e7f6d9e7e13124d7951377daebf6987d7dd0c6e813b57849e8f841e04cfef8596029a2ff8bbd36ebc98b5551df8333b1060c69a9062f2b98fad226f4491f5b0a1327f528959738d5ab816c7ddd58ce811370ec98335f007d3963957e653139ff97f586a08b73b"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='pagemap\x00') pread64(r0, &(0x7f0000000180)=""/16, 0x10, 0x8) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1) openat(r0, &(0x7f0000000180)='./file1\x00', 0x101080, 0x100) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f, r0}, 0x68) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @broadcast}}}], 0x20}, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) 12:31:14 executing program 4: perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x210c1, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f00000004c0)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) openat(0xffffffffffffff9c, 0x0, 0x80000, 0x102) r0 = syz_open_procfs(0x0, &(0x7f0000003380)='clear_refs\x00') write$sndseq(r0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 12:31:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00') fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) [ 72.414985] audit: type=1400 audit(1663158674.042:6): avc: denied { execmem } for pid=285 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 12:31:14 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x2040805) 12:31:14 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f00000014c0)='./file0\x00', 0x26e1, 0x62) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) readv(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/75, 0x4b}], 0x1) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file1\x00'}) syncfs(r1) [ 73.690055] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 73.693932] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 73.695429] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 73.698987] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 73.701050] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 73.702493] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 73.709741] Bluetooth: hci0: HCI_REQ-0x0c1a [ 73.751954] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 73.756567] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 73.759280] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 73.762077] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 73.763527] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 73.764854] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 73.769343] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 73.770491] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 73.773248] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 73.774487] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 73.776831] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 73.778102] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 73.779217] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 73.781084] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 73.782856] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 73.785815] Bluetooth: hci5: HCI_REQ-0x0c1a [ 73.787546] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 73.792870] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 73.794143] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 73.795596] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 73.797009] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 73.798244] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 73.798264] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 73.806873] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 73.807981] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 73.808976] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 73.810217] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 73.810461] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 73.819883] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 73.821204] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 73.826317] Bluetooth: hci4: HCI_REQ-0x0c1a [ 73.830898] Bluetooth: hci6: HCI_REQ-0x0c1a [ 73.842482] Bluetooth: hci2: HCI_REQ-0x0c1a [ 73.850936] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 73.851043] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 73.854383] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 73.854505] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 73.856629] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 73.866894] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 73.868026] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 73.870852] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 73.871875] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 73.872748] Bluetooth: hci7: HCI_REQ-0x0c1a [ 73.888949] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 73.895078] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 73.897229] Bluetooth: hci1: HCI_REQ-0x0c1a [ 73.929276] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 73.930544] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 73.939520] Bluetooth: hci3: HCI_REQ-0x0c1a [ 75.765056] Bluetooth: hci0: command 0x0409 tx timeout [ 75.828706] Bluetooth: hci5: command 0x0409 tx timeout [ 75.828725] Bluetooth: hci4: command 0x0409 tx timeout [ 75.892690] Bluetooth: hci7: command 0x0409 tx timeout [ 75.892720] Bluetooth: hci6: command 0x0409 tx timeout [ 75.893243] Bluetooth: hci2: command 0x0409 tx timeout [ 75.956736] Bluetooth: hci3: command 0x0409 tx timeout [ 75.956772] Bluetooth: hci1: command 0x0409 tx timeout [ 77.812690] Bluetooth: hci0: command 0x041b tx timeout [ 77.876698] Bluetooth: hci4: command 0x041b tx timeout [ 77.878430] Bluetooth: hci5: command 0x041b tx timeout [ 77.940757] Bluetooth: hci6: command 0x041b tx timeout [ 77.941047] Bluetooth: hci2: command 0x041b tx timeout [ 77.941284] Bluetooth: hci7: command 0x041b tx timeout [ 78.004716] Bluetooth: hci1: command 0x041b tx timeout [ 78.004727] Bluetooth: hci3: command 0x041b tx timeout [ 79.860696] Bluetooth: hci0: command 0x040f tx timeout [ 79.924679] Bluetooth: hci5: command 0x040f tx timeout [ 79.925132] Bluetooth: hci4: command 0x040f tx timeout [ 79.988698] Bluetooth: hci2: command 0x040f tx timeout [ 79.988717] Bluetooth: hci7: command 0x040f tx timeout [ 79.989142] Bluetooth: hci6: command 0x040f tx timeout [ 80.052723] Bluetooth: hci3: command 0x040f tx timeout [ 80.052946] Bluetooth: hci1: command 0x040f tx timeout [ 81.908697] Bluetooth: hci0: command 0x0419 tx timeout [ 81.972766] Bluetooth: hci4: command 0x0419 tx timeout [ 81.973218] Bluetooth: hci5: command 0x0419 tx timeout [ 82.036686] Bluetooth: hci7: command 0x0419 tx timeout [ 82.036705] Bluetooth: hci6: command 0x0419 tx timeout [ 82.037109] Bluetooth: hci2: command 0x0419 tx timeout [ 82.100725] Bluetooth: hci1: command 0x0419 tx timeout [ 82.100724] Bluetooth: hci3: command 0x0419 tx timeout [ 125.227517] loop3: detected capacity change from 0 to 40 [ 125.248501] audit: type=1400 audit(1663158726.875:7): avc: denied { open } for pid=3791 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 125.250278] audit: type=1400 audit(1663158726.875:8): avc: denied { kernel } for pid=3791 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 125.265188] ------------[ cut here ]------------ [ 125.265207] [ 125.265210] ====================================================== [ 125.265213] WARNING: possible circular locking dependency detected [ 125.265217] 6.0.0-rc5-next-20220914 #1 Not tainted [ 125.265224] ------------------------------------------------------ [ 125.265227] syz-executor.3/3792 is trying to acquire lock: [ 125.265234] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 125.265272] [ 125.265272] but task is already holding lock: [ 125.265275] ffff88800ecccc20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 125.265303] [ 125.265303] which lock already depends on the new lock. [ 125.265303] [ 125.265306] [ 125.265306] the existing dependency chain (in reverse order) is: [ 125.265310] [ 125.265310] -> #3 (&ctx->lock){....}-{2:2}: [ 125.265323] _raw_spin_lock+0x2a/0x40 [ 125.265342] __perf_event_task_sched_out+0x53b/0x18d0 [ 125.265354] __schedule+0xedd/0x2470 [ 125.265365] schedule+0xda/0x1b0 [ 125.265375] exit_to_user_mode_prepare+0x114/0x1a0 [ 125.265396] syscall_exit_to_user_mode+0x19/0x40 [ 125.265414] do_syscall_64+0x48/0x90 [ 125.265428] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 125.265446] [ 125.265446] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 125.265460] _raw_spin_lock_nested+0x30/0x40 [ 125.265475] raw_spin_rq_lock_nested+0x1e/0x30 [ 125.265489] task_fork_fair+0x63/0x4d0 [ 125.265506] sched_cgroup_fork+0x3d0/0x540 [ 125.265520] copy_process+0x4183/0x6e20 [ 125.265531] kernel_clone+0xe7/0x890 [ 125.265540] user_mode_thread+0xad/0xf0 [ 125.265551] rest_init+0x24/0x250 [ 125.265567] arch_call_rest_init+0xf/0x14 [ 125.265580] start_kernel+0x4c1/0x4e6 [ 125.265590] secondary_startup_64_no_verify+0xe0/0xeb [ 125.265604] [ 125.265604] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 125.265617] _raw_spin_lock_irqsave+0x39/0x60 [ 125.265636] try_to_wake_up+0xab/0x1920 [ 125.265649] up+0x75/0xb0 [ 125.265660] __up_console_sem+0x6e/0x80 [ 125.265677] console_unlock+0x46a/0x590 [ 125.265693] do_con_write+0xc05/0x1d50 [ 125.265705] con_write+0x21/0x40 [ 125.265714] n_tty_write+0x4d4/0xfe0 [ 125.265727] file_tty_write.constprop.0+0x49c/0x8f0 [ 125.265739] vfs_write+0x9c3/0xd90 [ 125.265758] ksys_write+0x127/0x250 [ 125.265775] do_syscall_64+0x3b/0x90 [ 125.265788] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 125.265805] [ 125.265805] -> #0 ((console_sem).lock){....}-{2:2}: [ 125.265819] __lock_acquire+0x2a02/0x5e70 [ 125.265836] lock_acquire+0x1a2/0x530 [ 125.265852] _raw_spin_lock_irqsave+0x39/0x60 [ 125.265867] down_trylock+0xe/0x70 [ 125.265880] __down_trylock_console_sem+0x3b/0xd0 [ 125.265896] vprintk_emit+0x16b/0x560 [ 125.265913] vprintk+0x84/0xa0 [ 125.265930] _printk+0xba/0xf1 [ 125.265948] report_bug.cold+0x72/0xab [ 125.265961] handle_bug+0x3c/0x70 [ 125.265974] exc_invalid_op+0x14/0x50 [ 125.265987] asm_exc_invalid_op+0x16/0x20 [ 125.266004] group_sched_out.part.0+0x2c7/0x460 [ 125.266014] ctx_sched_out+0x8f1/0xc10 [ 125.266024] __perf_event_task_sched_out+0x6d0/0x18d0 [ 125.266036] __schedule+0xedd/0x2470 [ 125.266046] schedule+0xda/0x1b0 [ 125.266055] exit_to_user_mode_prepare+0x114/0x1a0 [ 125.266075] syscall_exit_to_user_mode+0x19/0x40 [ 125.266092] do_syscall_64+0x48/0x90 [ 125.266105] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 125.266122] [ 125.266122] other info that might help us debug this: [ 125.266122] [ 125.266125] Chain exists of: [ 125.266125] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 125.266125] [ 125.266140] Possible unsafe locking scenario: [ 125.266140] [ 125.266143] CPU0 CPU1 [ 125.266145] ---- ---- [ 125.266147] lock(&ctx->lock); [ 125.266153] lock(&rq->__lock); [ 125.266160] lock(&ctx->lock); [ 125.266166] lock((console_sem).lock); [ 125.266171] [ 125.266171] *** DEADLOCK *** [ 125.266171] [ 125.266173] 2 locks held by syz-executor.3/3792: [ 125.266180] #0: ffff88806cf37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 125.266206] #1: ffff88800ecccc20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 125.266234] [ 125.266234] stack backtrace: [ 125.266236] CPU: 1 PID: 3792 Comm: syz-executor.3 Not tainted 6.0.0-rc5-next-20220914 #1 [ 125.266249] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 125.266258] Call Trace: [ 125.266261] [ 125.266265] dump_stack_lvl+0x8b/0xb3 [ 125.266280] check_noncircular+0x263/0x2e0 [ 125.266297] ? format_decode+0x26c/0xb50 [ 125.266312] ? print_circular_bug+0x450/0x450 [ 125.266330] ? enable_ptr_key_workfn+0x20/0x20 [ 125.266345] ? format_decode+0x26c/0xb50 [ 125.266360] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 125.266378] __lock_acquire+0x2a02/0x5e70 [ 125.266400] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 125.266423] lock_acquire+0x1a2/0x530 [ 125.266440] ? down_trylock+0xe/0x70 [ 125.266455] ? rcu_read_unlock+0x40/0x40 [ 125.266476] ? vprintk+0x84/0xa0 [ 125.266494] _raw_spin_lock_irqsave+0x39/0x60 [ 125.266510] ? down_trylock+0xe/0x70 [ 125.266524] down_trylock+0xe/0x70 [ 125.266537] ? vprintk+0x84/0xa0 [ 125.266554] __down_trylock_console_sem+0x3b/0xd0 [ 125.266572] vprintk_emit+0x16b/0x560 [ 125.266591] vprintk+0x84/0xa0 [ 125.266609] _printk+0xba/0xf1 [ 125.266627] ? record_print_text.cold+0x16/0x16 [ 125.266650] ? report_bug.cold+0x66/0xab [ 125.266664] ? group_sched_out.part.0+0x2c7/0x460 [ 125.266675] report_bug.cold+0x72/0xab [ 125.266691] handle_bug+0x3c/0x70 [ 125.266704] exc_invalid_op+0x14/0x50 [ 125.266719] asm_exc_invalid_op+0x16/0x20 [ 125.266737] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 125.266750] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 125.266762] RSP: 0018:ffff88803d59fc48 EFLAGS: 00010006 [ 125.266771] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 125.266779] RDX: ffff888017799ac0 RSI: ffffffff81566027 RDI: 0000000000000005 [ 125.266787] RBP: ffff8880304a0000 R08: 0000000000000005 R09: 0000000000000001 [ 125.266794] R10: 0000000000000000 R11: ffffffff865ac05b R12: ffff88800ecccc00 [ 125.266802] R13: ffff88806cf3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 125.266813] ? group_sched_out.part.0+0x2c7/0x460 [ 125.266826] ? group_sched_out.part.0+0x2c7/0x460 [ 125.266839] ctx_sched_out+0x8f1/0xc10 [ 125.266851] __perf_event_task_sched_out+0x6d0/0x18d0 [ 125.266866] ? lock_is_held_type+0xd7/0x130 [ 125.266885] ? __perf_cgroup_move+0x160/0x160 [ 125.266897] ? set_next_entity+0x304/0x550 [ 125.266915] ? update_curr+0x267/0x740 [ 125.266934] ? lock_is_held_type+0xd7/0x130 [ 125.266953] __schedule+0xedd/0x2470 [ 125.266966] ? io_schedule_timeout+0x150/0x150 [ 125.266979] ? rcu_read_lock_sched_held+0x3e/0x80 [ 125.267000] schedule+0xda/0x1b0 [ 125.267011] exit_to_user_mode_prepare+0x114/0x1a0 [ 125.267032] syscall_exit_to_user_mode+0x19/0x40 [ 125.267050] do_syscall_64+0x48/0x90 [ 125.267065] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 125.267083] RIP: 0033:0x7f2dd9857b19 [ 125.267092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 125.267102] RSP: 002b:00007f2dd6dcd218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 125.267113] RAX: 0000000000000001 RBX: 00007f2dd996af68 RCX: 00007f2dd9857b19 [ 125.267121] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f2dd996af6c [ 125.267128] RBP: 00007f2dd996af60 R08: 000000000000000e R09: 0000000000000000 [ 125.267135] R10: 0000000000000005 R11: 0000000000000246 R12: 00007f2dd996af6c [ 125.267142] R13: 00007ffcc27f10df R14: 00007f2dd6dcd300 R15: 0000000000022000 [ 125.267155] [ 125.323950] WARNING: CPU: 1 PID: 3792 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 125.324596] Modules linked in: [ 125.324830] CPU: 1 PID: 3792 Comm: syz-executor.3 Not tainted 6.0.0-rc5-next-20220914 #1 [ 125.325395] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 125.326193] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 125.326584] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 125.327860] RSP: 0018:ffff88803d59fc48 EFLAGS: 00010006 [ 125.328235] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 125.328737] RDX: ffff888017799ac0 RSI: ffffffff81566027 RDI: 0000000000000005 [ 125.329237] RBP: ffff8880304a0000 R08: 0000000000000005 R09: 0000000000000001 [ 125.329743] R10: 0000000000000000 R11: ffffffff865ac05b R12: ffff88800ecccc00 [ 125.330245] R13: ffff88806cf3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 125.330746] FS: 00007f2dd6dcd700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 125.331314] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 125.331735] CR2: 00007fb841cb1028 CR3: 000000001f1ae000 CR4: 0000000000350ee0 [ 125.332240] Call Trace: [ 125.332428] [ 125.332594] ctx_sched_out+0x8f1/0xc10 [ 125.332883] __perf_event_task_sched_out+0x6d0/0x18d0 [ 125.333253] ? lock_is_held_type+0xd7/0x130 [ 125.333570] ? __perf_cgroup_move+0x160/0x160 [ 125.333896] ? set_next_entity+0x304/0x550 [ 125.334208] ? update_curr+0x267/0x740 [ 125.334496] ? lock_is_held_type+0xd7/0x130 [ 125.334812] __schedule+0xedd/0x2470 [ 125.335089] ? io_schedule_timeout+0x150/0x150 [ 125.335421] ? rcu_read_lock_sched_held+0x3e/0x80 [ 125.335784] schedule+0xda/0x1b0 [ 125.336029] exit_to_user_mode_prepare+0x114/0x1a0 [ 125.336390] syscall_exit_to_user_mode+0x19/0x40 [ 125.336737] do_syscall_64+0x48/0x90 [ 125.337012] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 125.337385] RIP: 0033:0x7f2dd9857b19 [ 125.337651] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 125.338918] RSP: 002b:00007f2dd6dcd218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 125.339451] RAX: 0000000000000001 RBX: 00007f2dd996af68 RCX: 00007f2dd9857b19 [ 125.339968] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f2dd996af6c [ 125.340466] RBP: 00007f2dd996af60 R08: 000000000000000e R09: 0000000000000000 [ 125.340964] R10: 0000000000000005 R11: 0000000000000246 R12: 00007f2dd996af6c [ 125.341470] R13: 00007ffcc27f10df R14: 00007f2dd6dcd300 R15: 0000000000022000 [ 125.341978] [ 125.342148] irq event stamp: 3652 [ 125.342393] hardirqs last enabled at (3651): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 125.343062] hardirqs last disabled at (3652): [] __schedule+0x1225/0x2470 [ 125.343652] softirqs last enabled at (2930): [] fpu__clear_user_states+0xdb/0x1e0 [ 125.344286] softirqs last disabled at (2928): [] fpu__clear_user_states+0x24/0x1e0 [ 125.344930] ---[ end trace 0000000000000000 ]--- [ 125.663525] loop3: detected capacity change from 0 to 40 12:32:07 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0) chdir(0x0) mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c61756469742c6d61736b3d5e5be1ea336e491c524d652bec0a3bf017f0597ee593d6f9f83d519609312daaf06e280ff293c15770bbe997047461f07485829824346bf13ce96305b1a992a25e319da471b47e6f2090256c1595177a901781175eb4941f1d299255353ecce1c76d3e1cb134c11f60a8d4b95120616164d501b1bde9aeb858a692fe0b464c40f77e7f6d9e7e13124d7951377daebf6987d7dd0c6e813b57849e8f841e04cfef8596029a2ff8bbd36ebc98b5551df8333b1060c69a9062f2b98fad226f4491f5b0a1327f528959738d5ab816c7ddd58ce811370ec98335f007d3963957e653139ff97f586a08b73b"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='pagemap\x00') pread64(r0, &(0x7f0000000180)=""/16, 0x10, 0x8) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1) openat(r0, &(0x7f0000000180)='./file1\x00', 0x101080, 0x100) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f, r0}, 0x68) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @broadcast}}}], 0x20}, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) [ 125.772267] loop3: detected capacity change from 0 to 40 12:32:07 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0) chdir(0x0) mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c61756469742c6d61736b3d5e5be1ea336e491c524d652bec0a3bf017f0597ee593d6f9f83d519609312daaf06e280ff293c15770bbe997047461f07485829824346bf13ce96305b1a992a25e319da471b47e6f2090256c1595177a901781175eb4941f1d299255353ecce1c76d3e1cb134c11f60a8d4b95120616164d501b1bde9aeb858a692fe0b464c40f77e7f6d9e7e13124d7951377daebf6987d7dd0c6e813b57849e8f841e04cfef8596029a2ff8bbd36ebc98b5551df8333b1060c69a9062f2b98fad226f4491f5b0a1327f528959738d5ab816c7ddd58ce811370ec98335f007d3963957e653139ff97f586a08b73b"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='pagemap\x00') pread64(r0, &(0x7f0000000180)=""/16, 0x10, 0x8) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1) openat(r0, &(0x7f0000000180)='./file1\x00', 0x101080, 0x100) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f, r0}, 0x68) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @broadcast}}}], 0x20}, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) [ 125.916307] loop3: detected capacity change from 0 to 40 12:32:07 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0) chdir(0x0) mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c61756469742c6d61736b3d5e5be1ea336e491c524d652bec0a3bf017f0597ee593d6f9f83d519609312daaf06e280ff293c15770bbe997047461f07485829824346bf13ce96305b1a992a25e319da471b47e6f2090256c1595177a901781175eb4941f1d299255353ecce1c76d3e1cb134c11f60a8d4b95120616164d501b1bde9aeb858a692fe0b464c40f77e7f6d9e7e13124d7951377daebf6987d7dd0c6e813b57849e8f841e04cfef8596029a2ff8bbd36ebc98b5551df8333b1060c69a9062f2b98fad226f4491f5b0a1327f528959738d5ab816c7ddd58ce811370ec98335f007d3963957e653139ff97f586a08b73b"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='pagemap\x00') pread64(r0, &(0x7f0000000180)=""/16, 0x10, 0x8) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1) openat(r0, &(0x7f0000000180)='./file1\x00', 0x101080, 0x100) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f, r0}, 0x68) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @broadcast}}}], 0x20}, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) [ 126.028266] loop3: detected capacity change from 0 to 40 12:32:07 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0) chdir(0x0) mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c61756469742c6d61736b3d5e5be1ea336e491c524d652bec0a3bf017f0597ee593d6f9f83d519609312daaf06e280ff293c15770bbe997047461f07485829824346bf13ce96305b1a992a25e319da471b47e6f2090256c1595177a901781175eb4941f1d299255353ecce1c76d3e1cb134c11f60a8d4b95120616164d501b1bde9aeb858a692fe0b464c40f77e7f6d9e7e13124d7951377daebf6987d7dd0c6e813b57849e8f841e04cfef8596029a2ff8bbd36ebc98b5551df8333b1060c69a9062f2b98fad226f4491f5b0a1327f528959738d5ab816c7ddd58ce811370ec98335f007d3963957e653139ff97f586a08b73b"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='pagemap\x00') pread64(r0, &(0x7f0000000180)=""/16, 0x10, 0x8) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1) openat(r0, &(0x7f0000000180)='./file1\x00', 0x101080, 0x100) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f, r0}, 0x68) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @broadcast}}}], 0x20}, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) 12:32:07 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f00000014c0)='./file0\x00', 0x26e1, 0x62) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) readv(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/75, 0x4b}], 0x1) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file1\x00'}) syncfs(r1) 12:32:07 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0) chdir(0x0) mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c61756469742c6d61736b3d5e5be1ea336e491c524d652bec0a3bf017f0597ee593d6f9f83d519609312daaf06e280ff293c15770bbe997047461f07485829824346bf13ce96305b1a992a25e319da471b47e6f2090256c1595177a901781175eb4941f1d299255353ecce1c76d3e1cb134c11f60a8d4b95120616164d501b1bde9aeb858a692fe0b464c40f77e7f6d9e7e13124d7951377daebf6987d7dd0c6e813b57849e8f841e04cfef8596029a2ff8bbd36ebc98b5551df8333b1060c69a9062f2b98fad226f4491f5b0a1327f528959738d5ab816c7ddd58ce811370ec98335f007d3963957e653139ff97f586a08b73b"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='pagemap\x00') pread64(r0, &(0x7f0000000180)=""/16, 0x10, 0x8) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1) openat(r0, &(0x7f0000000180)='./file1\x00', 0x101080, 0x100) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f, r0}, 0x68) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @broadcast}}}], 0x20}, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) [ 126.250012] loop3: detected capacity change from 0 to 40 12:32:07 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f00000014c0)='./file0\x00', 0x26e1, 0x62) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) readv(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/75, 0x4b}], 0x1) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file1\x00'}) syncfs(r1) 12:32:07 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0) chdir(0x0) mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c61756469742c6d61736b3d5e5be1ea336e491c524d652bec0a3bf017f0597ee593d6f9f83d519609312daaf06e280ff293c15770bbe997047461f07485829824346bf13ce96305b1a992a25e319da471b47e6f2090256c1595177a901781175eb4941f1d299255353ecce1c76d3e1cb134c11f60a8d4b95120616164d501b1bde9aeb858a692fe0b464c40f77e7f6d9e7e13124d7951377daebf6987d7dd0c6e813b57849e8f841e04cfef8596029a2ff8bbd36ebc98b5551df8333b1060c69a9062f2b98fad226f4491f5b0a1327f528959738d5ab816c7ddd58ce811370ec98335f007d3963957e653139ff97f586a08b73b"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='pagemap\x00') pread64(r0, &(0x7f0000000180)=""/16, 0x10, 0x8) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1) openat(r0, &(0x7f0000000180)='./file1\x00', 0x101080, 0x100) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f, r0}, 0x68) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @broadcast}}}], 0x20}, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) [ 126.375646] hrtimer: interrupt took 17423 ns [ 126.415003] loop3: detected capacity change from 0 to 40 [ 127.170913] audit: type=1326 audit(1663158728.798:9): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=3942 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f40e1c8cb19 code=0x0 [ 128.007971] audit: type=1326 audit(1663158729.635:10): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=3942 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f40e1c8cb19 code=0x0 12:32:09 executing program 0: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x1d, r0) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, r0) 12:32:09 executing program 4: perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x210c1, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f00000004c0)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) openat(0xffffffffffffff9c, 0x0, 0x80000, 0x102) r0 = syz_open_procfs(0x0, &(0x7f0000003380)='clear_refs\x00') write$sndseq(r0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 12:32:09 executing program 1: r0 = syz_io_uring_setup(0x30b3, &(0x7f0000000000), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000200), 0x0) 12:32:09 executing program 6: r0 = syz_io_uring_setup(0x30b3, &(0x7f0000000000), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000200), 0x0) 12:32:09 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f00000014c0)='./file0\x00', 0x26e1, 0x62) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) readv(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/75, 0x4b}], 0x1) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file1\x00'}) syncfs(r1) 12:32:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r0, 0x560d) 12:32:09 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0) chdir(0x0) mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c61756469742c6d61736b3d5e5be1ea336e491c524d652bec0a3bf017f0597ee593d6f9f83d519609312daaf06e280ff293c15770bbe997047461f07485829824346bf13ce96305b1a992a25e319da471b47e6f2090256c1595177a901781175eb4941f1d299255353ecce1c76d3e1cb134c11f60a8d4b95120616164d501b1bde9aeb858a692fe0b464c40f77e7f6d9e7e13124d7951377daebf6987d7dd0c6e813b57849e8f841e04cfef8596029a2ff8bbd36ebc98b5551df8333b1060c69a9062f2b98fad226f4491f5b0a1327f528959738d5ab816c7ddd58ce811370ec98335f007d3963957e653139ff97f586a08b73b"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='pagemap\x00') pread64(r0, &(0x7f0000000180)=""/16, 0x10, 0x8) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1) openat(r0, &(0x7f0000000180)='./file1\x00', 0x101080, 0x100) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f, r0}, 0x68) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @broadcast}}}], 0x20}, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) 12:32:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00') fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) [ 128.196533] loop3: detected capacity change from 0 to 40 [ 128.257346] audit: type=1326 audit(1663158729.884:11): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=3991 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f40e1c8cb19 code=0x0 12:32:10 executing program 0: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x1d, r0) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, r0) 12:32:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00') fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) 12:32:10 executing program 1: r0 = syz_io_uring_setup(0x30b3, &(0x7f0000000000), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000200), 0x0) 12:32:10 executing program 7: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x1d, r0) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, r0) 12:32:10 executing program 4: perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x210c1, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f00000004c0)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) openat(0xffffffffffffff9c, 0x0, 0x80000, 0x102) r0 = syz_open_procfs(0x0, &(0x7f0000003380)='clear_refs\x00') write$sndseq(r0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 12:32:10 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r0, 0x560d) 12:32:10 executing program 6: r0 = syz_io_uring_setup(0x30b3, &(0x7f0000000000), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000200), 0x0) 12:32:10 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0) chdir(0x0) mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c61756469742c6d61736b3d5e5be1ea336e491c524d652bec0a3bf017f0597ee593d6f9f83d519609312daaf06e280ff293c15770bbe997047461f07485829824346bf13ce96305b1a992a25e319da471b47e6f2090256c1595177a901781175eb4941f1d299255353ecce1c76d3e1cb134c11f60a8d4b95120616164d501b1bde9aeb858a692fe0b464c40f77e7f6d9e7e13124d7951377daebf6987d7dd0c6e813b57849e8f841e04cfef8596029a2ff8bbd36ebc98b5551df8333b1060c69a9062f2b98fad226f4491f5b0a1327f528959738d5ab816c7ddd58ce811370ec98335f007d3963957e653139ff97f586a08b73b"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='pagemap\x00') pread64(r0, &(0x7f0000000180)=""/16, 0x10, 0x8) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1) openat(r0, &(0x7f0000000180)='./file1\x00', 0x101080, 0x100) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f, r0}, 0x68) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @broadcast}}}], 0x20}, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) 12:32:10 executing program 7: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x1d, r0) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, r0) [ 129.153327] loop3: detected capacity change from 0 to 40 12:32:10 executing program 0: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x1d, r0) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, r0) 12:32:10 executing program 6: r0 = syz_io_uring_setup(0x30b3, &(0x7f0000000000), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000200), 0x0) 12:32:10 executing program 1: r0 = syz_io_uring_setup(0x30b3, &(0x7f0000000000), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000200), 0x0) [ 129.282055] audit: type=1326 audit(1663158730.909:12): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4011 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f40e1c8cb19 code=0x0 12:32:11 executing program 7: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x1d, r0) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, r0) 12:32:11 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r0, 0x560d) 12:32:11 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0) chdir(0x0) mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c61756469742c6d61736b3d5e5be1ea336e491c524d652bec0a3bf017f0597ee593d6f9f83d519609312daaf06e280ff293c15770bbe997047461f07485829824346bf13ce96305b1a992a25e319da471b47e6f2090256c1595177a901781175eb4941f1d299255353ecce1c76d3e1cb134c11f60a8d4b95120616164d501b1bde9aeb858a692fe0b464c40f77e7f6d9e7e13124d7951377daebf6987d7dd0c6e813b57849e8f841e04cfef8596029a2ff8bbd36ebc98b5551df8333b1060c69a9062f2b98fad226f4491f5b0a1327f528959738d5ab816c7ddd58ce811370ec98335f007d3963957e653139ff97f586a08b73b"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='pagemap\x00') pread64(r0, &(0x7f0000000180)=""/16, 0x10, 0x8) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1) openat(r0, &(0x7f0000000180)='./file1\x00', 0x101080, 0x100) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f, r0}, 0x68) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @broadcast}}}], 0x20}, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) 12:32:11 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0) chdir(0x0) mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c61756469742c6d61736b3d5e5be1ea336e491c524d652bec0a3bf017f0597ee593d6f9f83d519609312daaf06e280ff293c15770bbe997047461f07485829824346bf13ce96305b1a992a25e319da471b47e6f2090256c1595177a901781175eb4941f1d299255353ecce1c76d3e1cb134c11f60a8d4b95120616164d501b1bde9aeb858a692fe0b464c40f77e7f6d9e7e13124d7951377daebf6987d7dd0c6e813b57849e8f841e04cfef8596029a2ff8bbd36ebc98b5551df8333b1060c69a9062f2b98fad226f4491f5b0a1327f528959738d5ab816c7ddd58ce811370ec98335f007d3963957e653139ff97f586a08b73b"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='pagemap\x00') pread64(r0, &(0x7f0000000180)=""/16, 0x10, 0x8) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1) openat(r0, &(0x7f0000000180)='./file1\x00', 0x101080, 0x100) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f, r0}, 0x68) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @broadcast}}}], 0x20}, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) 12:32:11 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0) chdir(0x0) mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c61756469742c6d61736b3d5e5be1ea336e491c524d652bec0a3bf017f0597ee593d6f9f83d519609312daaf06e280ff293c15770bbe997047461f07485829824346bf13ce96305b1a992a25e319da471b47e6f2090256c1595177a901781175eb4941f1d299255353ecce1c76d3e1cb134c11f60a8d4b95120616164d501b1bde9aeb858a692fe0b464c40f77e7f6d9e7e13124d7951377daebf6987d7dd0c6e813b57849e8f841e04cfef8596029a2ff8bbd36ebc98b5551df8333b1060c69a9062f2b98fad226f4491f5b0a1327f528959738d5ab816c7ddd58ce811370ec98335f007d3963957e653139ff97f586a08b73b"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='pagemap\x00') pread64(r0, &(0x7f0000000180)=""/16, 0x10, 0x8) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1) openat(r0, &(0x7f0000000180)='./file1\x00', 0x101080, 0x100) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f, r0}, 0x68) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @broadcast}}}], 0x20}, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) 12:32:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00') fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) 12:32:11 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000280)=@polexpire={0xc8, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@XFRMA_IF_ID={0x8}]}, 0xc8}}, 0x0) 12:32:11 executing program 4: perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x210c1, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f00000004c0)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) openat(0xffffffffffffff9c, 0x0, 0x80000, 0x102) r0 = syz_open_procfs(0x0, &(0x7f0000003380)='clear_refs\x00') write$sndseq(r0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a40)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000009c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 130.173743] loop1: detected capacity change from 0 to 40 [ 130.174663] loop0: detected capacity change from 0 to 40 [ 130.178592] loop3: detected capacity change from 0 to 40 [ 130.216341] audit: type=1326 audit(1663158731.843:13): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4035 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f40e1c8cb19 code=0x0 12:32:11 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000280)=@polexpire={0xc8, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@XFRMA_IF_ID={0x8}]}, 0xc8}}, 0x0) 12:32:12 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000280)=@polexpire={0xc8, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@XFRMA_IF_ID={0x8}]}, 0xc8}}, 0x0) 12:32:12 executing program 2: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="043e1f1d"], 0x22) 12:32:12 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) mlockall(0x3) 12:32:12 executing program 2: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="043e1f1d"], 0x22) [ 130.659495] loop0: detected capacity change from 0 to 40 12:32:12 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000280)=@polexpire={0xc8, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@XFRMA_IF_ID={0x8}]}, 0xc8}}, 0x0) 12:32:12 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0) chdir(0x0) mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c61756469742c6d61736b3d5e5be1ea336e491c524d652bec0a3bf017f0597ee593d6f9f83d519609312daaf06e280ff293c15770bbe997047461f07485829824346bf13ce96305b1a992a25e319da471b47e6f2090256c1595177a901781175eb4941f1d299255353ecce1c76d3e1cb134c11f60a8d4b95120616164d501b1bde9aeb858a692fe0b464c40f77e7f6d9e7e13124d7951377daebf6987d7dd0c6e813b57849e8f841e04cfef8596029a2ff8bbd36ebc98b5551df8333b1060c69a9062f2b98fad226f4491f5b0a1327f528959738d5ab816c7ddd58ce811370ec98335f007d3963957e653139ff97f586a08b73b"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='pagemap\x00') pread64(r0, &(0x7f0000000180)=""/16, 0x10, 0x8) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1) openat(r0, &(0x7f0000000180)='./file1\x00', 0x101080, 0x100) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f, r0}, 0x68) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @broadcast}}}], 0x20}, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) 12:32:12 executing program 2: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="043e1f1d"], 0x22) 12:32:12 executing program 6: r0 = syz_io_uring_setup(0x5d6f, &(0x7f0000000680)={0x0, 0x0, 0x2}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000700), &(0x7f0000000740)) io_uring_enter(r0, 0x0, 0x0, 0x5, 0x0, 0x0) 12:32:12 executing program 3: r0 = memfd_create(&(0x7f0000000ec0)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<8\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6\xb0p\xa9\xf3\xef\x12\xd1,[v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dE\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00rB\xbf\xb9\x14g\xa3\x82L\xc1\xe5\x8a_s\xbc\x92\x94\x06\x1f}\x80\x13\xe2\x88$\xe0\x1bd\x8d\xde\b\xdf=l`1\xcfq\xa6\xfc\x05\xde\xf4\x8b9,\xb7\xd6x\xa8\xf2\xe9\xc6\x82\xdf\x8dR%s^`(]\a\x123\xd8\x17\xa1%\xe8L]\xea\x1d]\x1c\xeb\x95 \x02\xa0{i\xb1\x99:\xaa\x9c\xc4Q\xf8\x84\xa3\xb7\xc8\x19\xc2b\b*\xf5\x1a\xdbOf\xa1U\x8f\x11\x1eE\x9fw\xf4\xbf(\xa0\xea\xad\"\x1a=\xa7N^\x0f\x90\xdc\x1e\bT\x9c\x9ck2\x1f[\xa1\xddN\x93\x06h\xf1\xa3\x9c\xb7x\xf8\xea\xe9\xc2(\xd8\x01Pq\xa9\x1e\xe2\xc5bG\x8a\xe6\n\x8b\f4I\xe3\x00'/739, 0x5) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x8, 0x140) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r3, 0x301, 0x0, 0x0, {0xb}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f00000000c0)={@private2={0xfc, 0x2, '\x00', 0x1}, 0x6b}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000129bd7000fedbdf251600000005000210010000400500040000000000"], 0x24}, 0x1, 0x0, 0x0, 0x400}, 0x4009) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x2c, 0x3, 0x1, 0x201, 0x0, 0x0, {}, [@nested={0x18, 0x19, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@loopback}]}]}, 0x2c}}, 0x0) preadv(r5, &(0x7f0000002380)=[{&(0x7f0000000480)=""/166, 0xa6}, {&(0x7f0000000540)=""/240, 0xf0}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000300)=""/2, 0x2}, {&(0x7f0000000340)=""/49, 0x31}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/18, 0x12}, {&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f00000021c0)=""/239, 0xef}, {&(0x7f00000022c0)=""/162, 0xa2}], 0xa, 0xffffffff, 0x3ff) ioctl$DVD_WRITE_STRUCT(r1, 0x5390, &(0x7f0000000680)=@type=0x1) gettid() 12:32:12 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0) chdir(0x0) mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c61756469742c6d61736b3d5e5be1ea336e491c524d652bec0a3bf017f0597ee593d6f9f83d519609312daaf06e280ff293c15770bbe997047461f07485829824346bf13ce96305b1a992a25e319da471b47e6f2090256c1595177a901781175eb4941f1d299255353ecce1c76d3e1cb134c11f60a8d4b95120616164d501b1bde9aeb858a692fe0b464c40f77e7f6d9e7e13124d7951377daebf6987d7dd0c6e813b57849e8f841e04cfef8596029a2ff8bbd36ebc98b5551df8333b1060c69a9062f2b98fad226f4491f5b0a1327f528959738d5ab816c7ddd58ce811370ec98335f007d3963957e653139ff97f586a08b73b"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='pagemap\x00') pread64(r0, &(0x7f0000000180)=""/16, 0x10, 0x8) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1) openat(r0, &(0x7f0000000180)='./file1\x00', 0x101080, 0x100) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f, r0}, 0x68) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @broadcast}}}], 0x20}, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) 12:32:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x14, r1, 0x1, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 12:32:12 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) mlockall(0x3) 12:32:12 executing program 5: getgroups(0x2, &(0x7f0000000140)=[0x0, 0xee00]) setresgid(r0, 0x0, 0x0) setregid(0x0, 0x0) 12:32:12 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0) chdir(0x0) mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c61756469742c6d61736b3d5e5be1ea336e491c524d652bec0a3bf017f0597ee593d6f9f83d519609312daaf06e280ff293c15770bbe997047461f07485829824346bf13ce96305b1a992a25e319da471b47e6f2090256c1595177a901781175eb4941f1d299255353ecce1c76d3e1cb134c11f60a8d4b95120616164d501b1bde9aeb858a692fe0b464c40f77e7f6d9e7e13124d7951377daebf6987d7dd0c6e813b57849e8f841e04cfef8596029a2ff8bbd36ebc98b5551df8333b1060c69a9062f2b98fad226f4491f5b0a1327f528959738d5ab816c7ddd58ce811370ec98335f007d3963957e653139ff97f586a08b73b"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='pagemap\x00') pread64(r0, &(0x7f0000000180)=""/16, 0x10, 0x8) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1) openat(r0, &(0x7f0000000180)='./file1\x00', 0x101080, 0x100) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f, r0}, 0x68) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @broadcast}}}], 0x20}, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) [ 131.283145] loop0: detected capacity change from 0 to 40 12:32:12 executing program 5: getgroups(0x2, &(0x7f0000000140)=[0x0, 0xee00]) setresgid(r0, 0x0, 0x0) setregid(0x0, 0x0) [ 131.331101] loop1: detected capacity change from 0 to 40 12:32:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x14, r1, 0x1, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 12:32:12 executing program 2: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="043e1f1d"], 0x22) 12:32:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x14, r1, 0x1, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 12:32:13 executing program 5: getgroups(0x2, &(0x7f0000000140)=[0x0, 0xee00]) setresgid(r0, 0x0, 0x0) setregid(0x0, 0x0) 12:32:13 executing program 6: r0 = syz_io_uring_setup(0x5d6f, &(0x7f0000000680)={0x0, 0x0, 0x2}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000700), &(0x7f0000000740)) io_uring_enter(r0, 0x0, 0x0, 0x5, 0x0, 0x0) 12:32:13 executing program 0: lremovexattr(&(0x7f0000000000)='./cgroup/cgroup.procs\x00', &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00') 12:32:13 executing program 3: r0 = memfd_create(&(0x7f0000000ec0)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<8\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6\xb0p\xa9\xf3\xef\x12\xd1,[v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dE\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00rB\xbf\xb9\x14g\xa3\x82L\xc1\xe5\x8a_s\xbc\x92\x94\x06\x1f}\x80\x13\xe2\x88$\xe0\x1bd\x8d\xde\b\xdf=l`1\xcfq\xa6\xfc\x05\xde\xf4\x8b9,\xb7\xd6x\xa8\xf2\xe9\xc6\x82\xdf\x8dR%s^`(]\a\x123\xd8\x17\xa1%\xe8L]\xea\x1d]\x1c\xeb\x95 \x02\xa0{i\xb1\x99:\xaa\x9c\xc4Q\xf8\x84\xa3\xb7\xc8\x19\xc2b\b*\xf5\x1a\xdbOf\xa1U\x8f\x11\x1eE\x9fw\xf4\xbf(\xa0\xea\xad\"\x1a=\xa7N^\x0f\x90\xdc\x1e\bT\x9c\x9ck2\x1f[\xa1\xddN\x93\x06h\xf1\xa3\x9c\xb7x\xf8\xea\xe9\xc2(\xd8\x01Pq\xa9\x1e\xe2\xc5bG\x8a\xe6\n\x8b\f4I\xe3\x00'/739, 0x5) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x8, 0x140) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r3, 0x301, 0x0, 0x0, {0xb}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f00000000c0)={@private2={0xfc, 0x2, '\x00', 0x1}, 0x6b}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000129bd7000fedbdf251600000005000210010000400500040000000000"], 0x24}, 0x1, 0x0, 0x0, 0x400}, 0x4009) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x2c, 0x3, 0x1, 0x201, 0x0, 0x0, {}, [@nested={0x18, 0x19, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@loopback}]}]}, 0x2c}}, 0x0) preadv(r5, &(0x7f0000002380)=[{&(0x7f0000000480)=""/166, 0xa6}, {&(0x7f0000000540)=""/240, 0xf0}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000300)=""/2, 0x2}, {&(0x7f0000000340)=""/49, 0x31}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/18, 0x12}, {&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f00000021c0)=""/239, 0xef}, {&(0x7f00000022c0)=""/162, 0xa2}], 0xa, 0xffffffff, 0x3ff) ioctl$DVD_WRITE_STRUCT(r1, 0x5390, &(0x7f0000000680)=@type=0x1) gettid() 12:32:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x14, r1, 0x1, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 12:32:13 executing program 2: r0 = memfd_create(&(0x7f0000000ec0)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<8\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6\xb0p\xa9\xf3\xef\x12\xd1,[v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dE\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00rB\xbf\xb9\x14g\xa3\x82L\xc1\xe5\x8a_s\xbc\x92\x94\x06\x1f}\x80\x13\xe2\x88$\xe0\x1bd\x8d\xde\b\xdf=l`1\xcfq\xa6\xfc\x05\xde\xf4\x8b9,\xb7\xd6x\xa8\xf2\xe9\xc6\x82\xdf\x8dR%s^`(]\a\x123\xd8\x17\xa1%\xe8L]\xea\x1d]\x1c\xeb\x95 \x02\xa0{i\xb1\x99:\xaa\x9c\xc4Q\xf8\x84\xa3\xb7\xc8\x19\xc2b\b*\xf5\x1a\xdbOf\xa1U\x8f\x11\x1eE\x9fw\xf4\xbf(\xa0\xea\xad\"\x1a=\xa7N^\x0f\x90\xdc\x1e\bT\x9c\x9ck2\x1f[\xa1\xddN\x93\x06h\xf1\xa3\x9c\xb7x\xf8\xea\xe9\xc2(\xd8\x01Pq\xa9\x1e\xe2\xc5bG\x8a\xe6\n\x8b\f4I\xe3\x00'/739, 0x5) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x8, 0x140) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r3, 0x301, 0x0, 0x0, {0xb}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f00000000c0)={@private2={0xfc, 0x2, '\x00', 0x1}, 0x6b}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000129bd7000fedbdf251600000005000210010000400500040000000000"], 0x24}, 0x1, 0x0, 0x0, 0x400}, 0x4009) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x2c, 0x3, 0x1, 0x201, 0x0, 0x0, {}, [@nested={0x18, 0x19, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@loopback}]}]}, 0x2c}}, 0x0) preadv(r5, &(0x7f0000002380)=[{&(0x7f0000000480)=""/166, 0xa6}, {&(0x7f0000000540)=""/240, 0xf0}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000300)=""/2, 0x2}, {&(0x7f0000000340)=""/49, 0x31}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/18, 0x12}, {&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f00000021c0)=""/239, 0xef}, {&(0x7f00000022c0)=""/162, 0xa2}], 0xa, 0xffffffff, 0x3ff) ioctl$DVD_WRITE_STRUCT(r1, 0x5390, &(0x7f0000000680)=@type=0x1) gettid() 12:32:13 executing program 0: lremovexattr(&(0x7f0000000000)='./cgroup/cgroup.procs\x00', &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00') 12:32:13 executing program 6: r0 = syz_io_uring_setup(0x5d6f, &(0x7f0000000680)={0x0, 0x0, 0x2}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000700), &(0x7f0000000740)) io_uring_enter(r0, 0x0, 0x0, 0x5, 0x0, 0x0) 12:32:13 executing program 3: r0 = memfd_create(&(0x7f0000000ec0)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<8\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6\xb0p\xa9\xf3\xef\x12\xd1,[v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dE\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00rB\xbf\xb9\x14g\xa3\x82L\xc1\xe5\x8a_s\xbc\x92\x94\x06\x1f}\x80\x13\xe2\x88$\xe0\x1bd\x8d\xde\b\xdf=l`1\xcfq\xa6\xfc\x05\xde\xf4\x8b9,\xb7\xd6x\xa8\xf2\xe9\xc6\x82\xdf\x8dR%s^`(]\a\x123\xd8\x17\xa1%\xe8L]\xea\x1d]\x1c\xeb\x95 \x02\xa0{i\xb1\x99:\xaa\x9c\xc4Q\xf8\x84\xa3\xb7\xc8\x19\xc2b\b*\xf5\x1a\xdbOf\xa1U\x8f\x11\x1eE\x9fw\xf4\xbf(\xa0\xea\xad\"\x1a=\xa7N^\x0f\x90\xdc\x1e\bT\x9c\x9ck2\x1f[\xa1\xddN\x93\x06h\xf1\xa3\x9c\xb7x\xf8\xea\xe9\xc2(\xd8\x01Pq\xa9\x1e\xe2\xc5bG\x8a\xe6\n\x8b\f4I\xe3\x00'/739, 0x5) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x8, 0x140) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r3, 0x301, 0x0, 0x0, {0xb}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f00000000c0)={@private2={0xfc, 0x2, '\x00', 0x1}, 0x6b}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000129bd7000fedbdf251600000005000210010000400500040000000000"], 0x24}, 0x1, 0x0, 0x0, 0x400}, 0x4009) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x2c, 0x3, 0x1, 0x201, 0x0, 0x0, {}, [@nested={0x18, 0x19, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@loopback}]}]}, 0x2c}}, 0x0) preadv(r5, &(0x7f0000002380)=[{&(0x7f0000000480)=""/166, 0xa6}, {&(0x7f0000000540)=""/240, 0xf0}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000300)=""/2, 0x2}, {&(0x7f0000000340)=""/49, 0x31}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/18, 0x12}, {&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f00000021c0)=""/239, 0xef}, {&(0x7f00000022c0)=""/162, 0xa2}], 0xa, 0xffffffff, 0x3ff) ioctl$DVD_WRITE_STRUCT(r1, 0x5390, &(0x7f0000000680)=@type=0x1) gettid() 12:32:13 executing program 2: r0 = memfd_create(&(0x7f0000000ec0)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<8\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6\xb0p\xa9\xf3\xef\x12\xd1,[v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dE\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00rB\xbf\xb9\x14g\xa3\x82L\xc1\xe5\x8a_s\xbc\x92\x94\x06\x1f}\x80\x13\xe2\x88$\xe0\x1bd\x8d\xde\b\xdf=l`1\xcfq\xa6\xfc\x05\xde\xf4\x8b9,\xb7\xd6x\xa8\xf2\xe9\xc6\x82\xdf\x8dR%s^`(]\a\x123\xd8\x17\xa1%\xe8L]\xea\x1d]\x1c\xeb\x95 \x02\xa0{i\xb1\x99:\xaa\x9c\xc4Q\xf8\x84\xa3\xb7\xc8\x19\xc2b\b*\xf5\x1a\xdbOf\xa1U\x8f\x11\x1eE\x9fw\xf4\xbf(\xa0\xea\xad\"\x1a=\xa7N^\x0f\x90\xdc\x1e\bT\x9c\x9ck2\x1f[\xa1\xddN\x93\x06h\xf1\xa3\x9c\xb7x\xf8\xea\xe9\xc2(\xd8\x01Pq\xa9\x1e\xe2\xc5bG\x8a\xe6\n\x8b\f4I\xe3\x00'/739, 0x5) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x8, 0x140) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r3, 0x301, 0x0, 0x0, {0xb}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f00000000c0)={@private2={0xfc, 0x2, '\x00', 0x1}, 0x6b}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000129bd7000fedbdf251600000005000210010000400500040000000000"], 0x24}, 0x1, 0x0, 0x0, 0x400}, 0x4009) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x2c, 0x3, 0x1, 0x201, 0x0, 0x0, {}, [@nested={0x18, 0x19, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@loopback}]}]}, 0x2c}}, 0x0) preadv(r5, &(0x7f0000002380)=[{&(0x7f0000000480)=""/166, 0xa6}, {&(0x7f0000000540)=""/240, 0xf0}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000300)=""/2, 0x2}, {&(0x7f0000000340)=""/49, 0x31}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/18, 0x12}, {&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f00000021c0)=""/239, 0xef}, {&(0x7f00000022c0)=""/162, 0xa2}], 0xa, 0xffffffff, 0x3ff) ioctl$DVD_WRITE_STRUCT(r1, 0x5390, &(0x7f0000000680)=@type=0x1) gettid() 12:32:13 executing program 5: getgroups(0x2, &(0x7f0000000140)=[0x0, 0xee00]) setresgid(r0, 0x0, 0x0) setregid(0x0, 0x0) 12:32:13 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) mlockall(0x3) 12:32:13 executing program 0: lremovexattr(&(0x7f0000000000)='./cgroup/cgroup.procs\x00', &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00') 12:32:13 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x9}], 0x0, 0x0) chdir(0x0) mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x86091, &(0x7f00000007c0)=ANY=[@ANYBLOB="636c11d04d478eab95046472656e2c616c6c2c6e6f7072656669782c72656c656173655f6167656e743d2e2f66696c65312c6e6f7072656669782c616c6c2c66736d616769633d3078303030303030303030303030303130312c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c61756469742c6d61736b3d5e5be1ea336e491c524d652bec0a3bf017f0597ee593d6f9f83d519609312daaf06e280ff293c15770bbe997047461f07485829824346bf13ce96305b1a992a25e319da471b47e6f2090256c1595177a901781175eb4941f1d299255353ecce1c76d3e1cb134c11f60a8d4b95120616164d501b1bde9aeb858a692fe0b464c40f77e7f6d9e7e13124d7951377daebf6987d7dd0c6e813b57849e8f841e04cfef8596029a2ff8bbd36ebc98b5551df8333b1060c69a9062f2b98fad226f4491f5b0a1327f528959738d5ab816c7ddd58ce811370ec98335f007d3963957e653139ff97f586a08b73b"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='pagemap\x00') pread64(r0, &(0x7f0000000180)=""/16, 0x10, 0x8) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x4, 0x1) openat(r0, &(0x7f0000000180)='./file1\x00', 0x101080, 0x100) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x10, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000600)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000580)="8a145cdc040d0a4ac50c37bace22fc092b248ee0e334529d007e2c451fd12932d86b78630671286a05ead28b26813d5711b3d991f9a23498d1608d23073efef183d1651ce1f1a134ab578c49191061", 0x4f, r0}, 0x68) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @broadcast}}}], 0x20}, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) 12:32:13 executing program 4: r0 = memfd_create(&(0x7f0000000ec0)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<8\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6\xb0p\xa9\xf3\xef\x12\xd1,[v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dE\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00rB\xbf\xb9\x14g\xa3\x82L\xc1\xe5\x8a_s\xbc\x92\x94\x06\x1f}\x80\x13\xe2\x88$\xe0\x1bd\x8d\xde\b\xdf=l`1\xcfq\xa6\xfc\x05\xde\xf4\x8b9,\xb7\xd6x\xa8\xf2\xe9\xc6\x82\xdf\x8dR%s^`(]\a\x123\xd8\x17\xa1%\xe8L]\xea\x1d]\x1c\xeb\x95 \x02\xa0{i\xb1\x99:\xaa\x9c\xc4Q\xf8\x84\xa3\xb7\xc8\x19\xc2b\b*\xf5\x1a\xdbOf\xa1U\x8f\x11\x1eE\x9fw\xf4\xbf(\xa0\xea\xad\"\x1a=\xa7N^\x0f\x90\xdc\x1e\bT\x9c\x9ck2\x1f[\xa1\xddN\x93\x06h\xf1\xa3\x9c\xb7x\xf8\xea\xe9\xc2(\xd8\x01Pq\xa9\x1e\xe2\xc5bG\x8a\xe6\n\x8b\f4I\xe3\x00'/739, 0x5) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x8, 0x140) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r3, 0x301, 0x0, 0x0, {0xb}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f00000000c0)={@private2={0xfc, 0x2, '\x00', 0x1}, 0x6b}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000129bd7000fedbdf251600000005000210010000400500040000000000"], 0x24}, 0x1, 0x0, 0x0, 0x400}, 0x4009) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x2c, 0x3, 0x1, 0x201, 0x0, 0x0, {}, [@nested={0x18, 0x19, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@loopback}]}]}, 0x2c}}, 0x0) preadv(r5, &(0x7f0000002380)=[{&(0x7f0000000480)=""/166, 0xa6}, {&(0x7f0000000540)=""/240, 0xf0}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000300)=""/2, 0x2}, {&(0x7f0000000340)=""/49, 0x31}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/18, 0x12}, {&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f00000021c0)=""/239, 0xef}, {&(0x7f00000022c0)=""/162, 0xa2}], 0xa, 0xffffffff, 0x3ff) ioctl$DVD_WRITE_STRUCT(r1, 0x5390, &(0x7f0000000680)=@type=0x1) gettid() [ 131.831704] loop1: detected capacity change from 0 to 40 12:32:13 executing program 0: lremovexattr(&(0x7f0000000000)='./cgroup/cgroup.procs\x00', &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00') 12:32:13 executing program 6: r0 = syz_io_uring_setup(0x5d6f, &(0x7f0000000680)={0x0, 0x0, 0x2}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000700), &(0x7f0000000740)) io_uring_enter(r0, 0x0, 0x0, 0x5, 0x0, 0x0) 12:32:13 executing program 2: r0 = memfd_create(&(0x7f0000000ec0)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<8\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6\xb0p\xa9\xf3\xef\x12\xd1,[v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dE\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00rB\xbf\xb9\x14g\xa3\x82L\xc1\xe5\x8a_s\xbc\x92\x94\x06\x1f}\x80\x13\xe2\x88$\xe0\x1bd\x8d\xde\b\xdf=l`1\xcfq\xa6\xfc\x05\xde\xf4\x8b9,\xb7\xd6x\xa8\xf2\xe9\xc6\x82\xdf\x8dR%s^`(]\a\x123\xd8\x17\xa1%\xe8L]\xea\x1d]\x1c\xeb\x95 \x02\xa0{i\xb1\x99:\xaa\x9c\xc4Q\xf8\x84\xa3\xb7\xc8\x19\xc2b\b*\xf5\x1a\xdbOf\xa1U\x8f\x11\x1eE\x9fw\xf4\xbf(\xa0\xea\xad\"\x1a=\xa7N^\x0f\x90\xdc\x1e\bT\x9c\x9ck2\x1f[\xa1\xddN\x93\x06h\xf1\xa3\x9c\xb7x\xf8\xea\xe9\xc2(\xd8\x01Pq\xa9\x1e\xe2\xc5bG\x8a\xe6\n\x8b\f4I\xe3\x00'/739, 0x5) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x8, 0x140) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r3, 0x301, 0x0, 0x0, {0xb}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f00000000c0)={@private2={0xfc, 0x2, '\x00', 0x1}, 0x6b}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000129bd7000fedbdf251600000005000210010000400500040000000000"], 0x24}, 0x1, 0x0, 0x0, 0x400}, 0x4009) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x2c, 0x3, 0x1, 0x201, 0x0, 0x0, {}, [@nested={0x18, 0x19, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@loopback}]}]}, 0x2c}}, 0x0) preadv(r5, &(0x7f0000002380)=[{&(0x7f0000000480)=""/166, 0xa6}, {&(0x7f0000000540)=""/240, 0xf0}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000300)=""/2, 0x2}, {&(0x7f0000000340)=""/49, 0x31}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/18, 0x12}, {&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f00000021c0)=""/239, 0xef}, {&(0x7f00000022c0)=""/162, 0xa2}], 0xa, 0xffffffff, 0x3ff) ioctl$DVD_WRITE_STRUCT(r1, 0x5390, &(0x7f0000000680)=@type=0x1) gettid() 12:32:13 executing program 5: r0 = memfd_create(&(0x7f0000000ec0)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<8\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6\xb0p\xa9\xf3\xef\x12\xd1,[v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dE\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00rB\xbf\xb9\x14g\xa3\x82L\xc1\xe5\x8a_s\xbc\x92\x94\x06\x1f}\x80\x13\xe2\x88$\xe0\x1bd\x8d\xde\b\xdf=l`1\xcfq\xa6\xfc\x05\xde\xf4\x8b9,\xb7\xd6x\xa8\xf2\xe9\xc6\x82\xdf\x8dR%s^`(]\a\x123\xd8\x17\xa1%\xe8L]\xea\x1d]\x1c\xeb\x95 \x02\xa0{i\xb1\x99:\xaa\x9c\xc4Q\xf8\x84\xa3\xb7\xc8\x19\xc2b\b*\xf5\x1a\xdbOf\xa1U\x8f\x11\x1eE\x9fw\xf4\xbf(\xa0\xea\xad\"\x1a=\xa7N^\x0f\x90\xdc\x1e\bT\x9c\x9ck2\x1f[\xa1\xddN\x93\x06h\xf1\xa3\x9c\xb7x\xf8\xea\xe9\xc2(\xd8\x01Pq\xa9\x1e\xe2\xc5bG\x8a\xe6\n\x8b\f4I\xe3\x00'/739, 0x5) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x8, 0x140) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r3, 0x301, 0x0, 0x0, {0xb}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f00000000c0)={@private2={0xfc, 0x2, '\x00', 0x1}, 0x6b}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000129bd7000fedbdf251600000005000210010000400500040000000000"], 0x24}, 0x1, 0x0, 0x0, 0x400}, 0x4009) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x2c, 0x3, 0x1, 0x201, 0x0, 0x0, {}, [@nested={0x18, 0x19, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@loopback}]}]}, 0x2c}}, 0x0) preadv(r5, &(0x7f0000002380)=[{&(0x7f0000000480)=""/166, 0xa6}, {&(0x7f0000000540)=""/240, 0xf0}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000300)=""/2, 0x2}, {&(0x7f0000000340)=""/49, 0x31}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/18, 0x12}, {&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f00000021c0)=""/239, 0xef}, {&(0x7f00000022c0)=""/162, 0xa2}], 0xa, 0xffffffff, 0x3ff) ioctl$DVD_WRITE_STRUCT(r1, 0x5390, &(0x7f0000000680)=@type=0x1) gettid() 12:32:13 executing program 3: r0 = memfd_create(&(0x7f0000000ec0)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<8\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6\xb0p\xa9\xf3\xef\x12\xd1,[v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dE\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00rB\xbf\xb9\x14g\xa3\x82L\xc1\xe5\x8a_s\xbc\x92\x94\x06\x1f}\x80\x13\xe2\x88$\xe0\x1bd\x8d\xde\b\xdf=l`1\xcfq\xa6\xfc\x05\xde\xf4\x8b9,\xb7\xd6x\xa8\xf2\xe9\xc6\x82\xdf\x8dR%s^`(]\a\x123\xd8\x17\xa1%\xe8L]\xea\x1d]\x1c\xeb\x95 \x02\xa0{i\xb1\x99:\xaa\x9c\xc4Q\xf8\x84\xa3\xb7\xc8\x19\xc2b\b*\xf5\x1a\xdbOf\xa1U\x8f\x11\x1eE\x9fw\xf4\xbf(\xa0\xea\xad\"\x1a=\xa7N^\x0f\x90\xdc\x1e\bT\x9c\x9ck2\x1f[\xa1\xddN\x93\x06h\xf1\xa3\x9c\xb7x\xf8\xea\xe9\xc2(\xd8\x01Pq\xa9\x1e\xe2\xc5bG\x8a\xe6\n\x8b\f4I\xe3\x00'/739, 0x5) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x8, 0x140) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r3, 0x301, 0x0, 0x0, {0xb}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f00000000c0)={@private2={0xfc, 0x2, '\x00', 0x1}, 0x6b}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000129bd7000fedbdf251600000005000210010000400500040000000000"], 0x24}, 0x1, 0x0, 0x0, 0x400}, 0x4009) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x2c, 0x3, 0x1, 0x201, 0x0, 0x0, {}, [@nested={0x18, 0x19, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@loopback}]}]}, 0x2c}}, 0x0) preadv(r5, &(0x7f0000002380)=[{&(0x7f0000000480)=""/166, 0xa6}, {&(0x7f0000000540)=""/240, 0xf0}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000300)=""/2, 0x2}, {&(0x7f0000000340)=""/49, 0x31}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/18, 0x12}, {&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f00000021c0)=""/239, 0xef}, {&(0x7f00000022c0)=""/162, 0xa2}], 0xa, 0xffffffff, 0x3ff) ioctl$DVD_WRITE_STRUCT(r1, 0x5390, &(0x7f0000000680)=@type=0x1) gettid() 12:32:13 executing program 5: r0 = memfd_create(&(0x7f0000000ec0)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<8\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6\xb0p\xa9\xf3\xef\x12\xd1,[v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dE\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00rB\xbf\xb9\x14g\xa3\x82L\xc1\xe5\x8a_s\xbc\x92\x94\x06\x1f}\x80\x13\xe2\x88$\xe0\x1bd\x8d\xde\b\xdf=l`1\xcfq\xa6\xfc\x05\xde\xf4\x8b9,\xb7\xd6x\xa8\xf2\xe9\xc6\x82\xdf\x8dR%s^`(]\a\x123\xd8\x17\xa1%\xe8L]\xea\x1d]\x1c\xeb\x95 \x02\xa0{i\xb1\x99:\xaa\x9c\xc4Q\xf8\x84\xa3\xb7\xc8\x19\xc2b\b*\xf5\x1a\xdbOf\xa1U\x8f\x11\x1eE\x9fw\xf4\xbf(\xa0\xea\xad\"\x1a=\xa7N^\x0f\x90\xdc\x1e\bT\x9c\x9ck2\x1f[\xa1\xddN\x93\x06h\xf1\xa3\x9c\xb7x\xf8\xea\xe9\xc2(\xd8\x01Pq\xa9\x1e\xe2\xc5bG\x8a\xe6\n\x8b\f4I\xe3\x00'/739, 0x5) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x8, 0x140) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r3, 0x301, 0x0, 0x0, {0xb}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f00000000c0)={@private2={0xfc, 0x2, '\x00', 0x1}, 0x6b}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000129bd7000fedbdf251600000005000210010000400500040000000000"], 0x24}, 0x1, 0x0, 0x0, 0x400}, 0x4009) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x2c, 0x3, 0x1, 0x201, 0x0, 0x0, {}, [@nested={0x18, 0x19, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@loopback}]}]}, 0x2c}}, 0x0) preadv(r5, &(0x7f0000002380)=[{&(0x7f0000000480)=""/166, 0xa6}, {&(0x7f0000000540)=""/240, 0xf0}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000300)=""/2, 0x2}, {&(0x7f0000000340)=""/49, 0x31}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/18, 0x12}, {&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f00000021c0)=""/239, 0xef}, {&(0x7f00000022c0)=""/162, 0xa2}], 0xa, 0xffffffff, 0x3ff) ioctl$DVD_WRITE_STRUCT(r1, 0x5390, &(0x7f0000000680)=@type=0x1) gettid() 12:32:13 executing program 5: r0 = memfd_create(&(0x7f0000000ec0)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<8\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6\xb0p\xa9\xf3\xef\x12\xd1,[v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dE\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00rB\xbf\xb9\x14g\xa3\x82L\xc1\xe5\x8a_s\xbc\x92\x94\x06\x1f}\x80\x13\xe2\x88$\xe0\x1bd\x8d\xde\b\xdf=l`1\xcfq\xa6\xfc\x05\xde\xf4\x8b9,\xb7\xd6x\xa8\xf2\xe9\xc6\x82\xdf\x8dR%s^`(]\a\x123\xd8\x17\xa1%\xe8L]\xea\x1d]\x1c\xeb\x95 \x02\xa0{i\xb1\x99:\xaa\x9c\xc4Q\xf8\x84\xa3\xb7\xc8\x19\xc2b\b*\xf5\x1a\xdbOf\xa1U\x8f\x11\x1eE\x9fw\xf4\xbf(\xa0\xea\xad\"\x1a=\xa7N^\x0f\x90\xdc\x1e\bT\x9c\x9ck2\x1f[\xa1\xddN\x93\x06h\xf1\xa3\x9c\xb7x\xf8\xea\xe9\xc2(\xd8\x01Pq\xa9\x1e\xe2\xc5bG\x8a\xe6\n\x8b\f4I\xe3\x00'/739, 0x5) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x8, 0x140) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r3, 0x301, 0x0, 0x0, {0xb}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f00000000c0)={@private2={0xfc, 0x2, '\x00', 0x1}, 0x6b}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000129bd7000fedbdf251600000005000210010000400500040000000000"], 0x24}, 0x1, 0x0, 0x0, 0x400}, 0x4009) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x2c, 0x3, 0x1, 0x201, 0x0, 0x0, {}, [@nested={0x18, 0x19, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@loopback}]}]}, 0x2c}}, 0x0) preadv(r5, &(0x7f0000002380)=[{&(0x7f0000000480)=""/166, 0xa6}, {&(0x7f0000000540)=""/240, 0xf0}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000300)=""/2, 0x2}, {&(0x7f0000000340)=""/49, 0x31}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/18, 0x12}, {&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f00000021c0)=""/239, 0xef}, {&(0x7f00000022c0)=""/162, 0xa2}], 0xa, 0xffffffff, 0x3ff) ioctl$DVD_WRITE_STRUCT(r1, 0x5390, &(0x7f0000000680)=@type=0x1) gettid() 12:32:13 executing program 4: r0 = memfd_create(&(0x7f0000000ec0)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<8\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6\xb0p\xa9\xf3\xef\x12\xd1,[v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dE\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00rB\xbf\xb9\x14g\xa3\x82L\xc1\xe5\x8a_s\xbc\x92\x94\x06\x1f}\x80\x13\xe2\x88$\xe0\x1bd\x8d\xde\b\xdf=l`1\xcfq\xa6\xfc\x05\xde\xf4\x8b9,\xb7\xd6x\xa8\xf2\xe9\xc6\x82\xdf\x8dR%s^`(]\a\x123\xd8\x17\xa1%\xe8L]\xea\x1d]\x1c\xeb\x95 \x02\xa0{i\xb1\x99:\xaa\x9c\xc4Q\xf8\x84\xa3\xb7\xc8\x19\xc2b\b*\xf5\x1a\xdbOf\xa1U\x8f\x11\x1eE\x9fw\xf4\xbf(\xa0\xea\xad\"\x1a=\xa7N^\x0f\x90\xdc\x1e\bT\x9c\x9ck2\x1f[\xa1\xddN\x93\x06h\xf1\xa3\x9c\xb7x\xf8\xea\xe9\xc2(\xd8\x01Pq\xa9\x1e\xe2\xc5bG\x8a\xe6\n\x8b\f4I\xe3\x00'/739, 0x5) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x8, 0x140) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r3, 0x301, 0x0, 0x0, {0xb}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f00000000c0)={@private2={0xfc, 0x2, '\x00', 0x1}, 0x6b}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000129bd7000fedbdf251600000005000210010000400500040000000000"], 0x24}, 0x1, 0x0, 0x0, 0x400}, 0x4009) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x2c, 0x3, 0x1, 0x201, 0x0, 0x0, {}, [@nested={0x18, 0x19, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@loopback}]}]}, 0x2c}}, 0x0) preadv(r5, &(0x7f0000002380)=[{&(0x7f0000000480)=""/166, 0xa6}, {&(0x7f0000000540)=""/240, 0xf0}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000300)=""/2, 0x2}, {&(0x7f0000000340)=""/49, 0x31}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/18, 0x12}, {&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f00000021c0)=""/239, 0xef}, {&(0x7f00000022c0)=""/162, 0xa2}], 0xa, 0xffffffff, 0x3ff) ioctl$DVD_WRITE_STRUCT(r1, 0x5390, &(0x7f0000000680)=@type=0x1) gettid() [ 132.180016] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 12:32:13 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x1, 0xb}, 0x20) sendmmsg$inet6(r0, &(0x7f00000085c0)=[{{&(0x7f0000000140)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000980)=[@flowinfo={{0x14, 0x29, 0xb, 0x7e}}], 0x18}}], 0x1, 0x0) [ 132.209572] audit: type=1400 audit(1663158733.836:14): avc: denied { write } for pid=4154 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 12:32:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000002c80)=[{&(0x7f0000003fc0)={0x28, 0x25, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x2}, @typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @pid}]}, 0x28}, {0x0}, {&(0x7f0000000300)={0xe8, 0x24, 0x4, 0x70bd2c, 0x0, "", [@generic="86e65fd178d2731f84974b1411788f7fdc5b1b7bc6bffd519be5b0c5d83181467a8c3e980561273c8feb594233cf1c0a956ece862b0b501dc5620da2ce5a7b26be7270e922302df854c66b6b4b8dc2357b39c883df8472f366d801d8d122533d90dc99a98d9cbd099a35bed9f8770995e863f1ff363a5603535403338b27049935d1db95cfac2c32b721919289d43f987849f4a53cecd140c1df03b347bda05942a45ab32d79ddd39e29d7b487ede9697164f8d953e0537f4e0f850c04aa43117c9d130d3c69bd0d75fd", @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@local}]}]}, 0xe8}, {0x0}], 0x4}, 0x0) 12:32:13 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x26, 0x8000000}}) 12:32:13 executing program 1: request_key(&(0x7f0000000d40)='asymmetric\x00', 0x0, 0x0, 0xfffffffffffffffd) 12:32:13 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_UNREGISTER_BUFFERS(0xffffffffffffffff, 0x1, 0x1000000, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="140000000200"/16], 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)={0x0}) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40880, 0x0) ioctl$SG_IO(r4, 0x2285, 0x0) r5 = perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x13, 0x5, 0x6a, 0x0, 0x0, 0xffff, 0x2000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x800080000, 0x8}, 0x1, 0x0, 0xe6, 0x9, 0x4, 0xfffffffe, 0x3, 0x0, 0x3}, 0x0, 0xc, r0, 0x8) preadv(r5, &(0x7f0000001d80)=[{&(0x7f0000000900)=""/243, 0xf3}, {0x0}, {&(0x7f0000001c80)=""/194, 0xc2}], 0x3, 0x0, 0x3) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000a00)={r3, 0x2}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000700)) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x2000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_JOIN_MESH(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16, @ANYBLOB="050000000000000000004400000008000300", @ANYRES32, @ANYBLOB="001405000000000500070000080000000600005f3b7d36eff900000000"], 0x38}}, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000080)) 12:32:14 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x1, 0xb}, 0x20) sendmmsg$inet6(r0, &(0x7f00000085c0)=[{{&(0x7f0000000140)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000980)=[@flowinfo={{0x14, 0x29, 0xb, 0x7e}}], 0x18}}], 0x1, 0x0) 12:32:14 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x26, 0x8000000}}) 12:32:14 executing program 4: r0 = memfd_create(&(0x7f0000000ec0)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<8\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6\xb0p\xa9\xf3\xef\x12\xd1,[v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dE\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00rB\xbf\xb9\x14g\xa3\x82L\xc1\xe5\x8a_s\xbc\x92\x94\x06\x1f}\x80\x13\xe2\x88$\xe0\x1bd\x8d\xde\b\xdf=l`1\xcfq\xa6\xfc\x05\xde\xf4\x8b9,\xb7\xd6x\xa8\xf2\xe9\xc6\x82\xdf\x8dR%s^`(]\a\x123\xd8\x17\xa1%\xe8L]\xea\x1d]\x1c\xeb\x95 \x02\xa0{i\xb1\x99:\xaa\x9c\xc4Q\xf8\x84\xa3\xb7\xc8\x19\xc2b\b*\xf5\x1a\xdbOf\xa1U\x8f\x11\x1eE\x9fw\xf4\xbf(\xa0\xea\xad\"\x1a=\xa7N^\x0f\x90\xdc\x1e\bT\x9c\x9ck2\x1f[\xa1\xddN\x93\x06h\xf1\xa3\x9c\xb7x\xf8\xea\xe9\xc2(\xd8\x01Pq\xa9\x1e\xe2\xc5bG\x8a\xe6\n\x8b\f4I\xe3\x00'/739, 0x5) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x8, 0x140) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r3, 0x301, 0x0, 0x0, {0xb}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f00000000c0)={@private2={0xfc, 0x2, '\x00', 0x1}, 0x6b}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000129bd7000fedbdf251600000005000210010000400500040000000000"], 0x24}, 0x1, 0x0, 0x0, 0x400}, 0x4009) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x2c, 0x3, 0x1, 0x201, 0x0, 0x0, {}, [@nested={0x18, 0x19, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@loopback}]}]}, 0x2c}}, 0x0) preadv(r5, &(0x7f0000002380)=[{&(0x7f0000000480)=""/166, 0xa6}, {&(0x7f0000000540)=""/240, 0xf0}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000300)=""/2, 0x2}, {&(0x7f0000000340)=""/49, 0x31}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/18, 0x12}, {&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f00000021c0)=""/239, 0xef}, {&(0x7f00000022c0)=""/162, 0xa2}], 0xa, 0xffffffff, 0x3ff) ioctl$DVD_WRITE_STRUCT(r1, 0x5390, &(0x7f0000000680)=@type=0x1) gettid() 12:32:14 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) mlockall(0x3) 12:32:14 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_UNREGISTER_BUFFERS(0xffffffffffffffff, 0x1, 0x1000000, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="140000000200"/16], 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)={0x0}) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40880, 0x0) ioctl$SG_IO(r4, 0x2285, 0x0) r5 = perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x13, 0x5, 0x6a, 0x0, 0x0, 0xffff, 0x2000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x800080000, 0x8}, 0x1, 0x0, 0xe6, 0x9, 0x4, 0xfffffffe, 0x3, 0x0, 0x3}, 0x0, 0xc, r0, 0x8) preadv(r5, &(0x7f0000001d80)=[{&(0x7f0000000900)=""/243, 0xf3}, {0x0}, {&(0x7f0000001c80)=""/194, 0xc2}], 0x3, 0x0, 0x3) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000a00)={r3, 0x2}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000700)) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x2000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_JOIN_MESH(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16, @ANYBLOB="050000000000000000004400000008000300", @ANYRES32, @ANYBLOB="001405000000000500070000080000000600005f3b7d36eff900000000"], 0x38}}, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000080)) [ 132.518904] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 12:32:14 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x1, 0xb}, 0x20) sendmmsg$inet6(r0, &(0x7f00000085c0)=[{{&(0x7f0000000140)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000980)=[@flowinfo={{0x14, 0x29, 0xb, 0x7e}}], 0x18}}], 0x1, 0x0) 12:32:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000002c80)=[{&(0x7f0000003fc0)={0x28, 0x25, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x2}, @typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @pid}]}, 0x28}, {0x0}, {&(0x7f0000000300)={0xe8, VM DIAGNOSIS: 12:32:07 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=ffffffff855d4688 RCX=ffffffff81e45f17 RDX=ffff88803db69ac0 RSI=0000000000000000 RDI=0000000000000005 RBP=0000000000000001 RSP=ffff8880189a7c18 R8 =0000000000000005 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=dffffc0000000000 R13=ffff888019daaa00 R14=0000000000000002 R15=ffff8880189a7ce0 RIP=ffffffff81461740 RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fc55d169008 CR3=0000000018594000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 000000ff00000000 0000000000000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=000000000000006e RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b24f1 RDI=ffffffff87641b60 RBP=ffffffff87641b20 RSP=ffff88803d59f698 R8 =0000000000000001 R9 =000000000000000a R10=000000000000006e R11=0000000000000001 R12=000000000000006e R13=ffffffff87641b20 R14=0000000000000010 R15=ffffffff822b24e0 RIP=ffffffff822b2549 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f2dd6dcd700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fb841cb1028 CR3=000000001f1ae000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 000000000000002f 002f2e2e2f002e2e YMM01=0000000000000000 0000000000000000 0000000000000000 696c61766e49002f YMM02=0000000000000000 0000000000000000 ffffffffffffff0f 0e0d0c0b0a090807 YMM03=0000000000000000 0000000000000000 0000000000000000 6c6175747269762f YMM04=0000000000000000 0000000000000000 2f2f2f2f2f2f2f2f 2f2f2f2f2f2f2f2f YMM05=0000000000000000 0000000000000000 00005587af37bcc0 00005587af37bd20 YMM06=0000000000000000 0000000000000000 00005587af37bd00 ffffffff00000003 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 2f63697361622f63 72732f2e2e000d0a YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000