Warning: Permanently added '[localhost]:24212' (ECDSA) to the list of known hosts.
2022/09/15 11:39:10 fuzzer started
2022/09/15 11:39:10 dialing manager at localhost:36559
syzkaller login: [ 35.699947] cgroup: Unknown subsys name 'net'
[ 35.787970] cgroup: Unknown subsys name 'rlimit'
2022/09/15 11:39:24 syscalls: 2215
2022/09/15 11:39:24 code coverage: enabled
2022/09/15 11:39:24 comparison tracing: enabled
2022/09/15 11:39:24 extra coverage: enabled
2022/09/15 11:39:24 setuid sandbox: enabled
2022/09/15 11:39:24 namespace sandbox: enabled
2022/09/15 11:39:24 Android sandbox: enabled
2022/09/15 11:39:24 fault injection: enabled
2022/09/15 11:39:24 leak checking: enabled
2022/09/15 11:39:24 net packet injection: enabled
2022/09/15 11:39:24 net device setup: enabled
2022/09/15 11:39:24 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist
2022/09/15 11:39:24 devlink PCI setup: PCI device 0000:00:10.0 is not available
2022/09/15 11:39:24 USB emulation: enabled
2022/09/15 11:39:24 hci packet injection: enabled
2022/09/15 11:39:24 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220915 )
2022/09/15 11:39:24 802.15.4 emulation: enabled
2022/09/15 11:39:24 fetching corpus: 0, signal 0/2000 (executing program)
2022/09/15 11:39:24 fetching corpus: 34, signal 17414/20971 (executing program)
2022/09/15 11:39:24 fetching corpus: 72, signal 37053/41640 (executing program)
2022/09/15 11:39:24 fetching corpus: 122, signal 49810/55300 (executing program)
2022/09/15 11:39:25 fetching corpus: 172, signal 59664/65897 (executing program)
2022/09/15 11:39:25 fetching corpus: 222, signal 66788/73731 (executing program)
2022/09/15 11:39:25 fetching corpus: 272, signal 72423/79999 (executing program)
2022/09/15 11:39:25 fetching corpus: 322, signal 76594/84863 (executing program)
2022/09/15 11:39:25 fetching corpus: 372, signal 79927/88835 (executing program)
2022/09/15 11:39:25 fetching corpus: 422, signal 83875/93271 (executing program)
2022/09/15 11:39:25 fetching corpus: 472, signal 86763/96762 (executing program)
2022/09/15 11:39:26 fetching corpus: 522, signal 89835/100254 (executing program)
2022/09/15 11:39:26 fetching corpus: 572, signal 92398/103312 (executing program)
2022/09/15 11:39:26 fetching corpus: 622, signal 95697/106833 (executing program)
2022/09/15 11:39:26 fetching corpus: 672, signal 98295/109806 (executing program)
2022/09/15 11:39:26 fetching corpus: 722, signal 101589/113258 (executing program)
2022/09/15 11:39:26 fetching corpus: 772, signal 104763/116489 (executing program)
2022/09/15 11:39:27 fetching corpus: 822, signal 107300/119183 (executing program)
2022/09/15 11:39:27 fetching corpus: 872, signal 109735/121759 (executing program)
2022/09/15 11:39:27 fetching corpus: 922, signal 112060/124123 (executing program)
2022/09/15 11:39:27 fetching corpus: 972, signal 114347/126442 (executing program)
2022/09/15 11:39:27 fetching corpus: 1022, signal 116065/128235 (executing program)
2022/09/15 11:39:27 fetching corpus: 1072, signal 118243/130350 (executing program)
2022/09/15 11:39:27 fetching corpus: 1122, signal 120297/132297 (executing program)
2022/09/15 11:39:28 fetching corpus: 1172, signal 122252/134196 (executing program)
2022/09/15 11:39:28 fetching corpus: 1222, signal 123561/135596 (executing program)
2022/09/15 11:39:28 fetching corpus: 1272, signal 125729/137497 (executing program)
2022/09/15 11:39:28 fetching corpus: 1322, signal 127945/139381 (executing program)
2022/09/15 11:39:28 fetching corpus: 1372, signal 130149/141149 (executing program)
2022/09/15 11:39:29 fetching corpus: 1422, signal 132258/142893 (executing program)
2022/09/15 11:39:29 fetching corpus: 1472, signal 135723/145511 (executing program)
2022/09/15 11:39:29 fetching corpus: 1522, signal 137552/147164 (executing program)
2022/09/15 11:39:29 fetching corpus: 1572, signal 139110/148358 (executing program)
2022/09/15 11:39:29 fetching corpus: 1622, signal 140367/149422 (executing program)
2022/09/15 11:39:29 fetching corpus: 1672, signal 141962/150693 (executing program)
2022/09/15 11:39:29 fetching corpus: 1722, signal 142865/151479 (executing program)
2022/09/15 11:39:30 fetching corpus: 1772, signal 143873/152267 (executing program)
2022/09/15 11:39:30 fetching corpus: 1822, signal 144965/153039 (executing program)
2022/09/15 11:39:30 fetching corpus: 1872, signal 145908/153803 (executing program)
2022/09/15 11:39:30 fetching corpus: 1922, signal 147246/154969 (executing program)
2022/09/15 11:39:30 fetching corpus: 1972, signal 148550/155796 (executing program)
2022/09/15 11:39:30 fetching corpus: 2022, signal 150944/157161 (executing program)
2022/09/15 11:39:30 fetching corpus: 2072, signal 153050/158251 (executing program)
2022/09/15 11:39:31 fetching corpus: 2122, signal 154432/158957 (executing program)
2022/09/15 11:39:31 fetching corpus: 2172, signal 155839/159670 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/160200 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/160267 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/160358 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/160432 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/160522 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/160589 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/160652 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/160725 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/160790 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/160846 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/160916 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/160972 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/161056 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/161136 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/161199 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/161271 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/161350 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/161433 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/161503 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/161577 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/161641 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/161700 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/161761 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/161831 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/161900 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/161983 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/162064 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/162129 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/162209 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/162279 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/162337 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/162408 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/162460 (executing program)
2022/09/15 11:39:31 fetching corpus: 2192, signal 156820/162460 (executing program)
2022/09/15 11:39:34 starting 8 fuzzer processes
11:39:34 executing program 0:
mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0)
shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4)
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040))
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18)
r2 = shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ff9000/0x2000)=nil)
shmctl$SHM_UNLOCK(r2, 0xc)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb)
r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3)
openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0)
shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ff5000/0x2000)=nil)
11:39:34 executing program 3:
timer_create(0x0, &(0x7f0000000b40)={0x0, 0x0, 0x4, @thr={0x0, 0x0}}, 0x0)
11:39:34 executing program 1:
syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff)
11:39:34 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000200)={0x77359400}, 0x10)
11:39:34 executing program 4:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c20000120300000000000000000000000000000000000073797a6b", 0x7c, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012700)}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x4880}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f0000000000000100", 0x1c, 0x4c00}, {0x0}, {0x0}, {&(0x7f0000013400)}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}], 0x0, &(0x7f0000014a00))
11:39:34 executing program 5:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x0, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xf, 0x11, r1, 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write(r2, &(0x7f0000000080)="01", 0x41030)
11:39:34 executing program 6:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0)
fcntl$setstatus(r0, 0x4, 0x46000)
[ 58.706690] audit: type=1400 audit(1663241974.092:6): avc: denied { execmem } for pid=284 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1
11:39:34 executing program 7:
syz_genetlink_get_family_id$nl802154(&(0x7f0000000480), 0xffffffffffffffff)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$KDGKBMETA(r0, 0x4b31, &(0x7f00000002c0))
[ 59.888978] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[ 59.890581] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 59.893305] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 59.896554] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 59.898396] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3
[ 59.899618] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[ 59.905129] Bluetooth: hci0: HCI_REQ-0x0c1a
[ 59.929857] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1
[ 59.935471] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9
[ 59.937202] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9
[ 59.939944] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4
[ 59.941655] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3
[ 59.942937] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2
[ 59.947300] Bluetooth: hci2: HCI_REQ-0x0c1a
[ 59.969367] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1
[ 59.978154] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9
[ 59.979359] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9
[ 60.012834] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4
[ 60.016607] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3
[ 60.018731] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2
[ 60.025532] Bluetooth: hci1: HCI_REQ-0x0c1a
[ 60.059370] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1
[ 60.062108] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1
[ 60.065597] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1
[ 60.067691] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1
[ 60.081822] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9
[ 60.093284] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9
[ 60.094300] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9
[ 60.097344] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9
[ 60.097436] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9
[ 60.114310] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9
[ 60.114383] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9
[ 60.118361] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9
[ 60.122721] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4
[ 60.123799] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4
[ 60.127065] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4
[ 60.140922] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3
[ 60.142759] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3
[ 60.147392] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3
[ 60.148574] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2
[ 60.148720] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2
[ 60.151530] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2
[ 60.152733] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4
[ 60.154555] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3
[ 60.183156] Bluetooth: hci4: HCI_REQ-0x0c1a
[ 60.183888] Bluetooth: hci6: HCI_REQ-0x0c1a
[ 60.184630] Bluetooth: hci5: HCI_REQ-0x0c1a
[ 60.252252] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2
[ 60.258070] Bluetooth: hci7: HCI_REQ-0x0c1a
[ 61.970395] Bluetooth: hci2: command 0x0409 tx timeout
[ 61.970409] Bluetooth: hci0: command 0x0409 tx timeout
[ 62.034048] Bluetooth: hci1: command 0x0409 tx timeout
[ 62.034633] Bluetooth: hci3: Opcode 0x c03 failed: -110
[ 62.226139] Bluetooth: hci6: command 0x0409 tx timeout
[ 62.226609] Bluetooth: hci5: command 0x0409 tx timeout
[ 62.290031] Bluetooth: hci4: command 0x0409 tx timeout
[ 62.291037] Bluetooth: hci7: command 0x0409 tx timeout
[ 64.018047] Bluetooth: hci0: command 0x041b tx timeout
[ 64.018508] Bluetooth: hci2: command 0x041b tx timeout
[ 64.082032] Bluetooth: hci1: command 0x041b tx timeout
[ 64.274026] Bluetooth: hci5: command 0x041b tx timeout
[ 64.274599] Bluetooth: hci6: command 0x041b tx timeout
[ 64.339042] Bluetooth: hci7: command 0x041b tx timeout
[ 64.339544] Bluetooth: hci4: command 0x041b tx timeout
[ 64.768770] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1
[ 64.769654] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9
[ 64.771016] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9
[ 64.773972] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4
[ 64.776890] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3
[ 64.778523] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2
[ 64.784149] Bluetooth: hci3: HCI_REQ-0x0c1a
[ 66.067082] Bluetooth: hci2: command 0x040f tx timeout
[ 66.067692] Bluetooth: hci0: command 0x040f tx timeout
[ 66.131422] Bluetooth: hci1: command 0x040f tx timeout
[ 66.323040] Bluetooth: hci6: command 0x040f tx timeout
[ 66.323540] Bluetooth: hci5: command 0x040f tx timeout
[ 66.387087] Bluetooth: hci4: command 0x040f tx timeout
[ 66.387602] Bluetooth: hci7: command 0x040f tx timeout
[ 66.835107] Bluetooth: hci3: command 0x0409 tx timeout
[ 68.114044] Bluetooth: hci0: command 0x0419 tx timeout
[ 68.114529] Bluetooth: hci2: command 0x0419 tx timeout
[ 68.178022] Bluetooth: hci1: command 0x0419 tx timeout
[ 68.371138] Bluetooth: hci5: command 0x0419 tx timeout
[ 68.371602] Bluetooth: hci6: command 0x0419 tx timeout
[ 68.434077] Bluetooth: hci7: command 0x0419 tx timeout
[ 68.434703] Bluetooth: hci4: command 0x0419 tx timeout
[ 68.883096] Bluetooth: hci3: command 0x041b tx timeout
[ 70.930028] Bluetooth: hci3: command 0x040f tx timeout
[ 72.978145] Bluetooth: hci3: command 0x0419 tx timeout
[ 111.498730] audit: type=1400 audit(1663242026.887:7): avc: denied { open } for pid=3811 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1
[ 111.500582] audit: type=1400 audit(1663242026.887:8): avc: denied { kernel } for pid=3811 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1
[ 111.516612] ------------[ cut here ]------------
[ 111.516636]
[ 111.516639] ======================================================
[ 111.516643] WARNING: possible circular locking dependency detected
[ 111.516647] 6.0.0-rc5-next-20220915 #1 Not tainted
[ 111.516654] ------------------------------------------------------
[ 111.516657] syz-executor.0/3812 is trying to acquire lock:
[ 111.516664] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70
[ 111.516703]
[ 111.516703] but task is already holding lock:
[ 111.516705] ffff8880087c1820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0
[ 111.516733]
[ 111.516733] which lock already depends on the new lock.
[ 111.516733]
[ 111.516737]
[ 111.516737] the existing dependency chain (in reverse order) is:
[ 111.516740]
[ 111.516740] -> #3 (&ctx->lock){....}-{2:2}:
[ 111.516754] _raw_spin_lock+0x2a/0x40
[ 111.516772] __perf_event_task_sched_out+0x53b/0x18d0
[ 111.516784] __schedule+0xedd/0x2470
[ 111.516795] schedule+0xda/0x1b0
[ 111.516805] exit_to_user_mode_prepare+0x114/0x1a0
[ 111.516826] syscall_exit_to_user_mode+0x19/0x40
[ 111.516845] do_syscall_64+0x48/0x90
[ 111.516859] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 111.516877]
[ 111.516877] -> #2 (&rq->__lock){-.-.}-{2:2}:
[ 111.516891] _raw_spin_lock_nested+0x30/0x40
[ 111.516907] raw_spin_rq_lock_nested+0x1e/0x30
[ 111.516920] task_fork_fair+0x63/0x4d0
[ 111.516938] sched_cgroup_fork+0x3d0/0x540
[ 111.516952] copy_process+0x4183/0x6e20
[ 111.516962] kernel_clone+0xe7/0x890
[ 111.516975] user_mode_thread+0xad/0xf0
[ 111.516985] rest_init+0x24/0x250
[ 111.517002] arch_call_rest_init+0xf/0x14
[ 111.517015] start_kernel+0x4c1/0x4e6
[ 111.517025] secondary_startup_64_no_verify+0xe0/0xeb
[ 111.517039]
[ 111.517039] -> #1 (&p->pi_lock){-.-.}-{2:2}:
[ 111.517053] _raw_spin_lock_irqsave+0x39/0x60
[ 111.517068] try_to_wake_up+0xab/0x1920
[ 111.517082] up+0x75/0xb0
[ 111.517093] __up_console_sem+0x6e/0x80
[ 111.517110] console_unlock+0x46a/0x590
[ 111.517126] do_con_write+0xc05/0x1d50
[ 111.517138] con_write+0x21/0x40
[ 111.517148] n_tty_write+0x4d4/0xfe0
[ 111.517161] file_tty_write.constprop.0+0x49c/0x8f0
[ 111.517174] vfs_write+0x9c3/0xd90
[ 111.517193] ksys_write+0x127/0x250
[ 111.517210] do_syscall_64+0x3b/0x90
[ 111.517224] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 111.517241]
[ 111.517241] -> #0 ((console_sem).lock){....}-{2:2}:
[ 111.517255] __lock_acquire+0x2a02/0x5e70
[ 111.517272] lock_acquire+0x1a2/0x530
[ 111.517288] _raw_spin_lock_irqsave+0x39/0x60
[ 111.517303] down_trylock+0xe/0x70
[ 111.517315] __down_trylock_console_sem+0x3b/0xd0
[ 111.517332] vprintk_emit+0x16b/0x560
[ 111.517349] vprintk+0x84/0xa0
[ 111.517365] _printk+0xba/0xf1
[ 111.517384] report_bug.cold+0x72/0xab
[ 111.517397] handle_bug+0x3c/0x70
[ 111.517410] exc_invalid_op+0x14/0x50
[ 111.517424] asm_exc_invalid_op+0x16/0x20
[ 111.517441] group_sched_out.part.0+0x2c7/0x460
[ 111.517452] ctx_sched_out+0x8f1/0xc10
[ 111.517461] __perf_event_task_sched_out+0x6d0/0x18d0
[ 111.517474] __schedule+0xedd/0x2470
[ 111.517484] schedule+0xda/0x1b0
[ 111.517494] exit_to_user_mode_prepare+0x114/0x1a0
[ 111.517513] syscall_exit_to_user_mode+0x19/0x40
[ 111.517531] do_syscall_64+0x48/0x90
[ 111.517544] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 111.517562]
[ 111.517562] other info that might help us debug this:
[ 111.517562]
[ 111.517564] Chain exists of:
[ 111.517564] (console_sem).lock --> &rq->__lock --> &ctx->lock
[ 111.517564]
[ 111.517579] Possible unsafe locking scenario:
[ 111.517579]
[ 111.517581] CPU0 CPU1
[ 111.517584] ---- ----
[ 111.517587] lock(&ctx->lock);
[ 111.517592] lock(&rq->__lock);
[ 111.517599] lock(&ctx->lock);
[ 111.517605] lock((console_sem).lock);
[ 111.517611]
[ 111.517611] *** DEADLOCK ***
[ 111.517611]
[ 111.517612] 2 locks held by syz-executor.0/3812:
[ 111.517619] #0: ffff88806ce37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470
[ 111.517645] #1: ffff8880087c1820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0
[ 111.517673]
[ 111.517673] stack backtrace:
[ 111.517676] CPU: 0 PID: 3812 Comm: syz-executor.0 Not tainted 6.0.0-rc5-next-20220915 #1
[ 111.517688] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 111.517696] Call Trace:
[ 111.517700]
[ 111.517704] dump_stack_lvl+0x8b/0xb3
[ 111.517719] check_noncircular+0x263/0x2e0
[ 111.517736] ? format_decode+0x26c/0xb50
[ 111.517758] ? print_circular_bug+0x450/0x450
[ 111.517776] ? enable_ptr_key_workfn+0x20/0x20
[ 111.517791] ? format_decode+0x26c/0xb50
[ 111.517807] ? alloc_chain_hlocks+0x1ec/0x5a0
[ 111.517825] __lock_acquire+0x2a02/0x5e70
[ 111.517847] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 111.517869] lock_acquire+0x1a2/0x530
[ 111.517886] ? down_trylock+0xe/0x70
[ 111.517901] ? rcu_read_unlock+0x40/0x40
[ 111.517922] ? vprintk+0x84/0xa0
[ 111.517940] _raw_spin_lock_irqsave+0x39/0x60
[ 111.517957] ? down_trylock+0xe/0x70
[ 111.517970] down_trylock+0xe/0x70
[ 111.517984] ? vprintk+0x84/0xa0
[ 111.518001] __down_trylock_console_sem+0x3b/0xd0
[ 111.518019] vprintk_emit+0x16b/0x560
[ 111.518038] vprintk+0x84/0xa0
[ 111.518056] _printk+0xba/0xf1
[ 111.518074] ? record_print_text.cold+0x16/0x16
[ 111.518097] ? report_bug.cold+0x66/0xab
[ 111.518112] ? group_sched_out.part.0+0x2c7/0x460
[ 111.518123] report_bug.cold+0x72/0xab
[ 111.518139] handle_bug+0x3c/0x70
[ 111.518153] exc_invalid_op+0x14/0x50
[ 111.518168] asm_exc_invalid_op+0x16/0x20
[ 111.518186] RIP: 0010:group_sched_out.part.0+0x2c7/0x460
[ 111.518200] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00
[ 111.518211] RSP: 0018:ffff88803e61fc48 EFLAGS: 00010006
[ 111.518220] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000
[ 111.518227] RDX: ffff888018b41ac0 RSI: ffffffff81566027 RDI: 0000000000000005
[ 111.518235] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001
[ 111.518243] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff8880087c1800
[ 111.518251] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002
[ 111.518262] ? group_sched_out.part.0+0x2c7/0x460
[ 111.518275] ? group_sched_out.part.0+0x2c7/0x460
[ 111.518288] ctx_sched_out+0x8f1/0xc10
[ 111.518300] __perf_event_task_sched_out+0x6d0/0x18d0
[ 111.518316] ? lock_is_held_type+0xd7/0x130
[ 111.518335] ? __perf_cgroup_move+0x160/0x160
[ 111.518347] ? set_next_entity+0x304/0x550
[ 111.518365] ? update_curr+0x267/0x740
[ 111.518384] ? lock_is_held_type+0xd7/0x130
[ 111.518403] __schedule+0xedd/0x2470
[ 111.518417] ? io_schedule_timeout+0x150/0x150
[ 111.518430] ? rcu_read_lock_sched_held+0x3e/0x80
[ 111.518451] schedule+0xda/0x1b0
[ 111.518463] exit_to_user_mode_prepare+0x114/0x1a0
[ 111.518484] syscall_exit_to_user_mode+0x19/0x40
[ 111.518503] do_syscall_64+0x48/0x90
[ 111.518517] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 111.518535] RIP: 0033:0x7f5f809b7b19
[ 111.518544] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 111.518555] RSP: 002b:00007f5f7df2d218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
[ 111.518566] RAX: 0000000000000001 RBX: 00007f5f80acaf68 RCX: 00007f5f809b7b19
[ 111.518573] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f5f80acaf6c
[ 111.518581] RBP: 00007f5f80acaf60 R08: 000000000000000e R09: 0000000000000000
[ 111.518588] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f5f80acaf6c
[ 111.518595] R13: 00007ffe1fe5794f R14: 00007f5f7df2d300 R15: 0000000000022000
[ 111.518608]
[ 111.573827] WARNING: CPU: 0 PID: 3812 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460
[ 111.574501] Modules linked in:
[ 111.574744] CPU: 0 PID: 3812 Comm: syz-executor.0 Not tainted 6.0.0-rc5-next-20220915 #1
[ 111.575335] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 111.576159] RIP: 0010:group_sched_out.part.0+0x2c7/0x460
[ 111.576560] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00
[ 111.577891] RSP: 0018:ffff88803e61fc48 EFLAGS: 00010006
[ 111.578286] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000
[ 111.578807] RDX: ffff888018b41ac0 RSI: ffffffff81566027 RDI: 0000000000000005
[ 111.579323] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001
[ 111.579843] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff8880087c1800
[ 111.580361] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002
[ 111.580884] FS: 00007f5f7df2d700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000
[ 111.581484] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 111.581921] CR2: 00007f45b9812368 CR3: 000000001da36000 CR4: 0000000000350ef0
[ 111.582455] Call Trace:
[ 111.582645]
[ 111.582819] ctx_sched_out+0x8f1/0xc10
[ 111.583113] __perf_event_task_sched_out+0x6d0/0x18d0
[ 111.583501] ? lock_is_held_type+0xd7/0x130
[ 111.583832] ? __perf_cgroup_move+0x160/0x160
[ 111.584169] ? set_next_entity+0x304/0x550
[ 111.584491] ? update_curr+0x267/0x740
[ 111.584789] ? lock_is_held_type+0xd7/0x130
[ 111.585109] __schedule+0xedd/0x2470
[ 111.585390] ? io_schedule_timeout+0x150/0x150
[ 111.585729] ? rcu_read_lock_sched_held+0x3e/0x80
[ 111.586099] schedule+0xda/0x1b0
[ 111.586355] exit_to_user_mode_prepare+0x114/0x1a0
[ 111.586730] syscall_exit_to_user_mode+0x19/0x40
[ 111.587088] do_syscall_64+0x48/0x90
[ 111.587368] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 111.587755] RIP: 0033:0x7f5f809b7b19
[ 111.588033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 111.589355] RSP: 002b:00007f5f7df2d218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
[ 111.589915] RAX: 0000000000000001 RBX: 00007f5f80acaf68 RCX: 00007f5f809b7b19
[ 111.590435] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f5f80acaf6c
[ 111.590957] RBP: 00007f5f80acaf60 R08: 000000000000000e R09: 0000000000000000
[ 111.591478] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f5f80acaf6c
[ 111.591996] R13: 00007ffe1fe5794f R14: 00007f5f7df2d300 R15: 0000000000022000
[ 111.592522]
[ 111.592698] irq event stamp: 1052
[ 111.592955] hardirqs last enabled at (1051): [] exit_to_user_mode_prepare+0x109/0x1a0
[ 111.593646] hardirqs last disabled at (1052): [] __schedule+0x1225/0x2470
[ 111.594253] softirqs last enabled at (764): [] __irq_exit_rcu+0x11b/0x180
[ 111.594878] softirqs last disabled at (733): [] __irq_exit_rcu+0x11b/0x180
[ 111.595500] ---[ end trace 0000000000000000 ]---
11:40:27 executing program 7:
timer_create(0x0, 0x0, &(0x7f0000000580))
11:40:27 executing program 7:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
[ 111.748897] loop7: detected capacity change from 0 to 256
[ 111.803163] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 111.898409] random: crng reseeded on system resumption
11:40:27 executing program 6:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0)
fcntl$setstatus(r0, 0x4, 0x46000)
[ 111.937637] random: crng reseeded on system resumption
11:40:27 executing program 6:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0)
fcntl$setstatus(r0, 0x4, 0x46000)
[ 112.108432] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 112.592581] loop4: detected capacity change from 0 to 4096
[ 112.618296] EXT4-fs warning (device loop4): ext4_enable_quotas:6818: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix.
[ 112.623645] EXT4-fs (loop4): mount failed
11:40:30 executing program 1:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
11:40:30 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000200)={0x77359400}, 0x10)
11:40:30 executing program 5:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x0, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xf, 0x11, r1, 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write(r2, &(0x7f0000000080)="01", 0x41030)
11:40:30 executing program 4:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c20000120300000000000000000000000000000000000073797a6b", 0x7c, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012700)}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x4880}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f0000000000000100", 0x1c, 0x4c00}, {0x0}, {0x0}, {&(0x7f0000013400)}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}], 0x0, &(0x7f0000014a00))
11:40:30 executing program 3:
timer_create(0x0, &(0x7f0000000b40)={0x0, 0x0, 0x4, @thr={0x0, 0x0}}, 0x0)
11:40:30 executing program 0:
mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0)
shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4)
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040))
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18)
r2 = shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ff9000/0x2000)=nil)
shmctl$SHM_UNLOCK(r2, 0xc)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb)
r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3)
openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0)
shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ff5000/0x2000)=nil)
11:40:30 executing program 7:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
11:40:30 executing program 6:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0)
fcntl$setstatus(r0, 0x4, 0x46000)
[ 114.856433] loop1: detected capacity change from 0 to 256
[ 114.858363] loop4: detected capacity change from 0 to 4096
[ 114.859421] loop7: detected capacity change from 0 to 256
[ 114.866900] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 114.883794] EXT4-fs warning (device loop4): ext4_enable_quotas:6818: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix.
[ 114.888554] EXT4-fs (loop4): mount failed
[ 114.890837] random: crng reseeded on system resumption
[ 114.894194] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
11:40:30 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000200)={0x77359400}, 0x10)
11:40:30 executing program 6:
mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0)
shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4)
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040))
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18)
r2 = shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ff9000/0x2000)=nil)
shmctl$SHM_UNLOCK(r2, 0xc)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb)
r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3)
openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0)
shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ff5000/0x2000)=nil)
11:40:30 executing program 3:
timer_create(0x0, &(0x7f0000000b40)={0x0, 0x0, 0x4, @thr={0x0, 0x0}}, 0x0)
11:40:30 executing program 5:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x0, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xf, 0x11, r1, 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write(r2, &(0x7f0000000080)="01", 0x41030)
[ 114.995808] random: crng reseeded on system resumption
[ 115.076836] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 115.112017] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
11:40:30 executing program 7:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
11:40:30 executing program 5:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x0, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xf, 0x11, r1, 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write(r2, &(0x7f0000000080)="01", 0x41030)
11:40:30 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000200)={0x77359400}, 0x10)
11:40:30 executing program 6:
mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0)
shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4)
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040))
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18)
r2 = shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ff9000/0x2000)=nil)
shmctl$SHM_UNLOCK(r2, 0xc)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb)
r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3)
openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0)
shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ff5000/0x2000)=nil)
11:40:30 executing program 1:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
11:40:30 executing program 0:
mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0)
shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4)
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040))
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18)
r2 = shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ff9000/0x2000)=nil)
shmctl$SHM_UNLOCK(r2, 0xc)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb)
r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3)
openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0)
shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ff5000/0x2000)=nil)
11:40:30 executing program 4:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c20000120300000000000000000000000000000000000073797a6b", 0x7c, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012700)}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x4880}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f0000000000000100", 0x1c, 0x4c00}, {0x0}, {0x0}, {&(0x7f0000013400)}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}], 0x0, &(0x7f0000014a00))
11:40:30 executing program 3:
timer_create(0x0, &(0x7f0000000b40)={0x0, 0x0, 0x4, @thr={0x0, 0x0}}, 0x0)
[ 115.146730] loop4: detected capacity change from 0 to 4096
[ 115.147558] loop1: detected capacity change from 0 to 256
[ 115.154263] random: crng reseeded on system resumption
[ 115.169121] EXT4-fs warning (device loop4): ext4_enable_quotas:6818: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix.
[ 115.170855] EXT4-fs (loop4): mount failed
[ 115.172072] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 115.182467] loop7: detected capacity change from 0 to 256
[ 115.207101] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
11:40:30 executing program 4:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c20000120300000000000000000000000000000000000073797a6b", 0x7c, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012700)}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x4880}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f0000000000000100", 0x1c, 0x4c00}, {0x0}, {0x0}, {&(0x7f0000013400)}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}], 0x0, &(0x7f0000014a00))
[ 115.240031] loop4: detected capacity change from 0 to 4096
11:40:30 executing program 2:
mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0)
shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4)
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040))
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18)
r2 = shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ff9000/0x2000)=nil)
shmctl$SHM_UNLOCK(r2, 0xc)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb)
r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3)
openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0)
shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ff5000/0x2000)=nil)
11:40:30 executing program 3:
mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0)
shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4)
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040))
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18)
r2 = shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ff9000/0x2000)=nil)
shmctl$SHM_UNLOCK(r2, 0xc)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb)
r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3)
openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0)
shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ff5000/0x2000)=nil)
11:40:30 executing program 6:
mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0)
shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4)
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040))
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18)
r2 = shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ff9000/0x2000)=nil)
shmctl$SHM_UNLOCK(r2, 0xc)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb)
r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3)
openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0)
shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ff5000/0x2000)=nil)
[ 115.251470] EXT4-fs warning (device loop4): ext4_enable_quotas:6818: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix.
[ 115.254904] EXT4-fs (loop4): mount failed
[ 115.255997] hrtimer: interrupt took 19527 ns
[ 115.277841] random: crng reseeded on system resumption
11:40:30 executing program 5:
mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0)
shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4)
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040))
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18)
r2 = shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ff9000/0x2000)=nil)
shmctl$SHM_UNLOCK(r2, 0xc)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb)
r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3)
openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0)
shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ff5000/0x2000)=nil)
11:40:30 executing program 0:
mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0)
shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4)
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040))
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18)
r2 = shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ff9000/0x2000)=nil)
shmctl$SHM_UNLOCK(r2, 0xc)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb)
r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3)
openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0)
shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ff5000/0x2000)=nil)
[ 115.354968] random: crng reseeded on system resumption
[ 115.384106] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 115.442335] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 115.476939] random: crng reseeded on system resumption
11:40:30 executing program 2:
mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0)
shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4)
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040))
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18)
r2 = shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ff9000/0x2000)=nil)
shmctl$SHM_UNLOCK(r2, 0xc)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb)
r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3)
openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0)
shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ff5000/0x2000)=nil)
11:40:30 executing program 1:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
11:40:30 executing program 7:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
11:40:30 executing program 6:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
[ 115.579576] loop6: detected capacity change from 0 to 256
[ 115.592640] loop1: detected capacity change from 0 to 256
[ 115.609551] random: crng reseeded on system resumption
[ 115.613525] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 115.617527] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 115.622851] loop7: detected capacity change from 0 to 256
[ 115.625716] loop0: detected capacity change from 0 to 256
11:40:30 executing program 3:
mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0)
shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4)
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040))
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18)
r2 = shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ff9000/0x2000)=nil)
shmctl$SHM_UNLOCK(r2, 0xc)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb)
r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3)
openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0)
shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ff5000/0x2000)=nil)
11:40:30 executing program 5:
mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0)
shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4)
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040))
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18)
r2 = shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ff9000/0x2000)=nil)
shmctl$SHM_UNLOCK(r2, 0xc)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb)
r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3)
openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0)
shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ff5000/0x2000)=nil)
11:40:30 executing program 0:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
[ 115.672194] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 115.673851] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 115.727832] random: crng reseeded on system resumption
11:40:31 executing program 2:
mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0)
shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4)
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040))
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18)
r2 = shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ff9000/0x2000)=nil)
shmctl$SHM_UNLOCK(r2, 0xc)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb)
r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3)
openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0)
shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ff5000/0x2000)=nil)
11:40:31 executing program 5:
mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0)
shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4)
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040))
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18)
r2 = shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ff9000/0x2000)=nil)
shmctl$SHM_UNLOCK(r2, 0xc)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb)
r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3)
openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0)
shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ff5000/0x2000)=nil)
11:40:31 executing program 3:
mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0)
shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4)
ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040))
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18)
r2 = shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ff9000/0x2000)=nil)
shmctl$SHM_UNLOCK(r2, 0xc)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb)
r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3)
openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0)
shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ff5000/0x2000)=nil)
[ 115.773266] random: crng reseeded on system resumption
11:40:31 executing program 4:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
[ 115.812391] loop4: detected capacity change from 0 to 256
11:40:31 executing program 2:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
[ 115.827641] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 115.835071] loop2: detected capacity change from 0 to 256
[ 115.845490] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
11:40:31 executing program 3:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
[ 115.905660] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 115.911967] loop3: detected capacity change from 0 to 256
11:40:31 executing program 6:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
11:40:31 executing program 5:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
[ 115.943749] loop5: detected capacity change from 0 to 256
[ 115.945582] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 115.952372] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 115.981737] loop6: detected capacity change from 0 to 256
[ 115.994707] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 116.000317] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
11:40:31 executing program 1:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
[ 116.024475] loop1: detected capacity change from 0 to 256
[ 116.079952] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 116.101557] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 116.125850] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 116.203953] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 116.224222] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 116.232647] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 116.244740] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 116.344956] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 116.526305] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 116.543614] loop3: detected capacity change from 0 to 256
[ 116.549077] loop2: detected capacity change from 0 to 256
11:40:31 executing program 4:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
11:40:31 executing program 6:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
11:40:31 executing program 2:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
11:40:31 executing program 3:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
11:40:31 executing program 7:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
11:40:31 executing program 0:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
[ 116.553209] loop6: detected capacity change from 0 to 256
11:40:31 executing program 1:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
11:40:31 executing program 5:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
[ 116.576712] loop4: detected capacity change from 0 to 256
[ 116.578621] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 116.579477] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 116.580323] loop5: detected capacity change from 0 to 256
[ 116.581152] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 116.589376] loop0: detected capacity change from 0 to 256
[ 116.591770] loop7: detected capacity change from 0 to 256
[ 116.594634] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 116.595483] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 116.604332] loop1: detected capacity change from 0 to 256
[ 116.658185] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 116.665393] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 116.667353] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 116.936078] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 116.940508] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 116.944565] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 116.945509] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 116.949227] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
11:40:32 executing program 4:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
11:40:32 executing program 5:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
11:40:32 executing program 3:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
11:40:32 executing program 2:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
11:40:32 executing program 6:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f000000c340)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)={0x1c, 0x5e, 0xe21, 0x0, 0x0, "", [@generic="05654948e00b785de3"]}, 0x1c}], 0x1}, 0x0)
[ 116.996781] loop2: detected capacity change from 0 to 256
[ 117.008358] loop3: detected capacity change from 0 to 256
[ 117.008809] loop5: detected capacity change from 0 to 256
[ 117.016551] loop4: detected capacity change from 0 to 256
[ 117.018686] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 117.029022] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 117.032048] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
11:40:32 executing program 6:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f000000c340)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)={0x1c, 0x5e, 0xe21, 0x0, 0x0, "", [@generic="05654948e00b785de3"]}, 0x1c}], 0x1}, 0x0)
[ 117.056246] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 117.115621] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
11:40:32 executing program 1:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
11:40:32 executing program 6:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f000000c340)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)={0x1c, 0x5e, 0xe21, 0x0, 0x0, "", [@generic="05654948e00b785de3"]}, 0x1c}], 0x1}, 0x0)
[ 117.163207] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 117.167578] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
11:40:32 executing program 7:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
11:40:32 executing program 0:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
[ 117.202267] loop1: detected capacity change from 0 to 256
[ 117.221625] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
11:40:32 executing program 6:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f000000c340)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)={0x1c, 0x5e, 0xe21, 0x0, 0x0, "", [@generic="05654948e00b785de3"]}, 0x1c}], 0x1}, 0x0)
[ 117.232132] loop0: detected capacity change from 0 to 256
[ 117.233515] loop7: detected capacity change from 0 to 256
[ 117.252898] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 117.254437] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 117.298368] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 117.302253] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 117.317597] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
11:40:32 executing program 5:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
sendmmsg$inet(r0, &(0x7f0000002600)=[{{&(0x7f0000000100)={0x2, 0x4e24, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000001080)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp_prespec={0x7, 0xc, 0x5, 0x3, 0x0, [{@remote}]}]}}}], 0x20}}], 0x1, 0x0)
11:40:32 executing program 2:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, 0x0, 0x0)
11:40:32 executing program 6:
r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
pidfd_send_signal(r0, 0x0, &(0x7f00000000c0)={0x25, 0x0, 0x7fff}, 0x0)
11:40:32 executing program 4:
get_thread_area(&(0x7f0000000000)={0x1, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1})
set_thread_area(&(0x7f0000000040)={0x20, 0x20001000, 0x1000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1})
set_thread_area(&(0x7f0000000080)={0x0, 0x100000, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1})
modify_ldt$write2(0x11, &(0x7f00000000c0)={0x5, 0x20000000, 0x1000, 0x1, 0x0, 0x0, 0x1}, 0x10)
modify_ldt$write(0x1, &(0x7f0000000100)={0x648, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10)
get_thread_area(0x0)
modify_ldt$write2(0x11, &(0x7f00000001c0)={0x0, 0x20001000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10)
set_thread_area(0x0)
set_thread_area(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1})
get_thread_area(0x0)
get_thread_area(&(0x7f0000000300)={0x1, 0x0, 0x2000, 0x0, 0x2})
11:40:32 executing program 5:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
sendmmsg$inet(r0, &(0x7f0000002600)=[{{&(0x7f0000000100)={0x2, 0x4e24, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000001080)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp_prespec={0x7, 0xc, 0x5, 0x3, 0x0, [{@remote}]}]}}}], 0x20}}], 0x1, 0x0)
11:40:32 executing program 2:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, 0x0, 0x0)
11:40:32 executing program 4:
get_thread_area(&(0x7f0000000000)={0x1, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1})
set_thread_area(&(0x7f0000000040)={0x20, 0x20001000, 0x1000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1})
set_thread_area(&(0x7f0000000080)={0x0, 0x100000, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1})
modify_ldt$write2(0x11, &(0x7f00000000c0)={0x5, 0x20000000, 0x1000, 0x1, 0x0, 0x0, 0x1}, 0x10)
modify_ldt$write(0x1, &(0x7f0000000100)={0x648, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10)
get_thread_area(0x0)
modify_ldt$write2(0x11, &(0x7f00000001c0)={0x0, 0x20001000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10)
set_thread_area(0x0)
set_thread_area(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1})
get_thread_area(0x0)
get_thread_area(&(0x7f0000000300)={0x1, 0x0, 0x2000, 0x0, 0x2})
[ 117.508421] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 117.558477] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 117.560879] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 117.676013] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
11:40:33 executing program 2:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, 0x0, 0x0)
11:40:33 executing program 4:
get_thread_area(&(0x7f0000000000)={0x1, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1})
set_thread_area(&(0x7f0000000040)={0x20, 0x20001000, 0x1000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1})
set_thread_area(&(0x7f0000000080)={0x0, 0x100000, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1})
modify_ldt$write2(0x11, &(0x7f00000000c0)={0x5, 0x20000000, 0x1000, 0x1, 0x0, 0x0, 0x1}, 0x10)
modify_ldt$write(0x1, &(0x7f0000000100)={0x648, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10)
get_thread_area(0x0)
modify_ldt$write2(0x11, &(0x7f00000001c0)={0x0, 0x20001000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10)
set_thread_area(0x0)
set_thread_area(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1})
get_thread_area(0x0)
get_thread_area(&(0x7f0000000300)={0x1, 0x0, 0x2000, 0x0, 0x2})
11:40:33 executing program 5:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
sendmmsg$inet(r0, &(0x7f0000002600)=[{{&(0x7f0000000100)={0x2, 0x4e24, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000001080)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp_prespec={0x7, 0xc, 0x5, 0x3, 0x0, [{@remote}]}]}}}], 0x20}}], 0x1, 0x0)
11:40:33 executing program 6:
r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
pidfd_send_signal(r0, 0x0, &(0x7f00000000c0)={0x25, 0x0, 0x7fff}, 0x0)
11:40:33 executing program 7:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
11:40:33 executing program 0:
get_thread_area(&(0x7f0000000000)={0x1, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1})
set_thread_area(&(0x7f0000000040)={0x20, 0x20001000, 0x1000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1})
set_thread_area(&(0x7f0000000080)={0x0, 0x100000, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1})
modify_ldt$write2(0x11, &(0x7f00000000c0)={0x5, 0x20000000, 0x1000, 0x1, 0x0, 0x0, 0x1}, 0x10)
modify_ldt$write(0x1, &(0x7f0000000100)={0x648, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10)
get_thread_area(0x0)
modify_ldt$write2(0x11, &(0x7f00000001c0)={0x0, 0x20001000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10)
set_thread_area(0x0)
set_thread_area(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1})
get_thread_area(0x0)
get_thread_area(&(0x7f0000000300)={0x1, 0x0, 0x2000, 0x0, 0x2})
[ 117.726681] loop7: detected capacity change from 0 to 256
11:40:33 executing program 3:
get_thread_area(&(0x7f0000000000)={0x1, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1})
set_thread_area(&(0x7f0000000040)={0x20, 0x20001000, 0x1000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1})
set_thread_area(&(0x7f0000000080)={0x0, 0x100000, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1})
modify_ldt$write2(0x11, &(0x7f00000000c0)={0x5, 0x20000000, 0x1000, 0x1, 0x0, 0x0, 0x1}, 0x10)
modify_ldt$write(0x1, &(0x7f0000000100)={0x648, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10)
get_thread_area(0x0)
modify_ldt$write2(0x11, &(0x7f00000001c0)={0x0, 0x20001000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10)
set_thread_area(0x0)
set_thread_area(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1})
get_thread_area(0x0)
get_thread_area(&(0x7f0000000300)={0x1, 0x0, 0x2000, 0x0, 0x2})
[ 117.788714] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 117.936043] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
11:40:33 executing program 0:
get_thread_area(&(0x7f0000000000)={0x1, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1})
set_thread_area(&(0x7f0000000040)={0x20, 0x20001000, 0x1000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1})
set_thread_area(&(0x7f0000000080)={0x0, 0x100000, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1})
modify_ldt$write2(0x11, &(0x7f00000000c0)={0x5, 0x20000000, 0x1000, 0x1, 0x0, 0x0, 0x1}, 0x10)
modify_ldt$write(0x1, &(0x7f0000000100)={0x648, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10)
get_thread_area(0x0)
modify_ldt$write2(0x11, &(0x7f00000001c0)={0x0, 0x20001000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10)
set_thread_area(0x0)
set_thread_area(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1})
get_thread_area(0x0)
get_thread_area(&(0x7f0000000300)={0x1, 0x0, 0x2000, 0x0, 0x2})
11:40:33 executing program 4:
get_thread_area(&(0x7f0000000000)={0x1, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1})
set_thread_area(&(0x7f0000000040)={0x20, 0x20001000, 0x1000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1})
set_thread_area(&(0x7f0000000080)={0x0, 0x100000, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1})
modify_ldt$write2(0x11, &(0x7f00000000c0)={0x5, 0x20000000, 0x1000, 0x1, 0x0, 0x0, 0x1}, 0x10)
modify_ldt$write(0x1, &(0x7f0000000100)={0x648, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10)
get_thread_area(0x0)
modify_ldt$write2(0x11, &(0x7f00000001c0)={0x0, 0x20001000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10)
set_thread_area(0x0)
set_thread_area(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1})
get_thread_area(0x0)
get_thread_area(&(0x7f0000000300)={0x1, 0x0, 0x2000, 0x0, 0x2})
11:40:33 executing program 3:
get_thread_area(&(0x7f0000000000)={0x1, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1})
set_thread_area(&(0x7f0000000040)={0x20, 0x20001000, 0x1000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1})
set_thread_area(&(0x7f0000000080)={0x0, 0x100000, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1})
modify_ldt$write2(0x11, &(0x7f00000000c0)={0x5, 0x20000000, 0x1000, 0x1, 0x0, 0x0, 0x1}, 0x10)
modify_ldt$write(0x1, &(0x7f0000000100)={0x648, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10)
get_thread_area(0x0)
modify_ldt$write2(0x11, &(0x7f00000001c0)={0x0, 0x20001000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10)
set_thread_area(0x0)
set_thread_area(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1})
get_thread_area(0x0)
get_thread_area(&(0x7f0000000300)={0x1, 0x0, 0x2000, 0x0, 0x2})
11:40:33 executing program 6:
r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
pidfd_send_signal(r0, 0x0, &(0x7f00000000c0)={0x25, 0x0, 0x7fff}, 0x0)
11:40:33 executing program 2:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, 0x0, 0x0)
11:40:33 executing program 5:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
sendmmsg$inet(r0, &(0x7f0000002600)=[{{&(0x7f0000000100)={0x2, 0x4e24, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000001080)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp_prespec={0x7, 0xc, 0x5, 0x3, 0x0, [{@remote}]}]}}}], 0x20}}], 0x1, 0x0)
11:40:33 executing program 1:
r0 = syz_open_procfs$userns(0x0, &(0x7f0000000180))
mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x100000, 0x0, 0x0, {r0}}, 0x20)
11:40:33 executing program 1:
r0 = syz_open_procfs$userns(0x0, &(0x7f0000000180))
mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x100000, 0x0, 0x0, {r0}}, 0x20)
11:40:33 executing program 3:
get_thread_area(&(0x7f0000000000)={0x1, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1})
set_thread_area(&(0x7f0000000040)={0x20, 0x20001000, 0x1000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1})
set_thread_area(&(0x7f0000000080)={0x0, 0x100000, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1})
modify_ldt$write2(0x11, &(0x7f00000000c0)={0x5, 0x20000000, 0x1000, 0x1, 0x0, 0x0, 0x1}, 0x10)
modify_ldt$write(0x1, &(0x7f0000000100)={0x648, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10)
get_thread_area(0x0)
modify_ldt$write2(0x11, &(0x7f00000001c0)={0x0, 0x20001000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10)
set_thread_area(0x0)
set_thread_area(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1})
get_thread_area(0x0)
get_thread_area(&(0x7f0000000300)={0x1, 0x0, 0x2000, 0x0, 0x2})
11:40:33 executing program 7:
syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00')
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)={0x2c, r1, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x223}]]}, 0x2c}}, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r3 = socket$nl_generic(0x10, 0x3, 0x10)
r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_CONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)={0x2c, r4, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r5}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x223}]]}, 0x2c}}, 0x0)
11:40:33 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000008180), 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f00000081c0)={0x7ff})
11:40:33 executing program 6:
r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
pidfd_send_signal(r0, 0x0, &(0x7f00000000c0)={0x25, 0x0, 0x7fff}, 0x0)
11:40:33 executing program 0:
get_thread_area(&(0x7f0000000000)={0x1, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1})
set_thread_area(&(0x7f0000000040)={0x20, 0x20001000, 0x1000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1})
set_thread_area(&(0x7f0000000080)={0x0, 0x100000, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1})
modify_ldt$write2(0x11, &(0x7f00000000c0)={0x5, 0x20000000, 0x1000, 0x1, 0x0, 0x0, 0x1}, 0x10)
modify_ldt$write(0x1, &(0x7f0000000100)={0x648, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10)
get_thread_area(0x0)
modify_ldt$write2(0x11, &(0x7f00000001c0)={0x0, 0x20001000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10)
set_thread_area(0x0)
set_thread_area(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1})
get_thread_area(0x0)
get_thread_area(&(0x7f0000000300)={0x1, 0x0, 0x2000, 0x0, 0x2})
11:40:33 executing program 1:
r0 = syz_open_procfs$userns(0x0, &(0x7f0000000180))
mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x100000, 0x0, 0x0, {r0}}, 0x20)
11:40:33 executing program 3:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
mount$cgroup2(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x0, 0x0)
setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000180)='system_u:object_r:restorecond_exec_t:s0\x00', 0x28, 0x0)
11:40:33 executing program 5:
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)={0x3f, 0x5, 0x9, 0x3, 0x40})
ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xa6bc}}, './file0\x00'})
r1 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0xa7d4, 0x0, 0xfffffffd, 0x20, 0x0, r0}, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0)
r4 = socket$nl_route(0x10, 0x3, 0x0)
syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r4, 0x0, 0x0, 0xfffffffffffffe74}, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r4, 0x4004662b, &(0x7f0000000240)=0x4)
io_uring_enter(r1, 0x1, 0x0, 0x0, 0x0, 0x0)
r5 = socket$netlink(0x10, 0x3, 0x10)
sendmsg$netlink(r5, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c"], 0x20}], 0x1}, 0x0)
11:40:33 executing program 2:
syz_emit_vhci(&(0x7f00000000c0)=@HCI_EVENT_PKT={0x4, @hci_ev_num_comp_pkts={{0x13, 0x9}, {0x2, [{0xc9, 0x1}, {0xc8, 0x7}]}}}, 0xc)
[ 118.104737] audit: type=1400 audit(1663242033.493:9): avc: denied { associate } for pid=4157 comm="syz-executor.3" name="ssh.service" dev="cgroup2" ino=1076 scontext=system_u:object_r:restorecond_exec_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=filesystem permissive=1
[ 118.112281] netlink: 'syz-executor.5': attribute type 12 has an invalid length.
[ 118.131203] ieee80211 phy2: Selected rate control algorithm 'minstrel_ht'
11:40:33 executing program 1:
r0 = syz_open_procfs$userns(0x0, &(0x7f0000000180))
mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x100000, 0x0, 0x0, {r0}}, 0x20)
11:40:33 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000008180), 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f00000081c0)={0x7ff})
11:40:33 executing program 3:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
mount$cgroup2(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x0, 0x0)
setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000180)='system_u:object_r:restorecond_exec_t:s0\x00', 0x28, 0x0)
11:40:33 executing program 2:
syz_emit_vhci(&(0x7f00000000c0)=@HCI_EVENT_PKT={0x4, @hci_ev_num_comp_pkts={{0x13, 0x9}, {0x2, [{0xc9, 0x1}, {0xc8, 0x7}]}}}, 0xc)
11:40:33 executing program 6:
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
rmdir(&(0x7f0000000140)='./file1\x00')
11:40:33 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101002, 0x0)
pwrite64(r1, &(0x7f00000006c0)='y', 0x1, 0x80000)
preadv2(r0, &(0x7f0000000200)=[{&(0x7f0000000700)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe)
11:40:33 executing program 3:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
mount$cgroup2(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x0, 0x0)
setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000180)='system_u:object_r:restorecond_exec_t:s0\x00', 0x28, 0x0)
11:40:33 executing program 1:
r0 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4)
sendmmsg$inet6(r0, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2aed6b2e912b9b602fb9d8f259d4c688fd6bea53c8134f5a03dcd57f96c7e9e918aec068a10c1f40e570d5f1b1a1cead337e49a95835c9385c30b5bf203f05032df110bce50a656a9c2f030b5ea70a70c7313dc626480d1b8077fe1522b851504fe8380e91196e523a8658165761f7e3457b0e401d62ff0f844e3a1d77426edfd17df7d600b20713f02f1fe3fe8b47c15deefc12b753ad5ccd9505d6f21a73db73e887", 0xa3}, {&(0x7f0000000200)="03f67ae6b8ad23ed9a712d8c9040e430a6b1ccaa027e8dea10fa438db0307c66f18ece952d5ee12abb53f52fe9a706aea3d873996316356bf81be138aad04eb5ff3a1f01128181e977c5a6e4b606cfca35d49e0e55bc22bd0cdb38302efd786d00529ecfce5044ee83b934ec2c", 0x6d}, {&(0x7f0000000280)="dc0f3025220dd22e59a8379a40ba57a2ba8812efc31672a461339ace6107a263a69ba84ee4b34f90e951c1256169c039ecde889e9f253f2b9cca9ada9c3050b88b67a42814394b1a60a68c0c34cf21ba2af90d9340f729080f496a833ea7f88269a09a275f188329be91e75a4781ebf4af525232a825d1017f0c6ec88609ae4d97dafdb249b0f00f714b39737c64", 0x8e}], 0x3}}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="b41d23ce3c4343be62d292f5400966ce32c95319c3d69beaa06b1feaa4f7e2623ff664ae696df81d86ac626371460d7183febfa45e7c9ab7d32eec64178835f6316a2965a627e3d652fee419959e41f08cd0e2ea3887f05b4118beb38da9669a072428f0c8998d3591743a0daa9e0fa5f3853ca59c604a987c0574", 0x7b}], 0x1}}], 0x2, 0x4000001)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4)
11:40:33 executing program 7:
syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00')
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)={0x2c, r1, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x223}]]}, 0x2c}}, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r3 = socket$nl_generic(0x10, 0x3, 0x10)
r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_CONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)={0x2c, r4, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r5}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x223}]]}, 0x2c}}, 0x0)
11:40:33 executing program 2:
syz_emit_vhci(&(0x7f00000000c0)=@HCI_EVENT_PKT={0x4, @hci_ev_num_comp_pkts={{0x13, 0x9}, {0x2, [{0xc9, 0x1}, {0xc8, 0x7}]}}}, 0xc)
11:40:33 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000008180), 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f00000081c0)={0x7ff})
11:40:33 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101002, 0x0)
pwrite64(r1, &(0x7f00000006c0)='y', 0x1, 0x80000)
preadv2(r0, &(0x7f0000000200)=[{&(0x7f0000000700)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe)
11:40:33 executing program 6:
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
rmdir(&(0x7f0000000140)='./file1\x00')
11:40:33 executing program 3:
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
mount$cgroup2(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x0, 0x0)
setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000180)='system_u:object_r:restorecond_exec_t:s0\x00', 0x28, 0x0)
11:40:33 executing program 5:
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)={0x3f, 0x5, 0x9, 0x3, 0x40})
ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xa6bc}}, './file0\x00'})
r1 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0xa7d4, 0x0, 0xfffffffd, 0x20, 0x0, r0}, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0)
r4 = socket$nl_route(0x10, 0x3, 0x0)
syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r4, 0x0, 0x0, 0xfffffffffffffe74}, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r4, 0x4004662b, &(0x7f0000000240)=0x4)
io_uring_enter(r1, 0x1, 0x0, 0x0, 0x0, 0x0)
r5 = socket$netlink(0x10, 0x3, 0x10)
sendmsg$netlink(r5, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c"], 0x20}], 0x1}, 0x0)
11:40:33 executing program 1:
r0 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4)
sendmmsg$inet6(r0, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2aed6b2e912b9b602fb9d8f259d4c688fd6bea53c8134f5a03dcd57f96c7e9e918aec068a10c1f40e570d5f1b1a1cead337e49a95835c9385c30b5bf203f05032df110bce50a656a9c2f030b5ea70a70c7313dc626480d1b8077fe1522b851504fe8380e91196e523a8658165761f7e3457b0e401d62ff0f844e3a1d77426edfd17df7d600b20713f02f1fe3fe8b47c15deefc12b753ad5ccd9505d6f21a73db73e887", 0xa3}, {&(0x7f0000000200)="03f67ae6b8ad23ed9a712d8c9040e430a6b1ccaa027e8dea10fa438db0307c66f18ece952d5ee12abb53f52fe9a706aea3d873996316356bf81be138aad04eb5ff3a1f01128181e977c5a6e4b606cfca35d49e0e55bc22bd0cdb38302efd786d00529ecfce5044ee83b934ec2c", 0x6d}, {&(0x7f0000000280)="dc0f3025220dd22e59a8379a40ba57a2ba8812efc31672a461339ace6107a263a69ba84ee4b34f90e951c1256169c039ecde889e9f253f2b9cca9ada9c3050b88b67a42814394b1a60a68c0c34cf21ba2af90d9340f729080f496a833ea7f88269a09a275f188329be91e75a4781ebf4af525232a825d1017f0c6ec88609ae4d97dafdb249b0f00f714b39737c64", 0x8e}], 0x3}}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000600)="b41d23ce3c4343be62d292f5400966ce32c95319c3d69beaa06b1feaa4f7e2623ff664ae696df81d86ac626371460d7183febfa45e7c9ab7d32eec64178835f6316a2965a627e3d652fee419959e41f08cd0e2ea3887f05b4118beb38da9669a072428f0c8998d3591743a0daa9e0fa5f3853ca59c604a987c0574", 0x7b}], 0x1}}], 0x2, 0x4000001)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4)
[ 118.422625] netlink: 'syz-executor.5': attribute type 12 has an invalid length.
11:40:33 executing program 2:
syz_emit_vhci(&(0x7f00000000c0)=@HCI_EVENT_PKT={0x4, @hci_ev_num_comp_pkts={{0x13, 0x9}, {0x2, [{0xc9, 0x1}, {0xc8, 0x7}]}}}, 0xc)
11:40:33 executing program 1:
r0 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4)
sendmmsg$inet6(r0, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2aed6b2e912b9b602fb9d8f259d4c688fd6bea53c8134f5a03dcd57f96c7e9e918aec068a10c1f40e570d5f1b1a1cead337e49a95835c9385c30b5bf203f05032df110bce50a656a9c2f030b5ea70a70c7313dc626480d1b8077fe1522b851504fe8380e91196e523a8658165761f7e3457b0e401d62ff0f844e3a1d77426edfd17df7d600b20713f02f1fe3fe8b47c15deefc12b753ad5ccd9505d6f21a73db73e887", 0xa3}, {&(0x7f0000000200)="03f67ae6b8ad23ed9a712d8c9040e430a6b1ccaa027e8dea10fa438db0307c66f18ece952d5ee12abb53f52fe9a706aea3d873996316356bf81be138aad04eb5ff3a1f01128181e977c5a6e4b606cfca35d49e0e55bc22bd0cdb38302efd786d00529ecfce5044ee83b934ec2c", 0x6d}, {&(0x7f0000000280)="dc0f3025220dd22e59a8379a40ba57a2ba8812efc31672a461339ace6107a263a69ba84ee4b34f90e951c1256169c039ecde889e9f253f2b9cca9ada9c3050b88b67a42814394b1a60a68c0c34cf21ba2a
VM DIAGNOSIS:
11:40:27 Registers:
info registers vcpu 0
RAX=000000000000007b RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8
RSI=ffffffff822b29f1 RDI=ffffffff87641ba0 RBP=ffffffff87641b60 RSP=ffff88803e61f698
R8 =0000000000000001 R9 =000000000000000a R10=000000000000007b R11=0000000000000001
R12=000000000000007b R13=ffffffff87641b60 R14=0000000000000010 R15=ffffffff822b29e0
RIP=ffffffff822b2a49 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 00007f5f7df2d700 00000000 00000000
GS =0000 ffff88806ce00000 00000000 00000000
LDT=0000 fffffe0000000000 00000000 00000000
TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy
GDT= fffffe0000001000 0000007f
IDT= fffffe0000000000 00000fff
CR0=80050033 CR2=00007f45b9812368 CR3=000000001da36000 CR4=00350ef0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM01=0000000000000000 0000000000000000 00007f5f80a9e7c0 00007f5f80a9e7c8
YMM02=0000000000000000 0000000000000000 00007f5f80a9e7e0 00007f5f80a9e7c0
YMM03=0000000000000000 0000000000000000 00007f5f80a9e7c8 00007f5f80a9e7c0
YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000
YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245
YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040
YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000
info registers vcpu 1
RAX=dffffc0000000000 RBX=ffffffff854c5920 RCX=0000000000000000 RDX=0000000000000000
RSI=0000000000000170 RDI=ffff88803b1f6414 RBP=0000000000000170 RSP=ffff8880175876c8
R8 =0000000000000000 R9 =ffffffff85b02f57 R10=0000000000000000 R11=0000000000000001
R12=ffff88803b1f5040 R13=ffffffff817bd5ad R14=0000000000092cc0 R15=0000000000092cc0
RIP=ffffffff84081b6c RFL=00000217 [----APC] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 0000000000000000 00000000 00000000
GS =0000 ffff88806cf00000 00000000 00000000
LDT=0000 fffffe0000000000 00000000 00000000
TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy
GDT= fffffe0000048000 0000007f
IDT= fffffe0000000000 00000fff
CR0=80050033 CR2=00007f5fcfb808e0 CR3=000000001853a000 CR4=00350ee0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
YMM00=0000000000000000 0000000000000000 756e696c2d34365f 3638782f62696c2f
YMM01=0000000000000000 0000000000000000 00362e6f732e6362 696c2f756e672d78
YMM02=0000000000000000 0000000000000000 ffff0000000000ff ffffffffffffffff
YMM03=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff
YMM04=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000