Warning: Permanently added '[localhost]:53540' (ECDSA) to the list of known hosts. 2022/09/12 14:06:08 fuzzer started 2022/09/12 14:06:08 dialing manager at localhost:38027 syzkaller login: [ 35.874600] cgroup: Unknown subsys name 'net' [ 35.975680] cgroup: Unknown subsys name 'rlimit' 2022/09/12 14:06:23 syscalls: 2215 2022/09/12 14:06:23 code coverage: enabled 2022/09/12 14:06:23 comparison tracing: enabled 2022/09/12 14:06:23 extra coverage: enabled 2022/09/12 14:06:23 setuid sandbox: enabled 2022/09/12 14:06:23 namespace sandbox: enabled 2022/09/12 14:06:23 Android sandbox: enabled 2022/09/12 14:06:23 fault injection: enabled 2022/09/12 14:06:23 leak checking: enabled 2022/09/12 14:06:23 net packet injection: enabled 2022/09/12 14:06:23 net device setup: enabled 2022/09/12 14:06:23 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/12 14:06:23 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/12 14:06:23 USB emulation: enabled 2022/09/12 14:06:23 hci packet injection: enabled 2022/09/12 14:06:23 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220912) 2022/09/12 14:06:23 802.15.4 emulation: enabled 2022/09/12 14:06:23 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/12 14:06:23 fetching corpus: 33, signal 26939/30267 (executing program) 2022/09/12 14:06:23 fetching corpus: 83, signal 39064/43593 (executing program) 2022/09/12 14:06:23 fetching corpus: 133, signal 50529/56095 (executing program) 2022/09/12 14:06:23 fetching corpus: 183, signal 60038/66469 (executing program) 2022/09/12 14:06:23 fetching corpus: 233, signal 65620/72937 (executing program) 2022/09/12 14:06:24 fetching corpus: 283, signal 72914/80861 (executing program) 2022/09/12 14:06:24 fetching corpus: 333, signal 79053/87601 (executing program) 2022/09/12 14:06:24 fetching corpus: 383, signal 83691/92842 (executing program) 2022/09/12 14:06:24 fetching corpus: 433, signal 89383/98901 (executing program) 2022/09/12 14:06:24 fetching corpus: 483, signal 92696/102697 (executing program) 2022/09/12 14:06:25 fetching corpus: 533, signal 95767/106283 (executing program) 2022/09/12 14:06:25 fetching corpus: 583, signal 100120/110891 (executing program) 2022/09/12 14:06:25 fetching corpus: 633, signal 102639/113838 (executing program) 2022/09/12 14:06:25 fetching corpus: 683, signal 106310/117657 (executing program) 2022/09/12 14:06:25 fetching corpus: 733, signal 108722/120371 (executing program) 2022/09/12 14:06:25 fetching corpus: 783, signal 110676/122730 (executing program) 2022/09/12 14:06:26 fetching corpus: 833, signal 112424/124825 (executing program) 2022/09/12 14:06:26 fetching corpus: 881, signal 114938/127497 (executing program) 2022/09/12 14:06:26 fetching corpus: 931, signal 117647/130311 (executing program) 2022/09/12 14:06:26 fetching corpus: 981, signal 120156/132957 (executing program) 2022/09/12 14:06:26 fetching corpus: 1031, signal 122592/135345 (executing program) 2022/09/12 14:06:26 fetching corpus: 1081, signal 125671/138263 (executing program) 2022/09/12 14:06:27 fetching corpus: 1130, signal 128098/140558 (executing program) 2022/09/12 14:06:27 fetching corpus: 1179, signal 129716/142201 (executing program) 2022/09/12 14:06:27 fetching corpus: 1229, signal 131576/144117 (executing program) 2022/09/12 14:06:27 fetching corpus: 1279, signal 133016/145617 (executing program) 2022/09/12 14:06:27 fetching corpus: 1328, signal 135460/147760 (executing program) 2022/09/12 14:06:27 fetching corpus: 1378, signal 136716/148993 (executing program) 2022/09/12 14:06:28 fetching corpus: 1428, signal 137816/150199 (executing program) 2022/09/12 14:06:28 fetching corpus: 1478, signal 138863/151310 (executing program) 2022/09/12 14:06:28 fetching corpus: 1528, signal 140111/152526 (executing program) 2022/09/12 14:06:28 fetching corpus: 1578, signal 141934/154098 (executing program) 2022/09/12 14:06:28 fetching corpus: 1628, signal 143585/155457 (executing program) 2022/09/12 14:06:28 fetching corpus: 1678, signal 144924/156604 (executing program) 2022/09/12 14:06:28 fetching corpus: 1727, signal 146934/158126 (executing program) 2022/09/12 14:06:29 fetching corpus: 1776, signal 148487/159266 (executing program) 2022/09/12 14:06:29 fetching corpus: 1826, signal 150322/160579 (executing program) 2022/09/12 14:06:29 fetching corpus: 1876, signal 151687/161593 (executing program) 2022/09/12 14:06:29 fetching corpus: 1926, signal 153554/162870 (executing program) 2022/09/12 14:06:29 fetching corpus: 1976, signal 154576/163662 (executing program) 2022/09/12 14:06:30 fetching corpus: 2026, signal 156043/164646 (executing program) 2022/09/12 14:06:30 fetching corpus: 2076, signal 157362/165517 (executing program) 2022/09/12 14:06:30 fetching corpus: 2126, signal 158318/166169 (executing program) 2022/09/12 14:06:30 fetching corpus: 2176, signal 159213/166759 (executing program) 2022/09/12 14:06:30 fetching corpus: 2225, signal 160192/167464 (executing program) 2022/09/12 14:06:30 fetching corpus: 2275, signal 161146/168124 (executing program) 2022/09/12 14:06:30 fetching corpus: 2325, signal 162161/168766 (executing program) 2022/09/12 14:06:31 fetching corpus: 2375, signal 163861/169618 (executing program) 2022/09/12 14:06:31 fetching corpus: 2425, signal 164943/170202 (executing program) 2022/09/12 14:06:31 fetching corpus: 2475, signal 166149/170800 (executing program) 2022/09/12 14:06:31 fetching corpus: 2525, signal 167050/171236 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/171346 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/171427 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/171527 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/171590 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/171692 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/171778 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/171863 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/171934 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/172013 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/172103 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/172196 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/172302 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/172386 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/172460 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/172542 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/172626 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/172705 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/172792 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/172873 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/172978 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/173071 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/173149 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/173217 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/173310 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/173399 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/173470 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/173536 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/173603 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/173696 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/173789 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/173884 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/173974 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/174039 (executing program) 2022/09/12 14:06:31 fetching corpus: 2527, signal 167129/174039 (executing program) 2022/09/12 14:06:33 starting 8 fuzzer processes 14:06:33 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000200)={0x0, 0x3}, 0x4) close_range(r0, 0xffffffffffffffff, 0x0) 14:06:33 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{0x5}, {0x2, 0x5, 0x0, 0x1a4}]}) 14:06:33 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_mempolicy(0x0, 0x0, 0x80000000, &(0x7f0000ffc000/0x4000)=nil, 0x3) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3) [ 60.462098] audit: type=1400 audit(1662991593.566:6): avc: denied { execmem } for pid=285 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 14:06:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x7fffffe, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)="bc0774f1680e0f30fa2f5abbed2a463897bc1b16b746e00eeb589f436a37c8582a462ae92da14ebcf5ac6f2e889ca4923471a581a49463e28b0cd3052b972da754df40c689ce9a7b8bb9534eca4b0a61fee3fe8932d1106e110ec94797d41c4b64f298b42bac50b60c9f5d55d746b33bc92fc03463aea1c51d7cc624f094961557ce0ccaaa2aaf385465a9b04bcfe840110ed0e62624c2ce2a36e216d6ac8907db73f1bcebd90b084d1506d6b1d6125339af8831c82d5a58d882d925a84e1c6fd7ed33a869aab81e2abdbe667b639ea1e39eb61e0cd75ed81af68e3586f5d974d6d40e5422", 0xe5}, {&(0x7f0000000300)="10570415256e75228dd7c0bccb7bd13b03a4aac64608ad6090133982a236284e013c4ad894fd2f1c34c69cafdf3a3b5ef4414bd866a9f82a07ac1b7a17c5bae623b20313144a1e47d76c55d6ac2a942533ed511b91347f0cbff5d5d28473707f5cc1756b2343a7018f9fa22b95d31988c2be2e1f07e117aa7a8ce1bbd9ca97bb03513a4d2452f29e892586b6ca93aa0056d4ae75774d3351ae42c5a2dbc44827545279c7fa08c8ec5d64b5c82ef657fba8", 0xb1}, {&(0x7f00000003c0)="ad7c37f35965fe2616e9774d94ed837508c338e7429a249b22cdbca206d69e0214de5d57558e1f6b1a2577fa45474871949e88c27fe370b92e6905aabd94e80e4a5b9d87525d71ec23372ad98aa77a1430a02fe38296a9cf86847897980a3b47997cbdc0fe014fd36259fb56d2848b", 0x6f}, {&(0x7f0000000440)="549a4274cb8b52a1fa776ac8a0913bda459e4112ab3d8f12cfe37eac4a269a173277e13f876ec6ed59d4962a3164cff26503c524aee1891bc0ab27a8f01374510ab3d8b90e7c2872cbf57d1571b8ae3929640904910b3aa40313b81d791c4a4e19ae6795a39902bad88213a294a484edaa1de5b40fb4571850a0adc50236121bdf67c254c46a363fa7d4332857a55f27b01ccb9e2a3e96c872e2b5fb70ebbab7dd35d658ef31f82657895c5d351b4a240e9ddada4f4f477383c941632b7648c81a278616c28319bceb94770b6c39062ab4df918cae1be3dea2590f664434dd339baf9623439710e605550f6dbe", 0xed}], 0x4, r1) r2 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="6ffc25721cc9dc764319d54dac5b2ada2c5f6c9df78c125ee322784fa59e8d9ddc71996c417ec62000b6c3b9988a734588bc9336bd89d9f59d68d93b9a56c910436c7877860f050764a4d278b3711e6a88e58a1b7600a5c401c48b0f1cb5d6144d8e6c3aa7102222684bfc7c14f69dee4ab83475356a51a59b9a155244bb2e1ecab721b8f8e3924b938321b5e4334a44536eacd64ef97c4582005b866e58d9269fcbd907f32a4f7d021580305ced96f841f0c9c745610aea71374ccbd1e3", 0xbe) syz_io_uring_setup(0x22d2, &(0x7f0000000580)={0x0, 0x2799, 0x0, 0x3, 0x13}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000600), &(0x7f0000000640)) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r3, 0x0) sendfile(r0, r0, 0x0, 0x5f1) openat(r0, &(0x7f0000000000)='./file1\x00', 0x426000, 0x110) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) 14:06:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x76f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(0xffffffffffffffff, 0x40047211, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syncfs(0xffffffffffffffff) 14:06:33 executing program 5: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) 14:06:33 executing program 6: kcmp$KCMP_EPOLL_TFD(0x0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) 14:06:33 executing program 7: syz_io_uring_setup(0x9, &(0x7f0000000280), &(0x7f0000ff2000/0xe000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000180001"], 0x28}}, 0x0) [ 61.688833] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 61.691917] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 61.693275] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 61.697879] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 61.701083] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 61.702544] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 61.709208] Bluetooth: hci0: HCI_REQ-0x0c1a [ 61.745068] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 61.746799] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 61.748651] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 61.749941] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 61.758877] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 61.759762] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 61.760594] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 61.762469] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 61.762629] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 61.765800] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 61.765925] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 61.768628] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 61.772793] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 61.772953] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 61.776052] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 61.777687] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 61.777775] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 61.780078] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 61.780159] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 61.786971] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 61.789945] Bluetooth: hci1: HCI_REQ-0x0c1a [ 61.792951] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 61.797453] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 61.799300] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 61.800274] Bluetooth: hci3: HCI_REQ-0x0c1a [ 61.801076] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 61.805596] Bluetooth: hci2: HCI_REQ-0x0c1a [ 61.806639] Bluetooth: hci4: HCI_REQ-0x0c1a [ 61.851562] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 61.854302] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 61.855728] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 61.860545] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 61.863016] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 61.864670] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 61.867124] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 61.873775] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 61.875294] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 61.878719] Bluetooth: hci5: HCI_REQ-0x0c1a [ 61.881763] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 61.883938] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 61.885630] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 61.889780] Bluetooth: hci7: HCI_REQ-0x0c1a [ 63.771547] Bluetooth: hci0: command 0x0409 tx timeout [ 63.831464] Bluetooth: hci2: command 0x0409 tx timeout [ 63.831776] Bluetooth: hci3: command 0x0409 tx timeout [ 63.832891] Bluetooth: hci6: Opcode 0x c03 failed: -110 [ 63.838330] Bluetooth: hci4: command 0x0409 tx timeout [ 63.895351] Bluetooth: hci7: command 0x0409 tx timeout [ 63.895464] Bluetooth: hci5: command 0x0409 tx timeout [ 63.896686] Bluetooth: hci1: command 0x0409 tx timeout [ 65.815386] Bluetooth: hci0: command 0x041b tx timeout [ 65.879509] Bluetooth: hci4: command 0x041b tx timeout [ 65.880051] Bluetooth: hci3: command 0x041b tx timeout [ 65.880525] Bluetooth: hci2: command 0x041b tx timeout [ 65.943398] Bluetooth: hci1: command 0x041b tx timeout [ 65.943917] Bluetooth: hci5: command 0x041b tx timeout [ 65.944393] Bluetooth: hci7: command 0x041b tx timeout [ 66.779588] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 66.781405] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 66.782105] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 66.784265] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 66.785384] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 66.819459] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 66.850458] Bluetooth: hci6: HCI_REQ-0x0c1a [ 67.863404] Bluetooth: hci0: command 0x040f tx timeout [ 67.927395] Bluetooth: hci2: command 0x040f tx timeout [ 67.927912] Bluetooth: hci3: command 0x040f tx timeout [ 67.929804] Bluetooth: hci4: command 0x040f tx timeout [ 67.991375] Bluetooth: hci7: command 0x040f tx timeout [ 67.991866] Bluetooth: hci5: command 0x040f tx timeout [ 67.992714] Bluetooth: hci1: command 0x040f tx timeout [ 68.887352] Bluetooth: hci6: command 0x0409 tx timeout [ 69.911376] Bluetooth: hci0: command 0x0419 tx timeout [ 69.975430] Bluetooth: hci4: command 0x0419 tx timeout [ 69.976275] Bluetooth: hci3: command 0x0419 tx timeout [ 69.977137] Bluetooth: hci2: command 0x0419 tx timeout [ 70.039392] Bluetooth: hci1: command 0x0419 tx timeout [ 70.040003] Bluetooth: hci5: command 0x0419 tx timeout [ 70.040607] Bluetooth: hci7: command 0x0419 tx timeout [ 70.935361] Bluetooth: hci6: command 0x041b tx timeout [ 72.983492] Bluetooth: hci6: command 0x040f tx timeout [ 75.031356] Bluetooth: hci6: command 0x0419 tx timeout 14:07:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{0x5}, {0x2, 0x5, 0x0, 0x1a4}]}) 14:07:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{0x5}, {0x2, 0x5, 0x0, 0x1a4}]}) [ 113.531763] audit: type=1400 audit(1662991646.639:7): avc: denied { open } for pid=3785 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 113.533274] audit: type=1400 audit(1662991646.639:8): avc: denied { kernel } for pid=3785 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 113.557905] ------------[ cut here ]------------ [ 113.557929] [ 113.557933] ====================================================== [ 113.557936] WARNING: possible circular locking dependency detected [ 113.557941] 6.0.0-rc5-next-20220912 #1 Not tainted [ 113.557948] ------------------------------------------------------ [ 113.557951] syz-executor.0/3787 is trying to acquire lock: [ 113.557958] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 113.557997] [ 113.557997] but task is already holding lock: [ 113.558000] ffff88800ea71c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 113.558027] [ 113.558027] which lock already depends on the new lock. [ 113.558027] [ 113.558031] [ 113.558031] the existing dependency chain (in reverse order) is: [ 113.558034] [ 113.558034] -> #3 (&ctx->lock){....}-{2:2}: [ 113.558048] _raw_spin_lock+0x2a/0x40 [ 113.558065] __perf_event_task_sched_out+0x53b/0x18d0 [ 113.558077] __schedule+0xedd/0x2470 [ 113.558087] schedule+0xda/0x1b0 [ 113.558096] exit_to_user_mode_prepare+0x114/0x1a0 [ 113.558117] syscall_exit_to_user_mode+0x19/0x40 [ 113.558135] do_syscall_64+0x48/0x90 [ 113.558149] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 113.558166] [ 113.558166] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 113.558180] _raw_spin_lock_nested+0x30/0x40 [ 113.558195] raw_spin_rq_lock_nested+0x1e/0x30 [ 113.558208] task_fork_fair+0x63/0x4d0 [ 113.558226] sched_cgroup_fork+0x3d0/0x540 [ 113.558240] copy_process+0x3f9e/0x6df0 [ 113.558251] kernel_clone+0xe7/0x890 [ 113.558260] user_mode_thread+0xad/0xf0 [ 113.558270] rest_init+0x24/0x250 [ 113.558287] arch_call_rest_init+0xf/0x14 [ 113.558309] start_kernel+0x4c1/0x4e6 [ 113.558326] secondary_startup_64_no_verify+0xe0/0xeb [ 113.558341] [ 113.558341] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 113.558354] _raw_spin_lock_irqsave+0x39/0x60 [ 113.558369] try_to_wake_up+0xab/0x1920 [ 113.558382] up+0x75/0xb0 [ 113.558394] __up_console_sem+0x6e/0x80 [ 113.558410] console_unlock+0x46a/0x590 [ 113.558426] vt_ioctl+0x2822/0x2ca0 [ 113.558439] tty_ioctl+0x7c4/0x1700 [ 113.558451] __x64_sys_ioctl+0x19a/0x210 [ 113.558466] do_syscall_64+0x3b/0x90 [ 113.558479] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 113.558496] [ 113.558496] -> #0 ((console_sem).lock){....}-{2:2}: [ 113.558509] __lock_acquire+0x2a02/0x5e70 [ 113.558526] lock_acquire+0x1a2/0x530 [ 113.558542] _raw_spin_lock_irqsave+0x39/0x60 [ 113.558557] down_trylock+0xe/0x70 [ 113.558569] __down_trylock_console_sem+0x3b/0xd0 [ 113.558586] vprintk_emit+0x16b/0x560 [ 113.558603] vprintk+0x84/0xa0 [ 113.558619] _printk+0xba/0xf1 [ 113.558637] report_bug.cold+0x72/0xab [ 113.558649] handle_bug+0x3c/0x70 [ 113.558662] exc_invalid_op+0x14/0x50 [ 113.558675] asm_exc_invalid_op+0x16/0x20 [ 113.558691] group_sched_out.part.0+0x2c7/0x460 [ 113.558702] ctx_sched_out+0x8f1/0xc10 [ 113.558711] __perf_event_task_sched_out+0x6d0/0x18d0 [ 113.558723] __schedule+0xedd/0x2470 [ 113.558733] schedule+0xda/0x1b0 [ 113.558742] exit_to_user_mode_prepare+0x114/0x1a0 [ 113.558761] syscall_exit_to_user_mode+0x19/0x40 [ 113.558778] do_syscall_64+0x48/0x90 [ 113.558791] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 113.558808] [ 113.558808] other info that might help us debug this: [ 113.558808] [ 113.558810] Chain exists of: [ 113.558810] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 113.558810] [ 113.558825] Possible unsafe locking scenario: [ 113.558825] [ 113.558828] CPU0 CPU1 [ 113.558830] ---- ---- [ 113.558832] lock(&ctx->lock); [ 113.558838] lock(&rq->__lock); [ 113.558845] lock(&ctx->lock); [ 113.558851] lock((console_sem).lock); [ 113.558857] [ 113.558857] *** DEADLOCK *** [ 113.558857] [ 113.558859] 2 locks held by syz-executor.0/3787: [ 113.558866] #0: ffff88806ce37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 113.558891] #1: ffff88800ea71c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 113.558918] [ 113.558918] stack backtrace: [ 113.558921] CPU: 0 PID: 3787 Comm: syz-executor.0 Not tainted 6.0.0-rc5-next-20220912 #1 [ 113.558934] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 113.558942] Call Trace: [ 113.558946] [ 113.558950] dump_stack_lvl+0x8b/0xb3 [ 113.558965] check_noncircular+0x263/0x2e0 [ 113.558982] ? format_decode+0x26c/0xb50 [ 113.558998] ? print_circular_bug+0x450/0x450 [ 113.559015] ? enable_ptr_key_workfn+0x20/0x20 [ 113.559030] ? format_decode+0x26c/0xb50 [ 113.559046] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 113.559065] __lock_acquire+0x2a02/0x5e70 [ 113.559089] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 113.559108] ? __mutex_add_waiter+0x120/0x120 [ 113.559128] lock_acquire+0x1a2/0x530 [ 113.559145] ? down_trylock+0xe/0x70 [ 113.559160] ? rcu_read_unlock+0x40/0x40 [ 113.559183] ? vprintk+0x84/0xa0 [ 113.559202] _raw_spin_lock_irqsave+0x39/0x60 [ 113.559217] ? down_trylock+0xe/0x70 [ 113.559231] down_trylock+0xe/0x70 [ 113.559245] ? vprintk+0x84/0xa0 [ 113.559262] __down_trylock_console_sem+0x3b/0xd0 [ 113.559280] vprintk_emit+0x16b/0x560 [ 113.559300] vprintk+0x84/0xa0 [ 113.559319] _printk+0xba/0xf1 [ 113.559337] ? record_print_text.cold+0x16/0x16 [ 113.559360] ? report_bug.cold+0x66/0xab [ 113.559374] ? group_sched_out.part.0+0x2c7/0x460 [ 113.559386] report_bug.cold+0x72/0xab [ 113.559401] handle_bug+0x3c/0x70 [ 113.559415] exc_invalid_op+0x14/0x50 [ 113.559430] asm_exc_invalid_op+0x16/0x20 [ 113.559447] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 113.559460] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 113.559472] RSP: 0018:ffff88803e727c48 EFLAGS: 00010006 [ 113.559482] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 113.559489] RDX: ffff88801ddbd040 RSI: ffffffff81566027 RDI: 0000000000000005 [ 113.559497] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 113.559505] R10: 0000000000000000 R11: ffffffff865aa01b R12: ffff88800ea71c00 [ 113.559513] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 113.559525] ? group_sched_out.part.0+0x2c7/0x460 [ 113.559538] ? group_sched_out.part.0+0x2c7/0x460 [ 113.559552] ctx_sched_out+0x8f1/0xc10 [ 113.559565] __perf_event_task_sched_out+0x6d0/0x18d0 [ 113.559581] ? lock_is_held_type+0xd7/0x130 [ 113.559601] ? __perf_cgroup_move+0x160/0x160 [ 113.559612] ? set_next_entity+0x304/0x550 [ 113.559631] ? update_curr+0x267/0x740 [ 113.559650] ? lock_is_held_type+0xd7/0x130 [ 113.559669] __schedule+0xedd/0x2470 [ 113.559683] ? io_schedule_timeout+0x150/0x150 [ 113.559696] ? __x64_sys_futex_time32+0x480/0x480 [ 113.559711] schedule+0xda/0x1b0 [ 113.559722] exit_to_user_mode_prepare+0x114/0x1a0 [ 113.559743] syscall_exit_to_user_mode+0x19/0x40 [ 113.559761] do_syscall_64+0x48/0x90 [ 113.559775] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 113.559793] RIP: 0033:0x7f30810b2b19 [ 113.559801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 113.559812] RSP: 002b:00007f307e628218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 113.559823] RAX: 0000000000000001 RBX: 00007f30811c5f68 RCX: 00007f30810b2b19 [ 113.559831] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f30811c5f6c [ 113.559838] RBP: 00007f30811c5f60 R08: 000000000000000e R09: 0000000000000000 [ 113.559846] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f30811c5f6c [ 113.559853] R13: 00007ffe3b1a443f R14: 00007f307e628300 R15: 0000000000022000 [ 113.559868] [ 113.616180] WARNING: CPU: 0 PID: 3787 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 113.616877] Modules linked in: [ 113.617123] CPU: 0 PID: 3787 Comm: syz-executor.0 Not tainted 6.0.0-rc5-next-20220912 #1 [ 113.617737] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 113.618584] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 113.618996] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 113.620321] RSP: 0018:ffff88803e727c48 EFLAGS: 00010006 [ 113.620705] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 113.621213] RDX: ffff88801ddbd040 RSI: ffffffff81566027 RDI: 0000000000000005 [ 113.621721] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 113.622221] R10: 0000000000000000 R11: ffffffff865aa01b R12: ffff88800ea71c00 [ 113.622727] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 113.623228] FS: 00007f307e628700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 113.623800] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 113.624218] CR2: 00007f65e28c86f4 CR3: 000000001f4b8000 CR4: 0000000000350ef0 [ 113.624748] Call Trace: [ 113.624948] [ 113.625128] ctx_sched_out+0x8f1/0xc10 [ 113.625438] __perf_event_task_sched_out+0x6d0/0x18d0 [ 113.625837] ? lock_is_held_type+0xd7/0x130 [ 113.626180] ? __perf_cgroup_move+0x160/0x160 [ 113.626518] ? set_next_entity+0x304/0x550 [ 113.626847] ? update_curr+0x267/0x740 [ 113.627155] ? lock_is_held_type+0xd7/0x130 [ 113.627494] __schedule+0xedd/0x2470 [ 113.627778] ? io_schedule_timeout+0x150/0x150 [ 113.628138] ? __x64_sys_futex_time32+0x480/0x480 [ 113.628524] schedule+0xda/0x1b0 [ 113.628791] exit_to_user_mode_prepare+0x114/0x1a0 [ 113.629180] syscall_exit_to_user_mode+0x19/0x40 [ 113.629554] do_syscall_64+0x48/0x90 [ 113.629839] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 113.630240] RIP: 0033:0x7f30810b2b19 [ 113.630528] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 113.631916] RSP: 002b:00007f307e628218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 113.632509] RAX: 0000000000000001 RBX: 00007f30811c5f68 RCX: 00007f30810b2b19 [ 113.633056] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f30811c5f6c [ 113.633600] RBP: 00007f30811c5f60 R08: 000000000000000e R09: 0000000000000000 [ 113.634139] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f30811c5f6c [ 113.634681] R13: 00007ffe3b1a443f R14: 00007f307e628300 R15: 0000000000022000 [ 113.635232] [ 113.635413] irq event stamp: 606 [ 113.635667] hardirqs last enabled at (605): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 113.636398] hardirqs last disabled at (606): [] __schedule+0x1225/0x2470 [ 113.637019] softirqs last enabled at (404): [] __irq_exit_rcu+0x11b/0x180 [ 113.637641] softirqs last disabled at (393): [] __irq_exit_rcu+0x11b/0x180 [ 113.638256] ---[ end trace 0000000000000000 ]--- 14:07:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{0x5}, {0x2, 0x5, 0x0, 0x1a4}]}) 14:07:26 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000080)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0102}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000040), 0x14) open_tree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000000c0), 0x45d, 0x0) [ 114.171326] hrtimer: interrupt took 18004 ns [ 114.399549] audit: type=1400 audit(1662991647.506:9): avc: denied { write } for pid=3834 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 114.497140] syz-executor.3 (3836) used greatest stack depth: 24408 bytes left 14:07:30 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000200)={0x0, 0x3}, 0x4) close_range(r0, 0xffffffffffffffff, 0x0) 14:07:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x7fffffe, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)="bc0774f1680e0f30fa2f5abbed2a463897bc1b16b746e00eeb589f436a37c8582a462ae92da14ebcf5ac6f2e889ca4923471a581a49463e28b0cd3052b972da754df40c689ce9a7b8bb9534eca4b0a61fee3fe8932d1106e110ec94797d41c4b64f298b42bac50b60c9f5d55d746b33bc92fc03463aea1c51d7cc624f094961557ce0ccaaa2aaf385465a9b04bcfe840110ed0e62624c2ce2a36e216d6ac8907db73f1bcebd90b084d1506d6b1d6125339af8831c82d5a58d882d925a84e1c6fd7ed33a869aab81e2abdbe667b639ea1e39eb61e0cd75ed81af68e3586f5d974d6d40e5422", 0xe5}, {&(0x7f0000000300)="10570415256e75228dd7c0bccb7bd13b03a4aac64608ad6090133982a236284e013c4ad894fd2f1c34c69cafdf3a3b5ef4414bd866a9f82a07ac1b7a17c5bae623b20313144a1e47d76c55d6ac2a942533ed511b91347f0cbff5d5d28473707f5cc1756b2343a7018f9fa22b95d31988c2be2e1f07e117aa7a8ce1bbd9ca97bb03513a4d2452f29e892586b6ca93aa0056d4ae75774d3351ae42c5a2dbc44827545279c7fa08c8ec5d64b5c82ef657fba8", 0xb1}, {&(0x7f00000003c0)="ad7c37f35965fe2616e9774d94ed837508c338e7429a249b22cdbca206d69e0214de5d57558e1f6b1a2577fa45474871949e88c27fe370b92e6905aabd94e80e4a5b9d87525d71ec23372ad98aa77a1430a02fe38296a9cf86847897980a3b47997cbdc0fe014fd36259fb56d2848b", 0x6f}, {&(0x7f0000000440)="549a4274cb8b52a1fa776ac8a0913bda459e4112ab3d8f12cfe37eac4a269a173277e13f876ec6ed59d4962a3164cff26503c524aee1891bc0ab27a8f01374510ab3d8b90e7c2872cbf57d1571b8ae3929640904910b3aa40313b81d791c4a4e19ae6795a39902bad88213a294a484edaa1de5b40fb4571850a0adc50236121bdf67c254c46a363fa7d4332857a55f27b01ccb9e2a3e96c872e2b5fb70ebbab7dd35d658ef31f82657895c5d351b4a240e9ddada4f4f477383c941632b7648c81a278616c28319bceb94770b6c39062ab4df918cae1be3dea2590f664434dd339baf9623439710e605550f6dbe", 0xed}], 0x4, r1) r2 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="6ffc25721cc9dc764319d54dac5b2ada2c5f6c9df78c125ee322784fa59e8d9ddc71996c417ec62000b6c3b9988a734588bc9336bd89d9f59d68d93b9a56c910436c7877860f050764a4d278b3711e6a88e58a1b7600a5c401c48b0f1cb5d6144d8e6c3aa7102222684bfc7c14f69dee4ab83475356a51a59b9a155244bb2e1ecab721b8f8e3924b938321b5e4334a44536eacd64ef97c4582005b866e58d9269fcbd907f32a4f7d021580305ced96f841f0c9c745610aea71374ccbd1e3", 0xbe) syz_io_uring_setup(0x22d2, &(0x7f0000000580)={0x0, 0x2799, 0x0, 0x3, 0x13}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000600), &(0x7f0000000640)) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r3, 0x0) sendfile(r0, r0, 0x0, 0x5f1) openat(r0, &(0x7f0000000000)='./file1\x00', 0x426000, 0x110) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) 14:07:30 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000080)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0102}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000040), 0x14) open_tree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000000c0), 0x45d, 0x0) 14:07:30 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x76f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(0xffffffffffffffff, 0x40047211, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syncfs(0xffffffffffffffff) 14:07:30 executing program 7: syz_io_uring_setup(0x9, &(0x7f0000000280), &(0x7f0000ff2000/0xe000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000180001"], 0x28}}, 0x0) 14:07:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_mempolicy(0x0, 0x0, 0x80000000, &(0x7f0000ffc000/0x4000)=nil, 0x3) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3) 14:07:30 executing program 5: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) 14:07:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x7fffffe, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)="bc0774f1680e0f30fa2f5abbed2a463897bc1b16b746e00eeb589f436a37c8582a462ae92da14ebcf5ac6f2e889ca4923471a581a49463e28b0cd3052b972da754df40c689ce9a7b8bb9534eca4b0a61fee3fe8932d1106e110ec94797d41c4b64f298b42bac50b60c9f5d55d746b33bc92fc03463aea1c51d7cc624f094961557ce0ccaaa2aaf385465a9b04bcfe840110ed0e62624c2ce2a36e216d6ac8907db73f1bcebd90b084d1506d6b1d6125339af8831c82d5a58d882d925a84e1c6fd7ed33a869aab81e2abdbe667b639ea1e39eb61e0cd75ed81af68e3586f5d974d6d40e5422", 0xe5}, {&(0x7f0000000300)="10570415256e75228dd7c0bccb7bd13b03a4aac64608ad6090133982a236284e013c4ad894fd2f1c34c69cafdf3a3b5ef4414bd866a9f82a07ac1b7a17c5bae623b20313144a1e47d76c55d6ac2a942533ed511b91347f0cbff5d5d28473707f5cc1756b2343a7018f9fa22b95d31988c2be2e1f07e117aa7a8ce1bbd9ca97bb03513a4d2452f29e892586b6ca93aa0056d4ae75774d3351ae42c5a2dbc44827545279c7fa08c8ec5d64b5c82ef657fba8", 0xb1}, {&(0x7f00000003c0)="ad7c37f35965fe2616e9774d94ed837508c338e7429a249b22cdbca206d69e0214de5d57558e1f6b1a2577fa45474871949e88c27fe370b92e6905aabd94e80e4a5b9d87525d71ec23372ad98aa77a1430a02fe38296a9cf86847897980a3b47997cbdc0fe014fd36259fb56d2848b", 0x6f}, {&(0x7f0000000440)="549a4274cb8b52a1fa776ac8a0913bda459e4112ab3d8f12cfe37eac4a269a173277e13f876ec6ed59d4962a3164cff26503c524aee1891bc0ab27a8f01374510ab3d8b90e7c2872cbf57d1571b8ae3929640904910b3aa40313b81d791c4a4e19ae6795a39902bad88213a294a484edaa1de5b40fb4571850a0adc50236121bdf67c254c46a363fa7d4332857a55f27b01ccb9e2a3e96c872e2b5fb70ebbab7dd35d658ef31f82657895c5d351b4a240e9ddada4f4f477383c941632b7648c81a278616c28319bceb94770b6c39062ab4df918cae1be3dea2590f664434dd339baf9623439710e605550f6dbe", 0xed}], 0x4, r1) r2 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="6ffc25721cc9dc764319d54dac5b2ada2c5f6c9df78c125ee322784fa59e8d9ddc71996c417ec62000b6c3b9988a734588bc9336bd89d9f59d68d93b9a56c910436c7877860f050764a4d278b3711e6a88e58a1b7600a5c401c48b0f1cb5d6144d8e6c3aa7102222684bfc7c14f69dee4ab83475356a51a59b9a155244bb2e1ecab721b8f8e3924b938321b5e4334a44536eacd64ef97c4582005b866e58d9269fcbd907f32a4f7d021580305ced96f841f0c9c745610aea71374ccbd1e3", 0xbe) syz_io_uring_setup(0x22d2, &(0x7f0000000580)={0x0, 0x2799, 0x0, 0x3, 0x13}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000600), &(0x7f0000000640)) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r3, 0x0) sendfile(r0, r0, 0x0, 0x5f1) openat(r0, &(0x7f0000000000)='./file1\x00', 0x426000, 0x110) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) 14:07:30 executing program 7: syz_io_uring_setup(0x9, &(0x7f0000000280), &(0x7f0000ff2000/0xe000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000180001"], 0x28}}, 0x0) 14:07:30 executing program 5: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) 14:07:30 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000200)={0x0, 0x3}, 0x4) close_range(r0, 0xffffffffffffffff, 0x0) 14:07:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x7fffffe, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)="bc0774f1680e0f30fa2f5abbed2a463897bc1b16b746e00eeb589f436a37c8582a462ae92da14ebcf5ac6f2e889ca4923471a581a49463e28b0cd3052b972da754df40c689ce9a7b8bb9534eca4b0a61fee3fe8932d1106e110ec94797d41c4b64f298b42bac50b60c9f5d55d746b33bc92fc03463aea1c51d7cc624f094961557ce0ccaaa2aaf385465a9b04bcfe840110ed0e62624c2ce2a36e216d6ac8907db73f1bcebd90b084d1506d6b1d6125339af8831c82d5a58d882d925a84e1c6fd7ed33a869aab81e2abdbe667b639ea1e39eb61e0cd75ed81af68e3586f5d974d6d40e5422", 0xe5}, {&(0x7f0000000300)="10570415256e75228dd7c0bccb7bd13b03a4aac64608ad6090133982a236284e013c4ad894fd2f1c34c69cafdf3a3b5ef4414bd866a9f82a07ac1b7a17c5bae623b20313144a1e47d76c55d6ac2a942533ed511b91347f0cbff5d5d28473707f5cc1756b2343a7018f9fa22b95d31988c2be2e1f07e117aa7a8ce1bbd9ca97bb03513a4d2452f29e892586b6ca93aa0056d4ae75774d3351ae42c5a2dbc44827545279c7fa08c8ec5d64b5c82ef657fba8", 0xb1}, {&(0x7f00000003c0)="ad7c37f35965fe2616e9774d94ed837508c338e7429a249b22cdbca206d69e0214de5d57558e1f6b1a2577fa45474871949e88c27fe370b92e6905aabd94e80e4a5b9d87525d71ec23372ad98aa77a1430a02fe38296a9cf86847897980a3b47997cbdc0fe014fd36259fb56d2848b", 0x6f}, {&(0x7f0000000440)="549a4274cb8b52a1fa776ac8a0913bda459e4112ab3d8f12cfe37eac4a269a173277e13f876ec6ed59d4962a3164cff26503c524aee1891bc0ab27a8f01374510ab3d8b90e7c2872cbf57d1571b8ae3929640904910b3aa40313b81d791c4a4e19ae6795a39902bad88213a294a484edaa1de5b40fb4571850a0adc50236121bdf67c254c46a363fa7d4332857a55f27b01ccb9e2a3e96c872e2b5fb70ebbab7dd35d658ef31f82657895c5d351b4a240e9ddada4f4f477383c941632b7648c81a278616c28319bceb94770b6c39062ab4df918cae1be3dea2590f664434dd339baf9623439710e605550f6dbe", 0xed}], 0x4, r1) r2 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="6ffc25721cc9dc764319d54dac5b2ada2c5f6c9df78c125ee322784fa59e8d9ddc71996c417ec62000b6c3b9988a734588bc9336bd89d9f59d68d93b9a56c910436c7877860f050764a4d278b3711e6a88e58a1b7600a5c401c48b0f1cb5d6144d8e6c3aa7102222684bfc7c14f69dee4ab83475356a51a59b9a155244bb2e1ecab721b8f8e3924b938321b5e4334a44536eacd64ef97c4582005b866e58d9269fcbd907f32a4f7d021580305ced96f841f0c9c745610aea71374ccbd1e3", 0xbe) syz_io_uring_setup(0x22d2, &(0x7f0000000580)={0x0, 0x2799, 0x0, 0x3, 0x13}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000600), &(0x7f0000000640)) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r3, 0x0) sendfile(r0, r0, 0x0, 0x5f1) openat(r0, &(0x7f0000000000)='./file1\x00', 0x426000, 0x110) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) 14:07:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_mempolicy(0x0, 0x0, 0x80000000, &(0x7f0000ffc000/0x4000)=nil, 0x3) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3) [ 117.476182] syz-executor.3 (3971) used greatest stack depth: 24280 bytes left 14:07:31 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x76f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(0xffffffffffffffff, 0x40047211, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syncfs(0xffffffffffffffff) 14:07:31 executing program 7: syz_io_uring_setup(0x9, &(0x7f0000000280), &(0x7f0000ff2000/0xe000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000180001"], 0x28}}, 0x0) 14:07:31 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000200)={0x0, 0x3}, 0x4) close_range(r0, 0xffffffffffffffff, 0x0) 14:07:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x7fffffe, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)="bc0774f1680e0f30fa2f5abbed2a463897bc1b16b746e00eeb589f436a37c8582a462ae92da14ebcf5ac6f2e889ca4923471a581a49463e28b0cd3052b972da754df40c689ce9a7b8bb9534eca4b0a61fee3fe8932d1106e110ec94797d41c4b64f298b42bac50b60c9f5d55d746b33bc92fc03463aea1c51d7cc624f094961557ce0ccaaa2aaf385465a9b04bcfe840110ed0e62624c2ce2a36e216d6ac8907db73f1bcebd90b084d1506d6b1d6125339af8831c82d5a58d882d925a84e1c6fd7ed33a869aab81e2abdbe667b639ea1e39eb61e0cd75ed81af68e3586f5d974d6d40e5422", 0xe5}, {&(0x7f0000000300)="10570415256e75228dd7c0bccb7bd13b03a4aac64608ad6090133982a236284e013c4ad894fd2f1c34c69cafdf3a3b5ef4414bd866a9f82a07ac1b7a17c5bae623b20313144a1e47d76c55d6ac2a942533ed511b91347f0cbff5d5d28473707f5cc1756b2343a7018f9fa22b95d31988c2be2e1f07e117aa7a8ce1bbd9ca97bb03513a4d2452f29e892586b6ca93aa0056d4ae75774d3351ae42c5a2dbc44827545279c7fa08c8ec5d64b5c82ef657fba8", 0xb1}, {&(0x7f00000003c0)="ad7c37f35965fe2616e9774d94ed837508c338e7429a249b22cdbca206d69e0214de5d57558e1f6b1a2577fa45474871949e88c27fe370b92e6905aabd94e80e4a5b9d87525d71ec23372ad98aa77a1430a02fe38296a9cf86847897980a3b47997cbdc0fe014fd36259fb56d2848b", 0x6f}, {&(0x7f0000000440)="549a4274cb8b52a1fa776ac8a0913bda459e4112ab3d8f12cfe37eac4a269a173277e13f876ec6ed59d4962a3164cff26503c524aee1891bc0ab27a8f01374510ab3d8b90e7c2872cbf57d1571b8ae3929640904910b3aa40313b81d791c4a4e19ae6795a39902bad88213a294a484edaa1de5b40fb4571850a0adc50236121bdf67c254c46a363fa7d4332857a55f27b01ccb9e2a3e96c872e2b5fb70ebbab7dd35d658ef31f82657895c5d351b4a240e9ddada4f4f477383c941632b7648c81a278616c28319bceb94770b6c39062ab4df918cae1be3dea2590f664434dd339baf9623439710e605550f6dbe", 0xed}], 0x4, r1) r2 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="6ffc25721cc9dc764319d54dac5b2ada2c5f6c9df78c125ee322784fa59e8d9ddc71996c417ec62000b6c3b9988a734588bc9336bd89d9f59d68d93b9a56c910436c7877860f050764a4d278b3711e6a88e58a1b7600a5c401c48b0f1cb5d6144d8e6c3aa7102222684bfc7c14f69dee4ab83475356a51a59b9a155244bb2e1ecab721b8f8e3924b938321b5e4334a44536eacd64ef97c4582005b866e58d9269fcbd907f32a4f7d021580305ced96f841f0c9c745610aea71374ccbd1e3", 0xbe) syz_io_uring_setup(0x22d2, &(0x7f0000000580)={0x0, 0x2799, 0x0, 0x3, 0x13}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000600), &(0x7f0000000640)) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r3, 0x0) sendfile(r0, r0, 0x0, 0x5f1) openat(r0, &(0x7f0000000000)='./file1\x00', 0x426000, 0x110) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) 14:07:31 executing program 5: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) 14:07:31 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_mempolicy(0x0, 0x0, 0x80000000, &(0x7f0000ffc000/0x4000)=nil, 0x3) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3) 14:07:31 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000080)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0102}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000040), 0x14) open_tree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000000c0), 0x45d, 0x0) 14:07:31 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x7fffffe, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)="bc0774f1680e0f30fa2f5abbed2a463897bc1b16b746e00eeb589f436a37c8582a462ae92da14ebcf5ac6f2e889ca4923471a581a49463e28b0cd3052b972da754df40c689ce9a7b8bb9534eca4b0a61fee3fe8932d1106e110ec94797d41c4b64f298b42bac50b60c9f5d55d746b33bc92fc03463aea1c51d7cc624f094961557ce0ccaaa2aaf385465a9b04bcfe840110ed0e62624c2ce2a36e216d6ac8907db73f1bcebd90b084d1506d6b1d6125339af8831c82d5a58d882d925a84e1c6fd7ed33a869aab81e2abdbe667b639ea1e39eb61e0cd75ed81af68e3586f5d974d6d40e5422", 0xe5}, {&(0x7f0000000300)="10570415256e75228dd7c0bccb7bd13b03a4aac64608ad6090133982a236284e013c4ad894fd2f1c34c69cafdf3a3b5ef4414bd866a9f82a07ac1b7a17c5bae623b20313144a1e47d76c55d6ac2a942533ed511b91347f0cbff5d5d28473707f5cc1756b2343a7018f9fa22b95d31988c2be2e1f07e117aa7a8ce1bbd9ca97bb03513a4d2452f29e892586b6ca93aa0056d4ae75774d3351ae42c5a2dbc44827545279c7fa08c8ec5d64b5c82ef657fba8", 0xb1}, {&(0x7f00000003c0)="ad7c37f35965fe2616e9774d94ed837508c338e7429a249b22cdbca206d69e0214de5d57558e1f6b1a2577fa45474871949e88c27fe370b92e6905aabd94e80e4a5b9d87525d71ec23372ad98aa77a1430a02fe38296a9cf86847897980a3b47997cbdc0fe014fd36259fb56d2848b", 0x6f}, {&(0x7f0000000440)="549a4274cb8b52a1fa776ac8a0913bda459e4112ab3d8f12cfe37eac4a269a173277e13f876ec6ed59d4962a3164cff26503c524aee1891bc0ab27a8f01374510ab3d8b90e7c2872cbf57d1571b8ae3929640904910b3aa40313b81d791c4a4e19ae6795a39902bad88213a294a484edaa1de5b40fb4571850a0adc50236121bdf67c254c46a363fa7d4332857a55f27b01ccb9e2a3e96c872e2b5fb70ebbab7dd35d658ef31f82657895c5d351b4a240e9ddada4f4f477383c941632b7648c81a278616c28319bceb94770b6c39062ab4df918cae1be3dea2590f664434dd339baf9623439710e605550f6dbe", 0xed}], 0x4, r1) r2 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="6ffc25721cc9dc764319d54dac5b2ada2c5f6c9df78c125ee322784fa59e8d9ddc71996c417ec62000b6c3b9988a734588bc9336bd89d9f59d68d93b9a56c910436c7877860f050764a4d278b3711e6a88e58a1b7600a5c401c48b0f1cb5d6144d8e6c3aa7102222684bfc7c14f69dee4ab83475356a51a59b9a155244bb2e1ecab721b8f8e3924b938321b5e4334a44536eacd64ef97c4582005b866e58d9269fcbd907f32a4f7d021580305ced96f841f0c9c745610aea71374ccbd1e3", 0xbe) syz_io_uring_setup(0x22d2, &(0x7f0000000580)={0x0, 0x2799, 0x0, 0x3, 0x13}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000600), &(0x7f0000000640)) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r3, 0x0) sendfile(r0, r0, 0x0, 0x5f1) openat(r0, &(0x7f0000000000)='./file1\x00', 0x426000, 0x110) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) 14:07:31 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000200)={0x0, 0x3}, 0x4) close_range(r0, 0xffffffffffffffff, 0x0) 14:07:31 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x76f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(0xffffffffffffffff, 0x40047211, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syncfs(0xffffffffffffffff) 14:07:31 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000200)={0x0, 0x3}, 0x4) close_range(r0, 0xffffffffffffffff, 0x0) 14:07:31 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_mempolicy(0x0, 0x0, 0x80000000, &(0x7f0000ffc000/0x4000)=nil, 0x3) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3) 14:07:31 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x76f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(0xffffffffffffffff, 0x40047211, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syncfs(0xffffffffffffffff) 14:07:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x7fffffe, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)="bc0774f1680e0f30fa2f5abbed2a463897bc1b16b746e00eeb589f436a37c8582a462ae92da14ebcf5ac6f2e889ca4923471a581a49463e28b0cd3052b972da754df40c689ce9a7b8bb9534eca4b0a61fee3fe8932d1106e110ec94797d41c4b64f298b42bac50b60c9f5d55d746b33bc92fc03463aea1c51d7cc624f094961557ce0ccaaa2aaf385465a9b04bcfe840110ed0e62624c2ce2a36e216d6ac8907db73f1bcebd90b084d1506d6b1d6125339af8831c82d5a58d882d925a84e1c6fd7ed33a869aab81e2abdbe667b639ea1e39eb61e0cd75ed81af68e3586f5d974d6d40e5422", 0xe5}, {&(0x7f0000000300)="10570415256e75228dd7c0bccb7bd13b03a4aac64608ad6090133982a236284e013c4ad894fd2f1c34c69cafdf3a3b5ef4414bd866a9f82a07ac1b7a17c5bae623b20313144a1e47d76c55d6ac2a942533ed511b91347f0cbff5d5d28473707f5cc1756b2343a7018f9fa22b95d31988c2be2e1f07e117aa7a8ce1bbd9ca97bb03513a4d2452f29e892586b6ca93aa0056d4ae75774d3351ae42c5a2dbc44827545279c7fa08c8ec5d64b5c82ef657fba8", 0xb1}, {&(0x7f00000003c0)="ad7c37f35965fe2616e9774d94ed837508c338e7429a249b22cdbca206d69e0214de5d57558e1f6b1a2577fa45474871949e88c27fe370b92e6905aabd94e80e4a5b9d87525d71ec23372ad98aa77a1430a02fe38296a9cf86847897980a3b47997cbdc0fe014fd36259fb56d2848b", 0x6f}, {&(0x7f0000000440)="549a4274cb8b52a1fa776ac8a0913bda459e4112ab3d8f12cfe37eac4a269a173277e13f876ec6ed59d4962a3164cff26503c524aee1891bc0ab27a8f01374510ab3d8b90e7c2872cbf57d1571b8ae3929640904910b3aa40313b81d791c4a4e19ae6795a39902bad88213a294a484edaa1de5b40fb4571850a0adc50236121bdf67c254c46a363fa7d4332857a55f27b01ccb9e2a3e96c872e2b5fb70ebbab7dd35d658ef31f82657895c5d351b4a240e9ddada4f4f477383c941632b7648c81a278616c28319bceb94770b6c39062ab4df918cae1be3dea2590f664434dd339baf9623439710e605550f6dbe", 0xed}], 0x4, r1) r2 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="6ffc25721cc9dc764319d54dac5b2ada2c5f6c9df78c125ee322784fa59e8d9ddc71996c417ec62000b6c3b9988a734588bc9336bd89d9f59d68d93b9a56c910436c7877860f050764a4d278b3711e6a88e58a1b7600a5c401c48b0f1cb5d6144d8e6c3aa7102222684bfc7c14f69dee4ab83475356a51a59b9a155244bb2e1ecab721b8f8e3924b938321b5e4334a44536eacd64ef97c4582005b866e58d9269fcbd907f32a4f7d021580305ced96f841f0c9c745610aea71374ccbd1e3", 0xbe) syz_io_uring_setup(0x22d2, &(0x7f0000000580)={0x0, 0x2799, 0x0, 0x3, 0x13}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000600), &(0x7f0000000640)) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r3, 0x0) sendfile(r0, r0, 0x0, 0x5f1) openat(r0, &(0x7f0000000000)='./file1\x00', 0x426000, 0x110) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) 14:07:31 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x76f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(0xffffffffffffffff, 0x40047211, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syncfs(0xffffffffffffffff) 14:07:31 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000200)={0x0, 0x3}, 0x4) close_range(r0, 0xffffffffffffffff, 0x0) 14:07:31 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000200)={0x0, 0x3}, 0x4) close_range(r0, 0xffffffffffffffff, 0x0) 14:07:31 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_mempolicy(0x0, 0x0, 0x80000000, &(0x7f0000ffc000/0x4000)=nil, 0x3) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3) 14:07:31 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x76f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(0xffffffffffffffff, 0x40047211, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syncfs(0xffffffffffffffff) 14:07:31 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000080)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0102}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000040), 0x14) open_tree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000000c0), 0x45d, 0x0) 14:07:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x7fffffe, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)="bc0774f1680e0f30fa2f5abbed2a463897bc1b16b746e00eeb589f436a37c8582a462ae92da14ebcf5ac6f2e889ca4923471a581a49463e28b0cd3052b972da754df40c689ce9a7b8bb9534eca4b0a61fee3fe8932d1106e110ec94797d41c4b64f298b42bac50b60c9f5d55d746b33bc92fc03463aea1c51d7cc624f094961557ce0ccaaa2aaf385465a9b04bcfe840110ed0e62624c2ce2a36e216d6ac8907db73f1bcebd90b084d1506d6b1d6125339af8831c82d5a58d882d925a84e1c6fd7ed33a869aab81e2abdbe667b639ea1e39eb61e0cd75ed81af68e3586f5d974d6d40e5422", 0xe5}, {&(0x7f0000000300)="10570415256e75228dd7c0bccb7bd13b03a4aac64608ad6090133982a236284e013c4ad894fd2f1c34c69cafdf3a3b5ef4414bd866a9f82a07ac1b7a17c5bae623b20313144a1e47d76c55d6ac2a942533ed511b91347f0cbff5d5d28473707f5cc1756b2343a7018f9fa22b95d31988c2be2e1f07e117aa7a8ce1bbd9ca97bb03513a4d2452f29e892586b6ca93aa0056d4ae75774d3351ae42c5a2dbc44827545279c7fa08c8ec5d64b5c82ef657fba8", 0xb1}, {&(0x7f00000003c0)="ad7c37f35965fe2616e9774d94ed837508c338e7429a249b22cdbca206d69e0214de5d57558e1f6b1a2577fa45474871949e88c27fe370b92e6905aabd94e80e4a5b9d87525d71ec23372ad98aa77a1430a02fe38296a9cf86847897980a3b47997cbdc0fe014fd36259fb56d2848b", 0x6f}, {&(0x7f0000000440)="549a4274cb8b52a1fa776ac8a0913bda459e4112ab3d8f12cfe37eac4a269a173277e13f876ec6ed59d4962a3164cff26503c524aee1891bc0ab27a8f01374510ab3d8b90e7c2872cbf57d1571b8ae3929640904910b3aa40313b81d791c4a4e19ae6795a39902bad88213a294a484edaa1de5b40fb4571850a0adc50236121bdf67c254c46a363fa7d4332857a55f27b01ccb9e2a3e96c872e2b5fb70ebbab7dd35d658ef31f82657895c5d351b4a240e9ddada4f4f477383c941632b7648c81a278616c28319bceb94770b6c39062ab4df918cae1be3dea2590f664434dd339baf9623439710e605550f6dbe", 0xed}], 0x4, r1) r2 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="6ffc25721cc9dc764319d54dac5b2ada2c5f6c9df78c125ee322784fa59e8d9ddc71996c417ec62000b6c3b9988a734588bc9336bd89d9f59d68d93b9a56c910436c7877860f050764a4d278b3711e6a88e58a1b7600a5c401c48b0f1cb5d6144d8e6c3aa7102222684bfc7c14f69dee4ab83475356a51a59b9a155244bb2e1ecab721b8f8e3924b938321b5e4334a44536eacd64ef97c4582005b866e58d9269fcbd907f32a4f7d021580305ced96f841f0c9c745610aea71374ccbd1e3", 0xbe) syz_io_uring_setup(0x22d2, &(0x7f0000000580)={0x0, 0x2799, 0x0, 0x3, 0x13}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000600), &(0x7f0000000640)) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r3, 0x0) sendfile(r0, r0, 0x0, 0x5f1) openat(r0, &(0x7f0000000000)='./file1\x00', 0x426000, 0x110) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) 14:07:31 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000200)={0x0, 0x3}, 0x4) close_range(r0, 0xffffffffffffffff, 0x0) 14:07:31 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x76f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(0xffffffffffffffff, 0x40047211, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syncfs(0xffffffffffffffff) 14:07:31 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_mempolicy(0x0, 0x0, 0x80000000, &(0x7f0000ffc000/0x4000)=nil, 0x3) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3) 14:07:31 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x76f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(0xffffffffffffffff, 0x40047211, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syncfs(0xffffffffffffffff) 14:07:31 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000200)={0x0, 0x3}, 0x4) close_range(r0, 0xffffffffffffffff, 0x0) 14:07:32 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x76f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(0xffffffffffffffff, 0x40047211, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syncfs(0xffffffffffffffff) 14:07:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/udp\x00') pread64(r0, &(0x7f0000000080)=""/39, 0x27, 0x610) 14:07:32 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000000)={r6, 0x3, 0x6, @link_local}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 14:07:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8918, &(0x7f0000000000)={@dev, 0x0, r2}) 14:07:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x7fffffe, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)="bc0774f1680e0f30fa2f5abbed2a463897bc1b16b746e00eeb589f436a37c8582a462ae92da14ebcf5ac6f2e889ca4923471a581a49463e28b0cd3052b972da754df40c689ce9a7b8bb9534eca4b0a61fee3fe8932d1106e110ec94797d41c4b64f298b42bac50b60c9f5d55d746b33bc92fc03463aea1c51d7cc624f094961557ce0ccaaa2aaf385465a9b04bcfe840110ed0e62624c2ce2a36e216d6ac8907db73f1bcebd90b084d1506d6b1d6125339af8831c82d5a58d882d925a84e1c6fd7ed33a869aab81e2abdbe667b639ea1e39eb61e0cd75ed81af68e3586f5d974d6d40e5422", 0xe5}, {&(0x7f0000000300)="10570415256e75228dd7c0bccb7bd13b03a4aac64608ad6090133982a236284e013c4ad894fd2f1c34c69cafdf3a3b5ef4414bd866a9f82a07ac1b7a17c5bae623b20313144a1e47d76c55d6ac2a942533ed511b91347f0cbff5d5d28473707f5cc1756b2343a7018f9fa22b95d31988c2be2e1f07e117aa7a8ce1bbd9ca97bb03513a4d2452f29e892586b6ca93aa0056d4ae75774d3351ae42c5a2dbc44827545279c7fa08c8ec5d64b5c82ef657fba8", 0xb1}, {&(0x7f00000003c0)="ad7c37f35965fe2616e9774d94ed837508c338e7429a249b22cdbca206d69e0214de5d57558e1f6b1a2577fa45474871949e88c27fe370b92e6905aabd94e80e4a5b9d87525d71ec23372ad98aa77a1430a02fe38296a9cf86847897980a3b47997cbdc0fe014fd36259fb56d2848b", 0x6f}, {&(0x7f0000000440)="549a4274cb8b52a1fa776ac8a0913bda459e4112ab3d8f12cfe37eac4a269a173277e13f876ec6ed59d4962a3164cff26503c524aee1891bc0ab27a8f01374510ab3d8b90e7c2872cbf57d1571b8ae3929640904910b3aa40313b81d791c4a4e19ae6795a39902bad88213a294a484edaa1de5b40fb4571850a0adc50236121bdf67c254c46a363fa7d4332857a55f27b01ccb9e2a3e96c872e2b5fb70ebbab7dd35d658ef31f82657895c5d351b4a240e9ddada4f4f477383c941632b7648c81a278616c28319bceb94770b6c39062ab4df918cae1be3dea2590f664434dd339baf9623439710e605550f6dbe", 0xed}], 0x4, r1) r2 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="6ffc25721cc9dc764319d54dac5b2ada2c5f6c9df78c125ee322784fa59e8d9ddc71996c417ec62000b6c3b9988a734588bc9336bd89d9f59d68d93b9a56c910436c7877860f050764a4d278b3711e6a88e58a1b7600a5c401c48b0f1cb5d6144d8e6c3aa7102222684bfc7c14f69dee4ab83475356a51a59b9a155244bb2e1ecab721b8f8e3924b938321b5e4334a44536eacd64ef97c4582005b866e58d9269fcbd907f32a4f7d021580305ced96f841f0c9c745610aea71374ccbd1e3", 0xbe) syz_io_uring_setup(0x22d2, &(0x7f0000000580)={0x0, 0x2799, 0x0, 0x3, 0x13}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000600), &(0x7f0000000640)) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r3, 0x0) sendfile(r0, r0, 0x0, 0x5f1) openat(r0, &(0x7f0000000000)='./file1\x00', 0x426000, 0x110) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) 14:07:32 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000)="84440b560baf1581006779549fc00bfc6f1c1f26ea3d167b26aa05c0b49d784334e5069c39785a84864b009a237cfd3bbfceea12c38fd4b1bc7fa6241d59d693283cad8603805f69ad3d0ba1432ece7371fbe6687b067fe43270dcd69f91be6eb2580a368208b01bde2ae59aca1e845758e6d24d23be90a4f745561cbd11", 0x7e, r0}, 0x68) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pivot_root(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0/file0\x00') mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8001) pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x0) mmap$perf(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x0, 0x4010, 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 14:07:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105241, 0x0) io_setup(0x6, &(0x7f0000000000)=0x0) io_submit(r1, 0x2, &(0x7f0000000600)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) [ 119.607016] device syz_tun entered promiscuous mode [ 119.617132] loop5: detected capacity change from 0 to 40 [ 119.619489] device syz_tun left promiscuous mode 14:07:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/udp\x00') pread64(r0, &(0x7f0000000080)=""/39, 0x27, 0x610) 14:07:32 executing program 1: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, 0x0) 14:07:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8918, &(0x7f0000000000)={@dev, 0x0, r2}) 14:07:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/udp\x00') pread64(r0, &(0x7f0000000080)=""/39, 0x27, 0x610) 14:07:32 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000000)={r6, 0x3, 0x6, @link_local}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 14:07:32 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000000)={r6, 0x3, 0x6, @link_local}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 14:07:32 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000)="84440b560baf1581006779549fc00bfc6f1c1f26ea3d167b26aa05c0b49d784334e5069c39785a84864b009a237cfd3bbfceea12c38fd4b1bc7fa6241d59d693283cad8603805f69ad3d0ba1432ece7371fbe6687b067fe43270dcd69f91be6eb2580a368208b01bde2ae59aca1e845758e6d24d23be90a4f745561cbd11", 0x7e, r0}, 0x68) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pivot_root(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0/file0\x00') mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8001) pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x0) mmap$perf(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x0, 0x4010, 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 14:07:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105241, 0x0) io_setup(0x6, &(0x7f0000000000)=0x0) io_submit(r1, 0x2, &(0x7f0000000600)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) [ 119.756709] device syz_tun entered promiscuous mode 14:07:32 executing program 1: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, 0x0) [ 119.770588] device syz_tun left promiscuous mode 14:07:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8918, &(0x7f0000000000)={@dev, 0x0, r2}) [ 119.781810] device syz_tun entered promiscuous mode 14:07:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/udp\x00') pread64(r0, &(0x7f0000000080)=""/39, 0x27, 0x610) [ 119.795690] loop5: detected capacity change from 0 to 40 [ 119.806665] device syz_tun left promiscuous mode 14:07:32 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000000)={r6, 0x3, 0x6, @link_local}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 14:07:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8918, &(0x7f0000000000)={@dev, 0x0, r2}) [ 119.930345] device syz_tun entered promiscuous mode [ 119.942654] device syz_tun left promiscuous mode 14:07:33 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000)="84440b560baf1581006779549fc00bfc6f1c1f26ea3d167b26aa05c0b49d784334e5069c39785a84864b009a237cfd3bbfceea12c38fd4b1bc7fa6241d59d693283cad8603805f69ad3d0ba1432ece7371fbe6687b067fe43270dcd69f91be6eb2580a368208b01bde2ae59aca1e845758e6d24d23be90a4f745561cbd11", 0x7e, r0}, 0x68) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pivot_root(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0/file0\x00') mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8001) pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x0) mmap$perf(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x0, 0x4010, 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 14:07:33 executing program 1: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, 0x0) 14:07:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105241, 0x0) io_setup(0x6, &(0x7f0000000000)=0x0) io_submit(r1, 0x2, &(0x7f0000000600)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 14:07:33 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000000)={r6, 0x3, 0x6, @link_local}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 14:07:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x7fffffe, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)="bc0774f1680e0f30fa2f5abbed2a463897bc1b16b746e00eeb589f436a37c8582a462ae92da14ebcf5ac6f2e889ca4923471a581a49463e28b0cd3052b972da754df40c689ce9a7b8bb9534eca4b0a61fee3fe8932d1106e110ec94797d41c4b64f298b42bac50b60c9f5d55d746b33bc92fc03463aea1c51d7cc624f094961557ce0ccaaa2aaf385465a9b04bcfe840110ed0e62624c2ce2a36e216d6ac8907db73f1bcebd90b084d1506d6b1d6125339af8831c82d5a58d882d925a84e1c6fd7ed33a869aab81e2abdbe667b639ea1e39eb61e0cd75ed81af68e3586f5d974d6d40e5422", 0xe5}, {&(0x7f0000000300)="10570415256e75228dd7c0bccb7bd13b03a4aac64608ad6090133982a236284e013c4ad894fd2f1c34c69cafdf3a3b5ef4414bd866a9f82a07ac1b7a17c5bae623b20313144a1e47d76c55d6ac2a942533ed511b91347f0cbff5d5d28473707f5cc1756b2343a7018f9fa22b95d31988c2be2e1f07e117aa7a8ce1bbd9ca97bb03513a4d2452f29e892586b6ca93aa0056d4ae75774d3351ae42c5a2dbc44827545279c7fa08c8ec5d64b5c82ef657fba8", 0xb1}, {&(0x7f00000003c0)="ad7c37f35965fe2616e9774d94ed837508c338e7429a249b22cdbca206d69e0214de5d57558e1f6b1a2577fa45474871949e88c27fe370b92e6905aabd94e80e4a5b9d87525d71ec23372ad98aa77a1430a02fe38296a9cf86847897980a3b47997cbdc0fe014fd36259fb56d2848b", 0x6f}, {&(0x7f0000000440)="549a4274cb8b52a1fa776ac8a0913bda459e4112ab3d8f12cfe37eac4a269a173277e13f876ec6ed59d4962a3164cff26503c524aee1891bc0ab27a8f01374510ab3d8b90e7c2872cbf57d1571b8ae3929640904910b3aa40313b81d791c4a4e19ae6795a39902bad88213a294a484edaa1de5b40fb4571850a0adc50236121bdf67c254c46a363fa7d4332857a55f27b01ccb9e2a3e96c872e2b5fb70ebbab7dd35d658ef31f82657895c5d351b4a240e9ddada4f4f477383c941632b7648c81a278616c28319bceb94770b6c39062ab4df918cae1be3dea2590f664434dd339baf9623439710e605550f6dbe", 0xed}], 0x4, r1) r2 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="6ffc25721cc9dc764319d54dac5b2ada2c5f6c9df78c125ee322784fa59e8d9ddc71996c417ec62000b6c3b9988a734588bc9336bd89d9f59d68d93b9a56c910436c7877860f050764a4d278b3711e6a88e58a1b7600a5c401c48b0f1cb5d6144d8e6c3aa7102222684bfc7c14f69dee4ab83475356a51a59b9a155244bb2e1ecab721b8f8e3924b938321b5e4334a44536eacd64ef97c4582005b866e58d9269fcbd907f32a4f7d021580305ced96f841f0c9c745610aea71374ccbd1e3", 0xbe) syz_io_uring_setup(0x22d2, &(0x7f0000000580)={0x0, 0x2799, 0x0, 0x3, 0x13}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000600), &(0x7f0000000640)) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r3, 0x0) sendfile(r0, r0, 0x0, 0x5f1) openat(r0, &(0x7f0000000000)='./file1\x00', 0x426000, 0x110) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) 14:07:33 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000)="84440b560baf1581006779549fc00bfc6f1c1f26ea3d167b26aa05c0b49d784334e5069c39785a84864b009a237cfd3bbfceea12c38fd4b1bc7fa6241d59d693283cad8603805f69ad3d0ba1432ece7371fbe6687b067fe43270dcd69f91be6eb2580a368208b01bde2ae59aca1e845758e6d24d23be90a4f745561cbd11", 0x7e, r0}, 0x68) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pivot_root(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0/file0\x00') mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8001) pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x0) mmap$perf(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x0, 0x4010, 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 14:07:33 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000)="84440b560baf1581006779549fc00bfc6f1c1f26ea3d167b26aa05c0b49d784334e5069c39785a84864b009a237cfd3bbfceea12c38fd4b1bc7fa6241d59d693283cad8603805f69ad3d0ba1432ece7371fbe6687b067fe43270dcd69f91be6eb2580a368208b01bde2ae59aca1e845758e6d24d23be90a4f745561cbd11", 0x7e, r0}, 0x68) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pivot_root(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0/file0\x00') mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8001) pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x0) mmap$perf(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x0, 0x4010, 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 14:07:33 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000000)={r6, 0x3, 0x6, @link_local}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) [ 120.016115] loop5: detected capacity change from 0 to 40 [ 120.019229] loop0: detected capacity change from 0 to 40 [ 120.021543] loop4: detected capacity change from 0 to 40 [ 120.035226] device syz_tun entered promiscuous mode [ 120.061525] device syz_tun left promiscuous mode 14:07:33 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000000)={r6, 0x3, 0x6, @link_local}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 14:07:33 executing program 1: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, 0x0) [ 120.110182] device syz_tun entered promiscuous mode [ 120.112647] device syz_tun entered promiscuous mode 14:07:33 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000)="84440b560baf1581006779549fc00bfc6f1c1f26ea3d167b26aa05c0b49d784334e5069c39785a84864b009a237cfd3bbfceea12c38fd4b1bc7fa6241d59d693283cad8603805f69ad3d0ba1432ece7371fbe6687b067fe43270dcd69f91be6eb2580a368208b01bde2ae59aca1e845758e6d24d23be90a4f745561cbd11", 0x7e, r0}, 0x68) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pivot_root(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0/file0\x00') mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8001) pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x0) mmap$perf(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x0, 0x4010, 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) [ 120.151473] device syz_tun left promiscuous mode 14:07:33 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000)="84440b560baf1581006779549fc00bfc6f1c1f26ea3d167b26aa05c0b49d784334e5069c39785a84864b009a237cfd3bbfceea12c38fd4b1bc7fa6241d59d693283cad8603805f69ad3d0ba1432ece7371fbe6687b067fe43270dcd69f91be6eb2580a368208b01bde2ae59aca1e845758e6d24d23be90a4f745561cbd11", 0x7e, r0}, 0x68) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pivot_root(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0/file0\x00') mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8001) pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x0) mmap$perf(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x0, 0x4010, 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) [ 120.154765] device syz_tun left promiscuous mode 14:07:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105241, 0x0) io_setup(0x6, &(0x7f0000000000)=0x0) io_submit(r1, 0x2, &(0x7f0000000600)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) [ 120.167822] loop3: detected capacity change from 0 to 40 14:07:33 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000)="84440b560baf1581006779549fc00bfc6f1c1f26ea3d167b26aa05c0b49d784334e5069c39785a84864b009a237cfd3bbfceea12c38fd4b1bc7fa6241d59d693283cad8603805f69ad3d0ba1432ece7371fbe6687b067fe43270dcd69f91be6eb2580a368208b01bde2ae59aca1e845758e6d24d23be90a4f745561cbd11", 0x7e, r0}, 0x68) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pivot_root(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0/file0\x00') mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8001) pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x0) mmap$perf(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x0, 0x4010, 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) [ 120.208943] loop5: detected capacity change from 0 to 40 14:07:33 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000)="84440b560baf1581006779549fc00bfc6f1c1f26ea3d167b26aa05c0b49d784334e5069c39785a84864b009a237cfd3bbfceea12c38fd4b1bc7fa6241d59d693283cad8603805f69ad3d0ba1432ece7371fbe6687b067fe43270dcd69f91be6eb2580a368208b01bde2ae59aca1e845758e6d24d23be90a4f745561cbd11", 0x7e, r0}, 0x68) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pivot_root(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0/file0\x00') mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8001) pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x0) mmap$perf(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x0, 0x4010, 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 14:07:33 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000)="84440b560baf1581006779549fc00bfc6f1c1f26ea3d167b26aa05c0b49d784334e5069c39785a84864b009a237cfd3bbfceea12c38fd4b1bc7fa6241d59d693283cad8603805f69ad3d0ba1432ece7371fbe6687b067fe43270dcd69f91be6eb2580a368208b01bde2ae59aca1e845758e6d24d23be90a4f745561cbd11", 0x7e, r0}, 0x68) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pivot_root(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0/file0\x00') mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8001) pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x0) mmap$perf(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x0, 0x4010, 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 14:07:33 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000)="84440b560baf1581006779549fc00bfc6f1c1f26ea3d167b26aa05c0b49d784334e5069c39785a84864b009a237cfd3bbfceea12c38fd4b1bc7fa6241d59d693283cad8603805f69ad3d0ba1432ece7371fbe6687b067fe43270dcd69f91be6eb2580a368208b01bde2ae59aca1e845758e6d24d23be90a4f745561cbd11", 0x7e, r0}, 0x68) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pivot_root(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0/file0\x00') mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8001) pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x0) mmap$perf(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x0, 0x4010, 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) [ 120.262020] loop7: detected capacity change from 0 to 40 14:07:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000000)={r6, 0x3, 0x6, @link_local}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) [ 120.310941] loop3: detected capacity change from 0 to 40 [ 120.312299] loop6: detected capacity change from 0 to 40 [ 120.360070] device syz_tun entered promiscuous mode [ 120.403467] loop4: detected capacity change from 0 to 40 [ 120.409514] device syz_tun left promiscuous mode [ 120.693198] device syz_tun entered promiscuous mode [ 120.697281] loop0: detected capacity change from 0 to 40 [ 120.703202] device syz_tun entered promiscuous mode [ 120.705044] loop3: detected capacity change from 0 to 40 [ 120.708836] loop4: detected capacity change from 0 to 40 14:07:33 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000)="84440b560baf1581006779549fc00bfc6f1c1f26ea3d167b26aa05c0b49d784334e5069c39785a84864b009a237cfd3bbfceea12c38fd4b1bc7fa6241d59d693283cad8603805f69ad3d0ba1432ece7371fbe6687b067fe43270dcd69f91be6eb2580a368208b01bde2ae59aca1e845758e6d24d23be90a4f745561cbd11", 0x7e, r0}, 0x68) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pivot_root(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0/file0\x00') mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8001) pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x0) mmap$perf(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x0, 0x4010, 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 14:07:33 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000)="84440b560baf1581006779549fc00bfc6f1c1f26ea3d167b26aa05c0b49d784334e5069c39785a84864b009a237cfd3bbfceea12c38fd4b1bc7fa6241d59d693283cad8603805f69ad3d0ba1432ece7371fbe6687b067fe43270dcd69f91be6eb2580a368208b01bde2ae59aca1e845758e6d24d23be90a4f745561cbd11", 0x7e, r0}, 0x68) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pivot_root(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0/file0\x00') mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8001) pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x0) mmap$perf(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x0, 0x4010, 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 14:07:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000000)={r6, 0x3, 0x6, @link_local}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 14:07:33 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000)="84440b560baf1581006779549fc00bfc6f1c1f26ea3d167b26aa05c0b49d784334e5069c39785a84864b009a237cfd3bbfceea12c38fd4b1bc7fa6241d59d693283cad8603805f69ad3d0ba1432ece7371fbe6687b067fe43270dcd69f91be6eb2580a368208b01bde2ae59aca1e845758e6d24d23be90a4f745561cbd11", 0x7e, r0}, 0x68) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pivot_root(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0/file0\x00') mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8001) pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x0) mmap$perf(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x0, 0x4010, 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 14:07:33 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000)="84440b560baf1581006779549fc00bfc6f1c1f26ea3d167b26aa05c0b49d784334e5069c39785a84864b009a237cfd3bbfceea12c38fd4b1bc7fa6241d59d693283cad8603805f69ad3d0ba1432ece7371fbe6687b067fe43270dcd69f91be6eb2580a368208b01bde2ae59aca1e845758e6d24d23be90a4f745561cbd11", 0x7e, r0}, 0x68) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pivot_root(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0/file0\x00') mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8001) pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x0) mmap$perf(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x0, 0x4010, 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 14:07:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000000)={r6, 0x3, 0x6, @link_local}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 14:07:33 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000)="84440b560baf1581006779549fc00bfc6f1c1f26ea3d167b26aa05c0b49d784334e5069c39785a84864b009a237cfd3bbfceea12c38fd4b1bc7fa6241d59d693283cad8603805f69ad3d0ba1432ece7371fbe6687b067fe43270dcd69f91be6eb2580a368208b01bde2ae59aca1e845758e6d24d23be90a4f745561cbd11", 0x7e, r0}, 0x68) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pivot_root(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0/file0\x00') mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8001) pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x0) mmap$perf(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x0, 0x4010, 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) [ 120.718458] device syz_tun left promiscuous mode [ 120.720448] device syz_tun left promiscuous mode [ 120.738166] loop7: detected capacity change from 0 to 40 14:07:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000000)={r6, 0x3, 0x6, @link_local}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 14:07:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000000)={r6, 0x3, 0x6, @link_local}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) [ 120.791239] device syz_tun entered promiscuous mode [ 120.793912] loop6: detected capacity change from 0 to 40 [ 120.822581] device syz_tun left promiscuous mode [ 120.843919] device syz_tun entered promiscuous mode 14:07:33 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000)="84440b560baf1581006779549fc00bfc6f1c1f26ea3d167b26aa05c0b49d784334e5069c39785a84864b009a237cfd3bbfceea12c38fd4b1bc7fa6241d59d693283cad8603805f69ad3d0ba1432ece7371fbe6687b067fe43270dcd69f91be6eb2580a368208b01bde2ae59aca1e845758e6d24d23be90a4f745561cbd11", 0x7e, r0}, 0x68) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pivot_root(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0/file0\x00') mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8001) pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x0) mmap$perf(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x0, 0x4010, 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 14:07:33 executing program 1: io_setup(0x6, &(0x7f0000000080)=0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000480)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) [ 120.864902] device syz_tun left promiscuous mode [ 120.943323] loop7: detected capacity change from 0 to 40 14:07:34 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000)="84440b560baf1581006779549fc00bfc6f1c1f26ea3d167b26aa05c0b49d784334e5069c39785a84864b009a237cfd3bbfceea12c38fd4b1bc7fa6241d59d693283cad8603805f69ad3d0ba1432ece7371fbe6687b067fe43270dcd69f91be6eb2580a368208b01bde2ae59aca1e845758e6d24d23be90a4f745561cbd11", 0x7e, r0}, 0x68) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pivot_root(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0/file0\x00') mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8001) pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x0) mmap$perf(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x0, 0x4010, 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 14:07:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000000)={r6, 0x3, 0x6, @link_local}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 14:07:34 executing program 1: io_setup(0x6, &(0x7f0000000080)=0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000480)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 14:07:34 executing program 7: io_setup(0x6, &(0x7f0000000080)=0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000480)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 14:07:34 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000)="84440b560baf1581006779549fc00bfc6f1c1f26ea3d167b26aa05c0b49d784334e5069c39785a84864b009a237cfd3bbfceea12c38fd4b1bc7fa6241d59d693283cad8603805f69ad3d0ba1432ece7371fbe6687b067fe43270dcd69f91be6eb2580a368208b01bde2ae59aca1e845758e6d24d23be90a4f745561cbd11", 0x7e, r0}, 0x68) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pivot_root(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0/file0\x00') mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8001) pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x0) mmap$perf(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x0, 0x4010, 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 14:07:34 executing program 3: mlock2(&(0x7f0000fef000/0x11000)=nil, 0x11000, 0x0) mbind(&(0x7f0000fef000/0x11000)=nil, 0x11000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) [ 121.440210] loop6: detected capacity change from 0 to 40 [ 121.453222] loop0: detected capacity change from 0 to 40 [ 121.455607] device syz_tun entered promiscuous mode 14:07:34 executing program 3: mlock2(&(0x7f0000fef000/0x11000)=nil, 0x11000, 0x0) mbind(&(0x7f0000fef000/0x11000)=nil, 0x11000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) [ 121.477578] device syz_tun left promiscuous mode 14:07:34 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) mq_notify(r0, 0x0) 14:07:34 executing program 1: io_setup(0x6, &(0x7f0000000080)=0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000480)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 14:07:34 executing program 3: mlock2(&(0x7f0000fef000/0x11000)=nil, 0x11000, 0x0) mbind(&(0x7f0000fef000/0x11000)=nil, 0x11000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 14:07:34 executing program 7: io_setup(0x6, &(0x7f0000000080)=0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000480)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 14:07:34 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) mq_notify(r0, 0x0) 14:07:34 executing program 1: io_setup(0x6, &(0x7f0000000080)=0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000480)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 14:07:34 executing program 7: io_setup(0x6, &(0x7f0000000080)=0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000480)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 14:07:34 executing program 3: mlock2(&(0x7f0000fef000/0x11000)=nil, 0x11000, 0x0) mbind(&(0x7f0000fef000/0x11000)=nil, 0x11000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 14:07:34 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) mq_notify(r0, 0x0) 14:07:34 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) mq_notify(r0, 0x0) 14:07:34 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000001580), &(0x7f00000015c0)=0x4) 14:07:34 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000001580), &(0x7f00000015c0)=0x4) 14:07:34 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000001580), &(0x7f00000015c0)=0x4) 14:07:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) gettid() sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}}], 0x2, 0x0) 14:07:34 executing program 0: clock_getres(0x3, &(0x7f0000000b80)) 14:07:34 executing program 6: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d9, &(0x7f0000000140)={0x0, 0x3, [@local, @random="57fd8778c88d", @dev]}) 14:07:34 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x VM DIAGNOSIS: 14:07:26 Registers: info registers vcpu 0 RAX=dffffc0000000060 RBX=00000000000003fd RCX=0000000000000000 RDX=00000000000003fd RSI=ffffffff822b1dbc RDI=ffffffff8763fae0 RBP=ffffffff8763faa0 RSP=ffff88803e727600 R8 =0000000000000004 R9 =0000000000000010 R10=0000000000000003 R11=0000000000000001 R12=0000000000002710 R13=0000000000000060 R14=fffffbfff0ec7fab R15=dffffc0000000000 RIP=ffffffff822b1e11 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f307e628700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f65e28c86f4 CR3=000000001f4b8000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f30811997c0 00007f30811997c8 YMM02=0000000000000000 0000000000000000 00007f30811997e0 00007f30811997c0 YMM03=0000000000000000 0000000000000000 00007f30811997c8 00007f30811997c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000001 RBX=0000000000000010 RCX=0000000000000cc0 RDX=0000000000000001 RSI=0000000000092cc0 RDI=ffff888007c4f780 RBP=ffff88800d53cc80 RSP=ffff88801f457800 R8 =0000000000000000 R9 =ffffed1001aa7990 R10=0000000000000000 R11=0000000000000001 R12=ffff888007c4f780 R13=0000000000000000 R14=0000000000092cc0 R15=0000000000000000 RIP=ffffffff81781f84 RFL=00000286 [--S--P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555556251400 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f5a6d7226f4 CR3=000000001bea2000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 00524f5252450040 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000