Warning: Permanently added '[localhost]:40744' (ECDSA) to the list of known hosts. 2022/09/12 15:18:18 fuzzer started 2022/09/12 15:18:18 dialing manager at localhost:38027 syzkaller login: [ 44.225986] cgroup: Unknown subsys name 'net' [ 44.315257] cgroup: Unknown subsys name 'rlimit' 2022/09/12 15:18:32 syscalls: 2215 2022/09/12 15:18:32 code coverage: enabled 2022/09/12 15:18:32 comparison tracing: enabled 2022/09/12 15:18:32 extra coverage: enabled 2022/09/12 15:18:32 setuid sandbox: enabled 2022/09/12 15:18:32 namespace sandbox: enabled 2022/09/12 15:18:32 Android sandbox: enabled 2022/09/12 15:18:32 fault injection: enabled 2022/09/12 15:18:32 leak checking: enabled 2022/09/12 15:18:32 net packet injection: enabled 2022/09/12 15:18:32 net device setup: enabled 2022/09/12 15:18:32 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/12 15:18:32 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/12 15:18:32 USB emulation: enabled 2022/09/12 15:18:32 hci packet injection: enabled 2022/09/12 15:18:32 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220912) 2022/09/12 15:18:32 802.15.4 emulation: enabled 2022/09/12 15:18:32 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/12 15:18:32 fetching corpus: 50, signal 38646/41918 (executing program) 2022/09/12 15:18:32 fetching corpus: 100, signal 49359/53989 (executing program) 2022/09/12 15:18:32 fetching corpus: 150, signal 58974/64793 (executing program) 2022/09/12 15:18:32 fetching corpus: 200, signal 63997/71071 (executing program) 2022/09/12 15:18:32 fetching corpus: 250, signal 72280/80283 (executing program) 2022/09/12 15:18:32 fetching corpus: 300, signal 77322/86374 (executing program) 2022/09/12 15:18:33 fetching corpus: 350, signal 81029/91109 (executing program) 2022/09/12 15:18:33 fetching corpus: 400, signal 84558/95620 (executing program) 2022/09/12 15:18:33 fetching corpus: 450, signal 89295/101151 (executing program) 2022/09/12 15:18:33 fetching corpus: 500, signal 92025/104785 (executing program) 2022/09/12 15:18:33 fetching corpus: 550, signal 94521/108204 (executing program) 2022/09/12 15:18:33 fetching corpus: 600, signal 98046/112467 (executing program) 2022/09/12 15:18:33 fetching corpus: 650, signal 100845/116058 (executing program) 2022/09/12 15:18:33 fetching corpus: 700, signal 103477/119400 (executing program) 2022/09/12 15:18:34 fetching corpus: 750, signal 106408/122934 (executing program) 2022/09/12 15:18:34 fetching corpus: 800, signal 109039/126160 (executing program) 2022/09/12 15:18:34 fetching corpus: 850, signal 112519/130102 (executing program) 2022/09/12 15:18:34 fetching corpus: 900, signal 115004/133180 (executing program) 2022/09/12 15:18:34 fetching corpus: 950, signal 117383/136060 (executing program) 2022/09/12 15:18:34 fetching corpus: 1000, signal 119555/138740 (executing program) 2022/09/12 15:18:34 fetching corpus: 1050, signal 122083/141626 (executing program) 2022/09/12 15:18:34 fetching corpus: 1100, signal 124367/144364 (executing program) 2022/09/12 15:18:35 fetching corpus: 1150, signal 126175/146653 (executing program) 2022/09/12 15:18:35 fetching corpus: 1200, signal 127631/148646 (executing program) 2022/09/12 15:18:35 fetching corpus: 1250, signal 128819/150448 (executing program) 2022/09/12 15:18:35 fetching corpus: 1300, signal 130474/152499 (executing program) 2022/09/12 15:18:35 fetching corpus: 1350, signal 132868/155094 (executing program) 2022/09/12 15:18:35 fetching corpus: 1400, signal 134752/157336 (executing program) 2022/09/12 15:18:35 fetching corpus: 1450, signal 137186/159904 (executing program) 2022/09/12 15:18:35 fetching corpus: 1500, signal 138661/161711 (executing program) 2022/09/12 15:18:36 fetching corpus: 1550, signal 140214/163536 (executing program) 2022/09/12 15:18:36 fetching corpus: 1600, signal 141572/165217 (executing program) 2022/09/12 15:18:36 fetching corpus: 1650, signal 143222/167261 (executing program) 2022/09/12 15:18:36 fetching corpus: 1700, signal 144916/169170 (executing program) 2022/09/12 15:18:36 fetching corpus: 1750, signal 146781/171105 (executing program) 2022/09/12 15:18:36 fetching corpus: 1800, signal 148031/172615 (executing program) 2022/09/12 15:18:36 fetching corpus: 1850, signal 149554/174326 (executing program) 2022/09/12 15:18:37 fetching corpus: 1900, signal 151081/176033 (executing program) 2022/09/12 15:18:37 fetching corpus: 1950, signal 152732/177733 (executing program) 2022/09/12 15:18:37 fetching corpus: 2000, signal 153728/178969 (executing program) 2022/09/12 15:18:37 fetching corpus: 2050, signal 155583/180683 (executing program) 2022/09/12 15:18:37 fetching corpus: 2100, signal 156874/182092 (executing program) 2022/09/12 15:18:37 fetching corpus: 2150, signal 158308/183533 (executing program) 2022/09/12 15:18:38 fetching corpus: 2200, signal 159990/185076 (executing program) 2022/09/12 15:18:38 fetching corpus: 2250, signal 161248/186383 (executing program) 2022/09/12 15:18:38 fetching corpus: 2300, signal 162452/187698 (executing program) 2022/09/12 15:18:38 fetching corpus: 2350, signal 163720/188984 (executing program) 2022/09/12 15:18:38 fetching corpus: 2400, signal 164775/190091 (executing program) 2022/09/12 15:18:38 fetching corpus: 2450, signal 166862/191771 (executing program) 2022/09/12 15:18:38 fetching corpus: 2500, signal 167670/192705 (executing program) 2022/09/12 15:18:39 fetching corpus: 2550, signal 168530/193619 (executing program) 2022/09/12 15:18:39 fetching corpus: 2600, signal 169419/194566 (executing program) 2022/09/12 15:18:39 fetching corpus: 2650, signal 170352/195538 (executing program) 2022/09/12 15:18:39 fetching corpus: 2700, signal 170982/196296 (executing program) 2022/09/12 15:18:39 fetching corpus: 2750, signal 171898/197199 (executing program) 2022/09/12 15:18:39 fetching corpus: 2800, signal 173007/198165 (executing program) 2022/09/12 15:18:39 fetching corpus: 2850, signal 174308/199211 (executing program) 2022/09/12 15:18:40 fetching corpus: 2900, signal 175492/200215 (executing program) 2022/09/12 15:18:40 fetching corpus: 2950, signal 176806/201278 (executing program) 2022/09/12 15:18:40 fetching corpus: 3000, signal 177555/202013 (executing program) 2022/09/12 15:18:40 fetching corpus: 3050, signal 178532/202821 (executing program) 2022/09/12 15:18:40 fetching corpus: 3100, signal 179317/203539 (executing program) 2022/09/12 15:18:40 fetching corpus: 3150, signal 179854/204161 (executing program) 2022/09/12 15:18:40 fetching corpus: 3200, signal 180659/204878 (executing program) 2022/09/12 15:18:41 fetching corpus: 3250, signal 182437/206017 (executing program) 2022/09/12 15:18:41 fetching corpus: 3300, signal 183354/206738 (executing program) 2022/09/12 15:18:41 fetching corpus: 3350, signal 184075/207354 (executing program) 2022/09/12 15:18:41 fetching corpus: 3400, signal 184932/208044 (executing program) 2022/09/12 15:18:41 fetching corpus: 3450, signal 185941/208706 (executing program) 2022/09/12 15:18:41 fetching corpus: 3500, signal 187023/209583 (executing program) 2022/09/12 15:18:42 fetching corpus: 3550, signal 187864/210169 (executing program) 2022/09/12 15:18:42 fetching corpus: 3600, signal 188816/210794 (executing program) 2022/09/12 15:18:42 fetching corpus: 3650, signal 189534/211297 (executing program) 2022/09/12 15:18:42 fetching corpus: 3700, signal 190368/211804 (executing program) 2022/09/12 15:18:42 fetching corpus: 3750, signal 190933/212264 (executing program) 2022/09/12 15:18:42 fetching corpus: 3800, signal 191716/212802 (executing program) 2022/09/12 15:18:42 fetching corpus: 3850, signal 193037/213457 (executing program) 2022/09/12 15:18:43 fetching corpus: 3900, signal 194185/214048 (executing program) 2022/09/12 15:18:43 fetching corpus: 3950, signal 195424/214602 (executing program) 2022/09/12 15:18:43 fetching corpus: 4000, signal 196263/215103 (executing program) 2022/09/12 15:18:43 fetching corpus: 4050, signal 196946/215551 (executing program) 2022/09/12 15:18:43 fetching corpus: 4100, signal 197945/215983 (executing program) 2022/09/12 15:18:43 fetching corpus: 4150, signal 198673/216404 (executing program) 2022/09/12 15:18:44 fetching corpus: 4200, signal 199443/216812 (executing program) 2022/09/12 15:18:44 fetching corpus: 4250, signal 200056/217138 (executing program) 2022/09/12 15:18:44 fetching corpus: 4300, signal 201186/217794 (executing program) 2022/09/12 15:18:44 fetching corpus: 4350, signal 201936/218158 (executing program) 2022/09/12 15:18:44 fetching corpus: 4400, signal 202383/218521 (executing program) 2022/09/12 15:18:44 fetching corpus: 4450, signal 202861/218790 (executing program) 2022/09/12 15:18:44 fetching corpus: 4500, signal 203972/219179 (executing program) 2022/09/12 15:18:44 fetching corpus: 4550, signal 204770/219542 (executing program) 2022/09/12 15:18:45 fetching corpus: 4600, signal 205440/219801 (executing program) 2022/09/12 15:18:45 fetching corpus: 4650, signal 206286/220067 (executing program) 2022/09/12 15:18:45 fetching corpus: 4700, signal 206751/220315 (executing program) 2022/09/12 15:18:45 fetching corpus: 4750, signal 207317/220554 (executing program) 2022/09/12 15:18:45 fetching corpus: 4800, signal 208009/220740 (executing program) 2022/09/12 15:18:45 fetching corpus: 4850, signal 209004/220970 (executing program) 2022/09/12 15:18:45 fetching corpus: 4900, signal 209766/221168 (executing program) 2022/09/12 15:18:46 fetching corpus: 4950, signal 210225/221339 (executing program) 2022/09/12 15:18:46 fetching corpus: 5000, signal 211059/221512 (executing program) 2022/09/12 15:18:46 fetching corpus: 5050, signal 211821/221652 (executing program) 2022/09/12 15:18:46 fetching corpus: 5100, signal 212728/221818 (executing program) 2022/09/12 15:18:46 fetching corpus: 5150, signal 213300/221929 (executing program) 2022/09/12 15:18:46 fetching corpus: 5167, signal 213598/222032 (executing program) 2022/09/12 15:18:46 fetching corpus: 5167, signal 213598/222118 (executing program) 2022/09/12 15:18:46 fetching corpus: 5167, signal 213598/222209 (executing program) 2022/09/12 15:18:46 fetching corpus: 5167, signal 213598/222286 (executing program) 2022/09/12 15:18:46 fetching corpus: 5167, signal 213598/222286 (executing program) 2022/09/12 15:18:49 starting 8 fuzzer processes 15:18:49 executing program 0: utime(0x0, 0xfffffffffffffffd) 15:18:49 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) 15:18:49 executing program 2: perf_event_open$cgroup(&(0x7f00000015c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 15:18:49 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt6_stats\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/165, 0xa5}], 0x1, 0x1, 0x0) 15:18:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg$inet(r0, &(0x7f00000065c0)=[{{&(0x7f00000021c0)={0x2, 0x4e23, @local}, 0x10, 0x0}}, {{&(0x7f0000003740)={0x2, 0x4e23, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000004b80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @dev={0xac, 0x14, 0x14, 0x39}, @multicast1}}}], 0x20}}], 0x2, 0x0) 15:18:49 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="02000500001008633ecfbba1a6cf86eaca67a66fe7099730a8fa0fa3d41b93d0aeb06507e3"], 0x125) [ 75.402114] audit: type=1400 audit(1662995929.756:6): avc: denied { execmem } for pid=285 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 15:18:49 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x80000) pidfd_send_signal(0xffffffffffffffff, 0x57aa, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB]) write(r1, &(0x7f0000000080)="01", 0xffff8000) 15:18:49 executing program 7: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_num_comp_blocks={{0x48, 0x3}}}, 0x6) [ 76.692488] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 76.709020] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 76.717769] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 76.739185] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 76.753556] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 76.759657] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 76.780479] Bluetooth: hci0: HCI_REQ-0x0c1a [ 76.796027] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 76.798793] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 76.803833] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 76.818406] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 76.819802] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 76.827316] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 76.829196] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 76.831113] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 76.832563] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 76.833297] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 76.833736] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 76.835667] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 76.835795] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 76.843426] Bluetooth: hci1: HCI_REQ-0x0c1a [ 76.843890] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 76.852102] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 76.881277] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 76.882757] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 76.886176] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 76.887797] Bluetooth: hci2: HCI_REQ-0x0c1a [ 76.889782] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 76.891065] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 76.895157] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 76.901639] Bluetooth: hci3: HCI_REQ-0x0c1a [ 76.907742] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 76.910078] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 76.911658] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 76.916569] Bluetooth: hci4: HCI_REQ-0x0c1a [ 76.923807] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 76.926509] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 76.928659] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 76.930118] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 76.933586] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 76.936678] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 76.938459] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 76.941081] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 76.942494] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 76.955997] Bluetooth: hci7: HCI_REQ-0x0c1a [ 76.959674] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 76.970186] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 76.977293] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 77.002301] Bluetooth: hci5: HCI_REQ-0x0c1a [ 78.837892] Bluetooth: hci0: command 0x0409 tx timeout [ 78.900458] Bluetooth: hci2: command 0x0409 tx timeout [ 78.901410] Bluetooth: hci6: Opcode 0x c03 failed: -110 [ 78.903062] Bluetooth: hci1: command 0x0409 tx timeout [ 78.965375] Bluetooth: hci4: command 0x0409 tx timeout [ 78.965902] Bluetooth: hci3: command 0x0409 tx timeout [ 79.029398] Bluetooth: hci5: command 0x0409 tx timeout [ 79.029936] Bluetooth: hci7: command 0x0409 tx timeout [ 80.884519] Bluetooth: hci0: command 0x041b tx timeout [ 80.949430] Bluetooth: hci1: command 0x041b tx timeout [ 80.950062] Bluetooth: hci2: command 0x041b tx timeout [ 81.013428] Bluetooth: hci3: command 0x041b tx timeout [ 81.014077] Bluetooth: hci4: command 0x041b tx timeout [ 81.078630] Bluetooth: hci7: command 0x041b tx timeout [ 81.079256] Bluetooth: hci5: command 0x041b tx timeout [ 82.933387] Bluetooth: hci0: command 0x040f tx timeout [ 82.996423] Bluetooth: hci2: command 0x040f tx timeout [ 82.996929] Bluetooth: hci1: command 0x040f tx timeout [ 83.060433] Bluetooth: hci4: command 0x040f tx timeout [ 83.061056] Bluetooth: hci3: command 0x040f tx timeout [ 83.125387] Bluetooth: hci5: command 0x040f tx timeout [ 83.125911] Bluetooth: hci7: command 0x040f tx timeout [ 84.276619] Bluetooth: hci6: Opcode 0x c03 failed: -110 [ 84.981395] Bluetooth: hci0: command 0x0419 tx timeout [ 85.045401] Bluetooth: hci1: command 0x0419 tx timeout [ 85.045873] Bluetooth: hci2: command 0x0419 tx timeout [ 85.109426] Bluetooth: hci3: command 0x0419 tx timeout [ 85.109901] Bluetooth: hci4: command 0x0419 tx timeout [ 85.172396] Bluetooth: hci7: command 0x0419 tx timeout [ 85.172862] Bluetooth: hci5: command 0x0419 tx timeout [ 86.804783] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 86.808511] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 86.811500] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 86.816699] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 86.818203] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 86.822060] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 86.830159] Bluetooth: hci6: HCI_REQ-0x0c1a [ 88.884412] Bluetooth: hci6: command 0x0409 tx timeout [ 90.933434] Bluetooth: hci6: command 0x041b tx timeout [ 92.981419] Bluetooth: hci6: command 0x040f tx timeout [ 95.028377] Bluetooth: hci6: command 0x0419 tx timeout [ 133.055625] audit: type=1400 audit(1662995987.410:7): avc: denied { open } for pid=3719 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 133.058217] audit: type=1400 audit(1662995987.410:8): avc: denied { kernel } for pid=3719 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 15:19:47 executing program 2: perf_event_open$cgroup(&(0x7f00000015c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 15:19:47 executing program 2: perf_event_open$cgroup(&(0x7f00000015c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 134.787777] ------------[ cut here ]------------ [ 134.787799] [ 134.787803] ====================================================== [ 134.787806] WARNING: possible circular locking dependency detected [ 134.787811] 6.0.0-rc5-next-20220912 #1 Not tainted [ 134.787817] ------------------------------------------------------ [ 134.787820] syz-executor.6/3836 is trying to acquire lock: [ 134.787826] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 134.787865] [ 134.787865] but task is already holding lock: [ 134.787867] ffff88801e4b7020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 134.787896] [ 134.787896] which lock already depends on the new lock. [ 134.787896] [ 134.787899] [ 134.787899] the existing dependency chain (in reverse order) is: [ 134.787902] [ 134.787902] -> #3 (&ctx->lock){....}-{2:2}: [ 134.787916] _raw_spin_lock+0x2a/0x40 [ 134.787933] __perf_event_task_sched_out+0x53b/0x18d0 [ 134.787945] __schedule+0xedd/0x2470 [ 134.787955] schedule+0xda/0x1b0 [ 134.787964] exit_to_user_mode_prepare+0x114/0x1a0 [ 134.787985] syscall_exit_to_user_mode+0x19/0x40 [ 134.788003] do_syscall_64+0x48/0x90 [ 134.788016] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 134.788034] [ 134.788034] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 134.788048] _raw_spin_lock_nested+0x30/0x40 [ 134.788062] raw_spin_rq_lock_nested+0x1e/0x30 [ 134.788076] task_fork_fair+0x63/0x4d0 [ 134.788093] sched_cgroup_fork+0x3d0/0x540 [ 134.788107] copy_process+0x3f9e/0x6df0 [ 134.788118] kernel_clone+0xe7/0x890 [ 134.788127] user_mode_thread+0xad/0xf0 [ 134.788138] rest_init+0x24/0x250 [ 134.788154] arch_call_rest_init+0xf/0x14 [ 134.788173] start_kernel+0x4c1/0x4e6 [ 134.788190] secondary_startup_64_no_verify+0xe0/0xeb [ 134.788205] [ 134.788205] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 134.788218] _raw_spin_lock_irqsave+0x39/0x60 [ 134.788233] try_to_wake_up+0xab/0x1920 [ 134.788246] up+0x75/0xb0 [ 134.788258] __up_console_sem+0x6e/0x80 [ 134.788274] console_unlock+0x46a/0x590 [ 134.788290] vprintk_emit+0x1bd/0x560 [ 134.788307] vprintk+0x84/0xa0 [ 134.788327] _printk+0xba/0xf1 [ 134.788345] kauditd_hold_skb.cold+0x3f/0x4e [ 134.788359] kauditd_send_queue+0x233/0x290 [ 134.788374] kauditd_thread+0x5da/0x9a0 [ 134.788388] kthread+0x2ed/0x3a0 [ 134.788403] ret_from_fork+0x22/0x30 [ 134.788416] [ 134.788416] -> #0 ((console_sem).lock){....}-{2:2}: [ 134.788430] __lock_acquire+0x2a02/0x5e70 [ 134.788446] lock_acquire+0x1a2/0x530 [ 134.788463] _raw_spin_lock_irqsave+0x39/0x60 [ 134.788477] down_trylock+0xe/0x70 [ 134.788490] __down_trylock_console_sem+0x3b/0xd0 [ 134.788506] vprintk_emit+0x16b/0x560 [ 134.788523] vprintk+0x84/0xa0 [ 134.788539] _printk+0xba/0xf1 [ 134.788556] report_bug.cold+0x72/0xab [ 134.788568] handle_bug+0x3c/0x70 [ 134.788580] exc_invalid_op+0x14/0x50 [ 134.788593] asm_exc_invalid_op+0x16/0x20 [ 134.788609] group_sched_out.part.0+0x2c7/0x460 [ 134.788620] ctx_sched_out+0x8f1/0xc10 [ 134.788630] __perf_event_task_sched_out+0x6d0/0x18d0 [ 134.788642] __schedule+0xedd/0x2470 [ 134.788651] schedule+0xda/0x1b0 [ 134.788660] exit_to_user_mode_prepare+0x114/0x1a0 [ 134.788680] syscall_exit_to_user_mode+0x19/0x40 [ 134.788696] do_syscall_64+0x48/0x90 [ 134.788709] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 134.788726] [ 134.788726] other info that might help us debug this: [ 134.788726] [ 134.788729] Chain exists of: [ 134.788729] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 134.788729] [ 134.788744] Possible unsafe locking scenario: [ 134.788744] [ 134.788746] CPU0 CPU1 [ 134.788748] ---- ---- [ 134.788751] lock(&ctx->lock); [ 134.788756] lock(&rq->__lock); [ 134.788763] lock(&ctx->lock); [ 134.788769] lock((console_sem).lock); [ 134.788775] [ 134.788775] *** DEADLOCK *** [ 134.788775] [ 134.788777] 2 locks held by syz-executor.6/3836: [ 134.788784] #0: ffff88806ce37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 134.788809] #1: ffff88801e4b7020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 134.788837] [ 134.788837] stack backtrace: [ 134.788839] CPU: 0 PID: 3836 Comm: syz-executor.6 Not tainted 6.0.0-rc5-next-20220912 #1 [ 134.788852] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 134.788860] Call Trace: [ 134.788864] [ 134.788868] dump_stack_lvl+0x8b/0xb3 [ 134.788882] check_noncircular+0x263/0x2e0 [ 134.788899] ? format_decode+0x26c/0xb50 [ 134.788914] ? print_circular_bug+0x450/0x450 [ 134.788932] ? enable_ptr_key_workfn+0x20/0x20 [ 134.788946] ? format_decode+0x26c/0xb50 [ 134.788961] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 134.788980] __lock_acquire+0x2a02/0x5e70 [ 134.789001] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 134.789024] lock_acquire+0x1a2/0x530 [ 134.789041] ? down_trylock+0xe/0x70 [ 134.789056] ? rcu_read_unlock+0x40/0x40 [ 134.789077] ? vprintk+0x84/0xa0 [ 134.789096] _raw_spin_lock_irqsave+0x39/0x60 [ 134.789111] ? down_trylock+0xe/0x70 [ 134.789125] down_trylock+0xe/0x70 [ 134.789138] ? vprintk+0x84/0xa0 [ 134.789156] __down_trylock_console_sem+0x3b/0xd0 [ 134.789174] vprintk_emit+0x16b/0x560 [ 134.789193] vprintk+0x84/0xa0 [ 134.789211] _printk+0xba/0xf1 [ 134.789229] ? record_print_text.cold+0x16/0x16 [ 134.789251] ? report_bug.cold+0x66/0xab [ 134.789265] ? group_sched_out.part.0+0x2c7/0x460 [ 134.789276] report_bug.cold+0x72/0xab [ 134.789291] handle_bug+0x3c/0x70 [ 134.789304] exc_invalid_op+0x14/0x50 [ 134.789319] asm_exc_invalid_op+0x16/0x20 [ 134.789336] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 134.789349] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 134.789360] RSP: 0018:ffff8880405c7c48 EFLAGS: 00010006 [ 134.789369] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 134.789377] RDX: ffff88803ff89ac0 RSI: ffffffff81566027 RDI: 0000000000000005 [ 134.789385] RBP: ffff888008660b90 R08: 0000000000000005 R09: 0000000000000001 [ 134.789393] R10: 0000000000000000 R11: ffffffff865aa01b R12: ffff88801e4b7000 [ 134.789400] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 134.789411] ? group_sched_out.part.0+0x2c7/0x460 [ 134.789424] ? group_sched_out.part.0+0x2c7/0x460 [ 134.789437] ctx_sched_out+0x8f1/0xc10 [ 134.789450] __perf_event_task_sched_out+0x6d0/0x18d0 [ 134.789465] ? lock_is_held_type+0xd7/0x130 [ 134.789484] ? __perf_cgroup_move+0x160/0x160 [ 134.789496] ? set_next_entity+0x304/0x550 [ 134.789514] ? update_curr+0x267/0x740 [ 134.789533] ? lock_is_held_type+0xd7/0x130 [ 134.789551] __schedule+0xedd/0x2470 [ 134.789564] ? io_schedule_timeout+0x150/0x150 [ 134.789576] ? rcu_read_lock_sched_held+0x3e/0x80 [ 134.789598] schedule+0xda/0x1b0 [ 134.789608] exit_to_user_mode_prepare+0x114/0x1a0 [ 134.789629] syscall_exit_to_user_mode+0x19/0x40 [ 134.789647] do_syscall_64+0x48/0x90 [ 134.789661] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 134.789678] RIP: 0033:0x7fab27df8b19 [ 134.789687] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 134.789698] RSP: 002b:00007fab2536e218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 134.789709] RAX: 0000000000000001 RBX: 00007fab27f0bf68 RCX: 00007fab27df8b19 [ 134.789716] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fab27f0bf6c [ 134.789724] RBP: 00007fab27f0bf60 R08: 000000000000000e R09: 0000000000000000 [ 134.789731] R10: 0000000000000003 R11: 0000000000000246 R12: 00007fab27f0bf6c [ 134.789739] R13: 00007fff5948604f R14: 00007fab2536e300 R15: 0000000000022000 [ 134.789752] [ 134.846127] WARNING: CPU: 0 PID: 3836 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 134.846793] Modules linked in: [ 134.847027] CPU: 0 PID: 3836 Comm: syz-executor.6 Not tainted 6.0.0-rc5-next-20220912 #1 [ 134.847624] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 134.848475] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 134.848882] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 134.850230] RSP: 0018:ffff8880405c7c48 EFLAGS: 00010006 [ 134.850637] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 134.851172] RDX: ffff88803ff89ac0 RSI: ffffffff81566027 RDI: 0000000000000005 [ 134.851715] RBP: ffff888008660b90 R08: 0000000000000005 R09: 0000000000000001 [ 134.852253] R10: 0000000000000000 R11: ffffffff865aa01b R12: ffff88801e4b7000 [ 134.852783] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 134.853319] FS: 00007fab2536e700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 134.853921] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 134.854356] CR2: 00007fa437a79620 CR3: 000000000d948000 CR4: 0000000000350ef0 [ 134.854881] Call Trace: [ 134.855077] [ 134.855252] ctx_sched_out+0x8f1/0xc10 [ 134.855551] __perf_event_task_sched_out+0x6d0/0x18d0 [ 134.855943] ? lock_is_held_type+0xd7/0x130 [ 134.856277] ? __perf_cgroup_move+0x160/0x160 [ 134.856623] ? set_next_entity+0x304/0x550 [ 134.856956] ? update_curr+0x267/0x740 [ 134.857266] ? lock_is_held_type+0xd7/0x130 [ 134.857605] __schedule+0xedd/0x2470 [ 134.857898] ? io_schedule_timeout+0x150/0x150 [ 134.858258] ? rcu_read_lock_sched_held+0x3e/0x80 [ 134.858652] schedule+0xda/0x1b0 [ 134.858909] exit_to_user_mode_prepare+0x114/0x1a0 [ 134.859284] syscall_exit_to_user_mode+0x19/0x40 [ 134.859646] do_syscall_64+0x48/0x90 [ 134.859936] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 134.860336] RIP: 0033:0x7fab27df8b19 [ 134.860616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 134.861974] RSP: 002b:00007fab2536e218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 134.862553] RAX: 0000000000000001 RBX: 00007fab27f0bf68 RCX: 00007fab27df8b19 [ 134.863089] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fab27f0bf6c [ 134.863617] RBP: 00007fab27f0bf60 R08: 000000000000000e R09: 0000000000000000 [ 134.864156] R10: 0000000000000003 R11: 0000000000000246 R12: 00007fab27f0bf6c [ 134.864692] R13: 00007fff5948604f R14: 00007fab2536e300 R15: 0000000000022000 [ 134.865229] [ 134.865406] irq event stamp: 346 [ 134.865659] hardirqs last enabled at (345): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 134.866360] hardirqs last disabled at (346): [] __schedule+0x1225/0x2470 [ 134.866970] softirqs last enabled at (0): [] copy_process+0x1dfe/0x6df0 [ 134.867588] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 134.868051] ---[ end trace 0000000000000000 ]--- [ 135.049227] loop6: detected capacity change from 0 to 256 [ 135.075396] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 135.216048] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 135.319104] Bluetooth: hci4: wrong event for mode 0 [ 135.319988] Bluetooth: hci4: wrong event for mode 0 [ 138.094649] sg_write: data in/out 1661472732/247 bytes for SCSI command 0xe3-- guessing data in; [ 138.094649] program syz-executor.5 not setting count and/or reply_len properly 15:19:52 executing program 0: utime(0x0, 0xfffffffffffffffd) 15:19:52 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt6_stats\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/165, 0xa5}], 0x1, 0x1, 0x0) 15:19:52 executing program 2: perf_event_open$cgroup(&(0x7f00000015c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 15:19:52 executing program 7: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_num_comp_blocks={{0x48, 0x3}}}, 0x6) 15:19:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg$inet(r0, &(0x7f00000065c0)=[{{&(0x7f00000021c0)={0x2, 0x4e23, @local}, 0x10, 0x0}}, {{&(0x7f0000003740)={0x2, 0x4e23, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000004b80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @dev={0xac, 0x14, 0x14, 0x39}, @multicast1}}}], 0x20}}], 0x2, 0x0) [ 138.130487] Bluetooth: hci4: wrong event for mode 0 [ 138.149898] sg_write: data in/out 1661472732/247 bytes for SCSI command 0xe3-- guessing data in; [ 138.149898] program syz-executor.5 not setting count and/or reply_len properly [ 138.150663] loop6: detected capacity change from 0 to 256 15:19:52 executing program 1: setresgid(0xee00, 0x0, 0xffffffffffffffff) getegid() 15:19:52 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x80000) pidfd_send_signal(0xffffffffffffffff, 0x57aa, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB]) write(r1, &(0x7f0000000080)="01", 0xffff8000) 15:19:52 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="02000500001008633ecfbba1a6cf86eaca67a66fe7099730a8fa0fa3d41b93d0aeb06507e3"], 0x125) 15:19:52 executing program 1: setresgid(0xee00, 0x0, 0xffffffffffffffff) getegid() 15:19:52 executing program 0: utime(0x0, 0xfffffffffffffffd) 15:19:52 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="02000500001008633ecfbba1a6cf86eaca67a66fe7099730a8fa0fa3d41b93d0aeb06507e3"], 0x125) [ 138.188559] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 15:19:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg$inet(r0, &(0x7f00000065c0)=[{{&(0x7f00000021c0)={0x2, 0x4e23, @local}, 0x10, 0x0}}, {{&(0x7f0000003740)={0x2, 0x4e23, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000004b80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @dev={0xac, 0x14, 0x14, 0x39}, @multicast1}}}], 0x20}}], 0x2, 0x0) 15:19:52 executing program 7: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_num_comp_blocks={{0x48, 0x3}}}, 0x6) 15:19:52 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt6_stats\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/165, 0xa5}], 0x1, 0x1, 0x0) [ 138.218506] sg_write: data in/out 1661472732/247 bytes for SCSI command 0xe3-- guessing data in; [ 138.218506] program syz-executor.5 not setting count and/or reply_len properly [ 138.233268] Bluetooth: hci4: wrong event for mode 0 15:19:52 executing program 1: setresgid(0xee00, 0x0, 0xffffffffffffffff) getegid() 15:19:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x80000) pidfd_send_signal(0xffffffffffffffff, 0x57aa, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB]) write(r1, &(0x7f0000000080)="01", 0xffff8000) 15:19:52 executing program 0: utime(0x0, 0xfffffffffffffffd) [ 138.265943] loop2: detected capacity change from 0 to 256 15:19:52 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="02000500001008633ecfbba1a6cf86eaca67a66fe7099730a8fa0fa3d41b93d0aeb06507e3"], 0x125) 15:19:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg$inet(r0, &(0x7f00000065c0)=[{{&(0x7f00000021c0)={0x2, 0x4e23, @local}, 0x10, 0x0}}, {{&(0x7f0000003740)={0x2, 0x4e23, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000004b80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @dev={0xac, 0x14, 0x14, 0x39}, @multicast1}}}], 0x20}}], 0x2, 0x0) 15:19:52 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt6_stats\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/165, 0xa5}], 0x1, 0x1, 0x0) 15:19:52 executing program 7: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_num_comp_blocks={{0x48, 0x3}}}, 0x6) [ 138.300606] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 138.308308] sg_write: data in/out 1661472732/247 bytes for SCSI command 0xe3-- guessing data in; [ 138.308308] program syz-executor.5 not setting count and/or reply_len properly [ 138.313289] Bluetooth: hci4: wrong event for mode 0 15:19:52 executing program 1: setresgid(0xee00, 0x0, 0xffffffffffffffff) getegid() [ 138.379345] hrtimer: interrupt took 21420 ns [ 138.457974] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 15:19:53 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x80000) pidfd_send_signal(0xffffffffffffffff, 0x57aa, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB]) write(r1, &(0x7f0000000080)="01", 0xffff8000) 15:19:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x80000) pidfd_send_signal(0xffffffffffffffff, 0x57aa, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB]) write(r1, &(0x7f0000000080)="01", 0xffff8000) 15:19:53 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x80000) pidfd_send_signal(0xffffffffffffffff, 0x57aa, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB]) write(r1, &(0x7f0000000080)="01", 0xffff8000) 15:19:53 executing program 4: rseq(&(0x7f0000000100), 0x20, 0x0, 0x0) 15:19:53 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)=0x0) clone3(&(0x7f0000000440)={0x80000800, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), {0x3b}, &(0x7f0000000180)=""/79, 0x4f, &(0x7f0000000240)=""/2, &(0x7f0000000380)=[r2, r3, r1], 0x3}, 0x58) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r4, 0x80047213, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000580)={0x3, 0x80, 0x4, 0x85, 0xf, 0x9, 0x0, 0xb6, 0x40121, 0x4ce85b42c354d306, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x6, @perf_config_ext={0x0, 0x3}, 0x4000, 0x4, 0x0, 0x8, 0x3195, 0x3, 0xfffa, 0x0, 0xfac, 0x0, 0x81}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000140)={0x5000, 0x0, 0x0, 0xc7e}) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r5, 0x402, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, r0, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:19:53 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x560f, &(0x7f0000000040)) 15:19:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x80000) pidfd_send_signal(0xffffffffffffffff, 0x57aa, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB]) write(r1, &(0x7f0000000080)="01", 0xffff8000) 15:19:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) io_cancel(0x0, 0x0, 0x0) [ 139.152927] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 139.238471] loop7: detected capacity change from 0 to 256 [ 139.248973] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 139.259920] loop2: detected capacity change from 0 to 256 [ 139.263950] loop0: detected capacity change from 0 to 256 15:19:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000001480)={&(0x7f00000010c0)=@pptp={0x18, 0x2, {0x0, @private}}, 0x80, &(0x7f0000001440)=[{0x0}, {0x0}], 0x2}, 0x20000000) 15:19:53 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x560f, &(0x7f0000000040)) 15:19:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) io_cancel(0x0, 0x0, 0x0) [ 139.322213] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 139.322609] loop6: detected capacity change from 0 to 256 [ 139.345949] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 139.357056] FAT-fs (loop0): Unrecognized mount option "./file0" or missing value 15:19:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x80000) pidfd_send_signal(0xffffffffffffffff, 0x57aa, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB]) write(r1, &(0x7f0000000080)="01", 0xffff8000) 15:19:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000001480)={&(0x7f00000010c0)=@pptp={0x18, 0x2, {0x0, @private}}, 0x80, &(0x7f0000001440)=[{0x0}, {0x0}], 0x2}, 0x20000000) 15:19:53 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x560f, &(0x7f0000000040)) 15:19:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) io_cancel(0x0, 0x0, 0x0) [ 139.530856] loop2: detected capacity change from 0 to 256 15:19:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x80000) pidfd_send_signal(0xffffffffffffffff, 0x57aa, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB]) write(r1, &(0x7f0000000080)="01", 0xffff8000) [ 139.604055] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 139.678769] loop0: detected capacity change from 0 to 256 [ 139.682857] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 139.684653] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 139.863045] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 140.034858] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 15:19:55 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x80000) pidfd_send_signal(0xffffffffffffffff, 0x57aa, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB]) write(r1, &(0x7f0000000080)="01", 0xffff8000) 15:19:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000001480)={&(0x7f00000010c0)=@pptp={0x18, 0x2, {0x0, @private}}, 0x80, &(0x7f0000001440)=[{0x0}, {0x0}], 0x2}, 0x20000000) 15:19:55 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x560f, &(0x7f0000000040)) 15:19:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) io_cancel(0x0, 0x0, 0x0) 15:19:55 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x80000) pidfd_send_signal(0xffffffffffffffff, 0x57aa, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB]) write(r1, &(0x7f0000000080)="01", 0xffff8000) 15:19:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) finit_module(r0, 0x0, 0x4) 15:19:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x80000) pidfd_send_signal(0xffffffffffffffff, 0x57aa, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB]) write(r1, &(0x7f0000000080)="01", 0xffff8000) 15:19:55 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)=0x0) clone3(&(0x7f0000000440)={0x80000800, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), {0x3b}, &(0x7f0000000180)=""/79, 0x4f, &(0x7f0000000240)=""/2, &(0x7f0000000380)=[r2, r3, r1], 0x3}, 0x58) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r4, 0x80047213, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000580)={0x3, 0x80, 0x4, 0x85, 0xf, 0x9, 0x0, 0xb6, 0x40121, 0x4ce85b42c354d306, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x6, @perf_config_ext={0x0, 0x3}, 0x4000, 0x4, 0x0, 0x8, 0x3195, 0x3, 0xfffa, 0x0, 0xfac, 0x0, 0x81}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000140)={0x5000, 0x0, 0x0, 0xc7e}) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r5, 0x402, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, r0, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 141.123706] audit: type=1400 audit(1662995995.478:9): avc: denied { module_load } for pid=4057 comm="syz-executor.2" path="/syz-executor.2" dev="sda" ino=15935 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=system permissive=1 15:19:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000001480)={&(0x7f00000010c0)=@pptp={0x18, 0x2, {0x0, @private}}, 0x80, &(0x7f0000001440)=[{0x0}, {0x0}], 0x2}, 0x20000000) [ 141.210060] loop7: detected capacity change from 0 to 256 15:19:55 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)=0x0) clone3(&(0x7f0000000440)={0x80000800, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), {0x3b}, &(0x7f0000000180)=""/79, 0x4f, &(0x7f0000000240)=""/2, &(0x7f0000000380)=[r2, r3, r1], 0x3}, 0x58) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r4, 0x80047213, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000580)={0x3, 0x80, 0x4, 0x85, 0xf, 0x9, 0x0, 0xb6, 0x40121, 0x4ce85b42c354d306, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x6, @perf_config_ext={0x0, 0x3}, 0x4000, 0x4, 0x0, 0x8, 0x3195, 0x3, 0xfffa, 0x0, 0xfac, 0x0, 0x81}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000140)={0x5000, 0x0, 0x0, 0xc7e}) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r5, 0x402, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, r0, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:19:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) fchmod(r0, 0x0) [ 141.256397] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 15:19:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) finit_module(r0, 0x0, 0x4) [ 141.352852] loop6: detected capacity change from 0 to 256 15:19:55 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0xfc, 0x0, 0xfd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r1, 0x80489439, &(0x7f0000000140)) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in6=@loopback, 0x0, 0x2b}, 0x0, @in6=@dev}}, 0xe8) close(r2) sendfile(r2, r0, &(0x7f0000000000)=0x80, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x68181, 0x22) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(r4, 0x10, 0x0, 0x7ffc) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x891b, &(0x7f0000000000)={'lo\x00'}) r6 = fcntl$dupfd(r4, 0x0, r3) sendfile(r3, r6, 0x0, 0x1ff) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x7, 0x7, 0xec, 0x8, 0x0, 0x10002, 0x110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x4, 0xb9f}, 0x42, 0x7, 0x1000, 0x1, 0xd80, 0x5, 0x40, 0x0, 0x10000, 0x0, 0x8}, 0x0, 0xb, 0xffffffffffffffff, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(r7, 0x10, 0x0, 0x7ffc) socket$netlink(0x10, 0x3, 0x0) 15:19:55 executing program 4: wait4(0x0, 0x0, 0x616477314b22ed4d, 0x0) [ 141.449805] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 15:19:55 executing program 4: wait4(0x0, 0x0, 0x616477314b22ed4d, 0x0) 15:19:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) finit_module(r0, 0x0, 0x4) [ 141.574982] loop0: detected capacity change from 0 to 256 [ 141.706890] FAT-fs (loop0): Unrecognized mount option "./file0" or missing value [ 141.785936] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 15:19:56 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x80000) pidfd_send_signal(0xffffffffffffffff, 0x57aa, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB]) write(r1, &(0x7f0000000080)="01", 0xffff8000) 15:19:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) finit_module(r0, 0x0, 0x4) 15:19:56 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0xfc, 0x0, 0xfd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r1, 0x80489439, &(0x7f0000000140)) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in6=@loopback, 0x0, 0x2b}, 0x0, @in6=@dev}}, 0xe8) close(r2) sendfile(r2, r0, &(0x7f0000000000)=0x80, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x68181, 0x22) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(r4, 0x10, 0x0, 0x7ffc) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x891b, &(0x7f0000000000)={'lo\x00'}) r6 = fcntl$dupfd(r4, 0x0, r3) sendfile(r3, r6, 0x0, 0x1ff) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x7, 0x7, 0xec, 0x8, 0x0, 0x10002, 0x110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x4, 0xb9f}, 0x42, 0x7, 0x1000, 0x1, 0xd80, 0x5, 0x40, 0x0, 0x10000, 0x0, 0x8}, 0x0, 0xb, 0xffffffffffffffff, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(r7, 0x10, 0x0, 0x7ffc) socket$netlink(0x10, 0x3, 0x0) 15:19:56 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0xfc, 0x0, 0xfd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r1, 0x80489439, &(0x7f0000000140)) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in6=@loopback, 0x0, 0x2b}, 0x0, @in6=@dev}}, 0xe8) close(r2) sendfile(r2, r0, &(0x7f0000000000)=0x80, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x68181, 0x22) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(r4, 0x10, 0x0, 0x7ffc) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x891b, &(0x7f0000000000)={'lo\x00'}) r6 = fcntl$dupfd(r4, 0x0, r3) sendfile(r3, r6, 0x0, 0x1ff) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x7, 0x7, 0xec, 0x8, 0x0, 0x10002, 0x110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x4, 0xb9f}, 0x42, 0x7, 0x1000, 0x1, 0xd80, 0x5, 0x40, 0x0, 0x10000, 0x0, 0x8}, 0x0, 0xb, 0xffffffffffffffff, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(r7, 0x10, 0x0, 0x7ffc) socket$netlink(0x10, 0x3, 0x0) 15:19:56 executing program 4: wait4(0x0, 0x0, 0x616477314b22ed4d, 0x0) 15:19:56 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)=0x0) clone3(&(0x7f0000000440)={0x80000800, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), {0x3b}, &(0x7f0000000180)=""/79, 0x4f, &(0x7f0000000240)=""/2, &(0x7f0000000380)=[r2, r3, r1], 0x3}, 0x58) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r4, 0x80047213, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000580)={0x3, 0x80, 0x4, 0x85, 0xf, 0x9, 0x0, 0xb6, 0x40121, 0x4ce85b42c354d306, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x6, @perf_config_ext={0x0, 0x3}, 0x4000, 0x4, 0x0, 0x8, 0x3195, 0x3, 0xfffa, 0x0, 0xfac, 0x0, 0x81}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000140)={0x5000, 0x0, 0x0, 0xc7e}) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r5, 0x402, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, r0, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:19:56 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)=0x0) clone3(&(0x7f0000000440)={0x80000800, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), {0x3b}, &(0x7f0000000180)=""/79, 0x4f, &(0x7f0000000240)=""/2, &(0x7f0000000380)=[r2, r3, r1], 0x3}, 0x58) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r4, 0x80047213, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000580)={0x3, 0x80, 0x4, 0x85, 0xf, 0x9, 0x0, 0xb6, 0x40121, 0x4ce85b42c354d306, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x6, @perf_config_ext={0x0, 0x3}, 0x4000, 0x4, 0x0, 0x8, 0x3195, 0x3, 0xfffa, 0x0, 0xfac, 0x0, 0x81}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000140)={0x5000, 0x0, 0x0, 0xc7e}) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r5, 0x402, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, r0, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 142.478950] loop7: detected capacity change from 0 to 256 15:19:56 executing program 6: io_setup(0x6, &(0x7f0000000040)=0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x8c3c1, 0x0) io_submit(r0, 0x4000, &(0x7f00000004c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x200000000000000}]) 15:19:56 executing program 4: wait4(0x0, 0x0, 0x616477314b22ed4d, 0x0) 15:19:56 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0xfc, 0x0, 0xfd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r1, 0x80489439, &(0x7f0000000140)) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in6=@loopback, 0x0, 0x2b}, 0x0, @in6=@dev}}, 0xe8) close(r2) sendfile(r2, r0, &(0x7f0000000000)=0x80, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x68181, 0x22) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(r4, 0x10, 0x0, 0x7ffc) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x891b, &(0x7f0000000000)={'lo\x00'}) r6 = fcntl$dupfd(r4, 0x0, r3) sendfile(r3, r6, 0x0, 0x1ff) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x7, 0x7, 0xec, 0x8, 0x0, 0x10002, 0x110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x4, 0xb9f}, 0x42, 0x7, 0x1000, 0x1, 0xd80, 0x5, 0x40, 0x0, 0x10000, 0x0, 0x8}, 0x0, 0xb, 0xffffffffffffffff, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(r7, 0x10, 0x0, 0x7ffc) socket$netlink(0x10, 0x3, 0x0) 15:19:56 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0xfc, 0x0, 0xfd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r1, 0x80489439, &(0x7f0000000140)) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in6=@loopback, 0x0, 0x2b}, 0x0, @in6=@dev}}, 0xe8) close(r2) sendfile(r2, r0, &(0x7f0000000000)=0x80, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x68181, 0x22) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(r4, 0x10, 0x0, 0x7ffc) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x891b, &(0x7f0000000000)={'lo\x00'}) r6 = fcntl$dupfd(r4, 0x0, r3) sendfile(r3, r6, 0x0, 0x1ff) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x7, 0x7, 0xec, 0x8, 0x0, 0x10002, 0x110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x4, 0xb9f}, 0x42, 0x7, 0x1000, 0x1, 0xd80, 0x5, 0x40, 0x0, 0x10000, 0x0, 0x8}, 0x0, 0xb, 0xffffffffffffffff, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(r7, 0x10, 0x0, 0x7ffc) socket$netlink(0x10, 0x3, 0x0) 15:19:56 executing program 6: io_setup(0x6, &(0x7f0000000040)=0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x8c3c1, 0x0) io_submit(r0, 0x4000, &(0x7f00000004c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x200000000000000}]) [ 142.607436] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 15:19:56 executing program 4: r0 = getpgrp(0x0) prlimit64(r0, 0xf, 0x0, &(0x7f00000001c0)) capget(&(0x7f0000000080)={0x20080522, r0}, &(0x7f00000000c0)={0x10001, 0x0, 0xac, 0x7, 0x0, 0x52a9}) prlimit64(0x0, 0xa, 0x0, &(0x7f0000000300)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x11}}) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000240), &(0x7f00000002c0)=0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) write$binfmt_aout(r3, 0x0, 0x718) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) ioctl$TUNGETVNETHDRSZ(r4, 0x400454e2, &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="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"]) prlimit64(r0, 0x0, &(0x7f0000000140)={0x7}, &(0x7f0000000180)) bind$unix(0xffffffffffffffff, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) setresuid(0x0, r1, 0x0) unshare(0x20000400) 15:19:57 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x2, 0x20002) write$selinux_attr(r0, &(0x7f0000000040)='/sbin/dhclient\x00', 0xf) 15:19:57 executing program 6: io_setup(0x6, &(0x7f0000000040)=0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x8c3c1, 0x0) io_submit(r0, 0x4000, &(0x7f00000004c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x200000000000000}]) 15:19:57 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0xfc, 0x0, 0xfd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r1, 0x80489439, &(0x7f0000000140)) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in6=@loopback, 0x0, 0x2b}, 0x0, @in6=@dev}}, 0xe8) close(r2) sendfile(r2, r0, &(0x7f0000000000)=0x80, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x68181, 0x22) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(r4, 0x10, 0x0, 0x7ffc) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x891b, &(0x7f0000000000)={'lo\x00'}) r6 = fcntl$dupfd(r4, 0x0, r3) sendfile(r3, r6, 0x0, 0x1ff) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x7, 0x7, 0xec, 0x8, 0x0, 0x10002, 0x110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x4, 0xb9f}, 0x42, 0x7, 0x1000, 0x1, 0xd80, 0x5, 0x40, 0x0, 0x10000, 0x0, 0x8}, 0x0, 0xb, 0xffffffffffffffff, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(r7, 0x10, 0x0, 0x7ffc) socket$netlink(0x10, 0x3, 0x0) 15:19:57 executing program 0: r0 = getpgrp(0x0) prlimit64(r0, 0xf, 0x0, &(0x7f00000001c0)) capget(&(0x7f0000000080)={0x20080522, r0}, &(0x7f00000000c0)={0x10001, 0x0, 0xac, 0x7, 0x0, 0x52a9}) prlimit64(0x0, 0xa, 0x0, &(0x7f0000000300)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x11}}) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000240), &(0x7f00000002c0)=0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) write$binfmt_aout(r3, 0x0, 0x718) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) ioctl$TUNGETVNETHDRSZ(r4, 0x400454e2, &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="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"]) prlimit64(r0, 0x0, &(0x7f0000000140)={0x7}, &(0x7f0000000180)) bind$unix(0xffffffffffffffff, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) setresuid(0x0, r1, 0x0) unshare(0x20000400) 15:19:57 executing program 4: r0 = getpgrp(0x0) prlimit64(r0, 0xf, 0x0, &(0x7f00000001c0)) capget(&(0x7f0000000080)={0x20080522, r0}, &(0x7f00000000c0)={0x10001, 0x0, 0xac, 0x7, 0x0, 0x52a9}) prlimit64(0x0, 0xa, 0x0, &(0x7f0000000300)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x11}}) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000240), &(0x7f00000002c0)=0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) write$binfmt_aout(r3, 0x0, 0x718) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) ioctl$TUNGETVNETHDRSZ(r4, 0x400454e2, &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="000000fd6cf848e3a8c7638c6f2e000000000000000000000000012085b72a5a78111c221b903aa138f230a20106824629ea884726a3a1396d4bf1754c80f8f4753e40eec79f671fbbda5943f2bc472179038b8c38e966eeca0fa89aee46653eef60c432972c58a72335ae382fd3c020b42c41a79c69b4c3fb82702fd285871b9541044da33db2a45a2b469daf3a1c57f5f3d9562b835bd1965512f3e563e4958e9835b5b23a58afb6947679532aaf776bb725b91769d9f231acdd20ecb00c2145505e15d389a370afc9651a452174523b88eba92d130aee1f52553de958035754925e6c7962d22875966208abe44da7870553c3e984f388000000000000000000000000000000000000006c24aaf51d3d19e8de7921afaf78460ee4073e4d6cdff5f139885210ac4189332e24cf2b8fff25a8cb0d3297aa599a2bdfe0e5b13caf900874dbd215e9e65faa1e28d66446000f64dfdfbe8af56feae9184067325b2f1f5dee0d709c055d4376156959910b4c9923410773dc56e3314553a1877c2c0f8378312b13ec3008468d96d47680c48a781b9b1b6748ca37bda7ffac0497f58bc671ec59"]) prlimit64(r0, 0x0, &(0x7f0000000140)={0x7}, &(0x7f0000000180)) bind$unix(0xffffffffffffffff, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) setresuid(0x0, r1, 0x0) unshare(0x20000400) 15:19:57 executing program 6: io_setup(0x6, &(0x7f0000000040)=0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x8c3c1, 0x0) io_submit(r0, 0x4000, &(0x7f00000004c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x200000000000000}]) 15:19:57 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)=0x0) clone3(&(0x7f0000000440)={0x80000800, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), {0x3b}, &(0x7f0000000180)=""/79, 0x4f, &(0x7f0000000240)=""/2, &(0x7f0000000380)=[r2, r3, r1], 0x3}, 0x58) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r4, 0x80047213, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000580)={0x3, 0x80, 0x4, 0x85, 0xf, 0x9, 0x0, 0xb6, 0x40121, 0x4ce85b42c354d306, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x6, @perf_config_ext={0x0, 0x3}, 0x4000, 0x4, 0x0, 0x8, 0x3195, 0x3, 0xfffa, 0x0, 0xfac, 0x0, 0x81}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000140)={0x5000, 0x0, 0x0, 0xc7e}) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r5, 0x402, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, r0, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:19:57 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)=0x0) clone3(&(0x7f0000000440)={0x80000800, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), {0x3b}, &(0x7f0000000180)=""/79, 0x4f, &(0x7f0000000240)=""/2, &(0x7f0000000380)=[r2, r3, r1], 0x3}, 0x58) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r4, 0x80047213, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000580)={0x3, 0x80, 0x4, 0x85, 0xf, 0x9, 0x0, 0xb6, 0x40121, 0x4ce85b42c354d306, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x6, @perf_config_ext={0x0, 0x3}, 0x4000, 0x4, 0x0, 0x8, 0x3195, 0x3, 0xfffa, 0x0, 0xfac, 0x0, 0x81}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000140)={0x5000, 0x0, 0x0, 0xc7e}) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r5, 0x402, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, r0, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:19:57 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0xfc, 0x0, 0xfd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r1, 0x80489439, &(0x7f0000000140)) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in6=@loopback, 0x0, 0x2b}, 0x0, @in6=@dev}}, 0xe8) close(r2) sendfile(r2, r0, &(0x7f0000000000)=0x80, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x68181, 0x22) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(r4, 0x10, 0x0, 0x7ffc) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x891b, &(0x7f0000000000)={'lo\x00'}) r6 = fcntl$dupfd(r4, 0x0, r3) sendfile(r3, r6, 0x0, 0x1ff) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x7, 0x7, 0xec, 0x8, 0x0, 0x10002, 0x110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x4, 0xb9f}, 0x42, 0x7, 0x1000, 0x1, 0xd80, 0x5, 0x40, 0x0, 0x10000, 0x0, 0x8}, 0x0, 0xb, 0xffffffffffffffff, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(r7, 0x10, 0x0, 0x7ffc) socket$netlink(0x10, 0x3, 0x0) 15:19:57 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x2, 0x20002) write$selinux_attr(r0, &(0x7f0000000040)='/sbin/dhclient\x00', 0xf) 15:19:57 executing program 4: r0 = getpgrp(0x0) prlimit64(r0, 0xf, 0x0, &(0x7f00000001c0)) capget(&(0x7f0000000080)={0x20080522, r0}, &(0x7f00000000c0)={0x10001, 0x0, 0xac, 0x7, 0x0, 0x52a9}) prlimit64(0x0, 0xa, 0x0, &(0x7f0000000300)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x11}}) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000240), &(0x7f00000002c0)=0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) write$binfmt_aout(r3, 0x0, 0x718) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) ioctl$TUNGETVNETHDRSZ(r4, 0x400454e2, &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="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"]) prlimit64(r0, 0x0, &(0x7f0000000140)={0x7}, &(0x7f0000000180)) bind$unix(0xffffffffffffffff, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) setresuid(0x0, r1, 0x0) unshare(0x20000400) 15:19:57 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8970, &(0x7f0000000000)={'sit0\x00'}) 15:19:57 executing program 3: r0 = getpgrp(0x0) prlimit64(r0, 0xf, 0x0, &(0x7f00000001c0)) capget(&(0x7f0000000080)={0x20080522, r0}, &(0x7f00000000c0)={0x10001, 0x0, 0xac, 0x7, 0x0, 0x52a9}) prlimit64(0x0, 0xa, 0x0, &(0x7f0000000300)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x11}}) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000240), &(0x7f00000002c0)=0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) write$binfmt_aout(r3, 0x0, 0x718) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) ioctl$TUNGETVNETHDRSZ(r4, 0x400454e2, &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="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"]) prlimit64(r0, 0x0, &(0x7f0000000140)={0x7}, &(0x7f0000000180)) bind$unix(0xffffffffffffffff, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) setresuid(0x0, r1, 0x0) unshare(0x20000400) 15:19:57 executing program 7: r0 = getpgrp(0x0) prlimit64(r0, 0xf, 0x0, &(0x7f00000001c0)) capget(&(0x7f0000000080)={0x20080522, r0}, &(0x7f00000000c0)={0x10001, 0x0, 0xac, 0x7, 0x0, 0x52a9}) prlimit64(0x0, 0xa, 0x0, &(0x7f0000000300)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x11}}) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000240), &(0x7f00000002c0)=0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) write$binfmt_aout(r3, 0x0, 0x718) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) ioctl$TUNGETVNETHDRSZ(r4, 0x400454e2, &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="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"]) prlimit64(r0, 0x0, &(0x7f0000000140)={0x7}, &(0x7f0000000180)) bind$unix(0xffffffffffffffff, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) setresuid(0x0, r1, 0x0) unshare(0x20000400) 15:19:57 executing program 6: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000100001ff000400000000000003"], 0x28}}, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000001300)=[{0x0}], 0x0, &(0x7f0000000040)=ANY=[]) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) 15:19:57 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x2, 0x20002) write$selinux_attr(r0, &(0x7f0000000040)='/sbin/dhclient\x00', 0xf) 15:19:57 executing program 4: r0 = getpgrp(0x0) prlimit64(r0, 0xf, 0x0, &(0x7f00000001c0)) capget(&(0x7f0000000080)={0x20080522, r0}, &(0x7f00000000c0)={0x10001, 0x0, 0xac, 0x7, 0x0, 0x52a9}) prlimit64(0x0, 0xa, 0x0, &(0x7f0000000300)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x11}}) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000240), &(0x7f00000002c0)=0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) write$binfmt_aout(r3, 0x0, 0x718) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) ioctl$TUNGETVNETHDRSZ(r4, 0x400454e2, &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="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"]) prlimit64(r0, 0x0, &(0x7f0000000140)={0x7}, &(0x7f0000000180)) bind$unix(0xffffffffffffffff, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) setresuid(0x0, r1, 0x0) unshare(0x20000400) 15:19:57 executing program 0: r0 = getpgrp(0x0) prlimit64(r0, 0xf, 0x0, &(0x7f00000001c0)) capget(&(0x7f0000000080)={0x20080522, r0}, &(0x7f00000000c0)={0x10001, 0x0, 0xac, 0x7, 0x0, 0x52a9}) prlimit64(0x0, 0xa, 0x0, &(0x7f0000000300)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x11}}) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000240), &(0x7f00000002c0)=0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) write$binfmt_aout(r3, 0x0, 0x718) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) ioctl$TUNGETVNETHDRSZ(r4, 0x400454e2, &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="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"]) prlimit64(r0, 0x0, &(0x7f0000000140)={0x7}, &(0x7f0000000180)) bind$unix(0xffffffffffffffff, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) setresuid(0x0, r1, 0x0) unshare(0x20000400) 15:19:57 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8970, &(0x7f0000000000)={'sit0\x00'}) 15:19:57 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcaceb3843a0a27d26af18e26c51db155af69e0000000000000000000000000000df63a36fd407eb99643bb3409a86448396cd1499fc9043822e14cf2dbe93dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b76a9611ccb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x6}, 0x1c) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000240)=@req3={0x10000, 0x7ff, 0x401}, 0x1c) 15:19:57 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x2, 0x20002) write$selinux_attr(r0, &(0x7f0000000040)='/sbin/dhclient\x00', 0xf) 15:19:57 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8970, &(0x7f0000000000)={'sit0\x00'}) 15:19:57 executing program 6: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000100001ff000400000000000003"], 0x28}}, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000001300)=[{0x0}], 0x0, &(0x7f0000000040)=ANY=[]) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) 15:19:57 executing program 0: r0 = getpgrp(0x0) prlimit64(r0, 0xf, 0x0, &(0x7f00000001c0)) capget(&(0x7f0000000080)={0x20080522, r0}, &(0x7f00000000c0)={0x10001, 0x0, 0xac, 0x7, 0x0, 0x52a9}) prlimit64(0x0, 0xa, 0x0, &(0x7f0000000300)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x11}}) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000240), &(0x7f00000002c0)=0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) write$binfmt_aout(r3, 0x0, 0x718) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) ioctl$TUNGETVNETHDRSZ(r4, 0x400454e2, &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="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"]) prlimit64(r0, 0x0, &(0x7f0000000140)={0x7}, &(0x7f0000000180)) bind$unix(0xffffffffffffffff, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) setresuid(0x0, r1, 0x0) unshare(0x20000400) 15:19:57 executing program 3: r0 = getpgrp(0x0) prlimit64(r0, 0xf, 0x0, &(0x7f00000001c0)) capget(&(0x7f0000000080)={0x20080522, r0}, &(0x7f00000000c0)={0x10001, 0x0, 0xac, 0x7, 0x0, 0x52a9}) prlimit64(0x0, 0xa, 0x0, &(0x7f0000000300)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x11}}) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000240), &(0x7f00000002c0)=0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) write$binfmt_aout(r3, 0x0, 0x718) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) ioctl$TUNGETVNETHDRSZ(r4, 0x400454e2, &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="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"]) prlimit64(r0, 0x0, &(0x7f0000000140)={0x7}, &(0x7f0000000180)) bind$unix(0xffffffffffffffff, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) setresuid(0x0, r1, 0x0) unshare(0x20000400) 15:19:57 executing program 7: r0 = getpgrp(0x0) prlimit64(r0, 0xf, 0x0, &(0x7f00000001c0)) capget(&(0x7f0000000080)={0x20080522, r0}, &(0x7f00000000c0)={0x10001, 0x0, 0xac, 0x7, 0x0, 0x52a9}) prlimit64(0x0, 0xa, 0x0, &(0x7f0000000300)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x11}}) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000240), &(0x7f00000002c0)=0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) write$binfmt_aout(r3, 0x0, 0x718) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) ioctl$TUNGETVNETHDRSZ(r4, 0x400454e2, &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="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"]) prlimit64(r0, 0x0, &(0x7f0000000140)={0x7}, &(0x7f0000000180)) bind$unix(0xffffffffffffffff, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) setresuid(0x0, r1, 0x0) unshare(0x20000400) 15:19:57 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000100001ff000400000000000003"], 0x28}}, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000001300)=[{0x0}], 0x0, &(0x7f0000000040)=ANY=[]) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) 15:19:57 executing program 6: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000100001ff000400000000000003"], 0x28}}, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000001300)=[{0x0}], 0x0, &(0x7f0000000040)=ANY=[]) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) 15:19:57 executing program 2: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) mknodat$null(r1, &(0x7f0000000040)='./file0\x00', 0xffffc000, 0x103) 15:19:57 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8970, &(0x7f0000000000)={'sit0\x00'}) 15:19:57 executing program 3: r0 = getpgrp(0x0) prlimit64(r0, 0xf, 0x0, &(0x7f00000001c0)) capget(&(0x7f0000000080)={0x20080522, r0}, &(0x7f00000000c0)={0x10001, 0x0, 0xac, 0x7, 0x0, 0x52a9}) prlimit64(0x0, 0xa, 0x0, &(0x7f0000000300)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x11}}) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000240), &(0x7f00000002c0)=0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) write$binfmt_aout(r3, 0x0, 0x718) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) ioctl$TUNGETVNETHDRSZ(r4, 0x400454e2, &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="000000fd6cf848e3a8c7638c6f2e000000000000000000000000012085b72a5a78111c221b903aa138f230a20106824629ea884726a3a1396d4bf1754c80f8f4753e40eec79f671fbbda5943f2bc472179038b8c38e966eeca0fa89aee46653eef60c432972c58a72335ae382fd3c020b42c41a79c69b4c3fb82702fd285871b9541044da33db2a45a2b469daf3a1c57f5f3d9562b835bd1965512f3e563e4958e9835b5b23a58afb6947679532aaf776bb725b91769d9f231acdd20ecb00c2145505e15d389a370afc9651a452174523b88eba92d130aee1f52553de958035754925e6c7962d22875966208abe44da7870553c3e984f388000000000000000000000000000000000000006c24aaf51d3d19e8de7921afaf78460ee4073e4d6cdff5f139885210ac4189332e24cf2b8fff25a8cb0d3297aa599a2bdfe0e5b13caf900874dbd215e9e65faa1e28d66446000f64dfdfbe8af56feae9184067325b2f1f5dee0d709c055d4376156959910b4c9923410773dc56e3314553a1877c2c0f8378312b13ec3008468d96d47680c48a781b9b1b6748ca37bda7ffac0497f58bc671ec59"]) prlimit64(r0, 0x0, &(0x7f0000000140)={0x7}, &(0x7f0000000180)) bind$unix(0xffffffffffffffff, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) setresuid(0x0, r1, 0x0) unshare(0x20000400) 15:19:58 executing program 6: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000100001ff000400000000000003"], 0x28}}, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000001300)=[{0x0}], 0x0, &(0x7f0000000040)=ANY=[]) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) 15:19:58 executing program 1: semget$private(0x0, 0x0, 0x0) 15:19:58 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @private}, @address_request}}}}, 0x0) 15:19:58 executing program 7: r0 = getpgrp(0x0) prlimit64(r0, 0xf, 0x0, &(0x7f00000001c0)) capget(&(0x7f0000000080)={0x20080522, r0}, &(0x7f00000000c0)={0x10001, 0x0, 0xac, 0x7, 0x0, 0x52a9}) prlimit64(0x0, 0xa, 0x0, &(0x7f0000000300)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x11}}) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000240), &(0x7f00000002c0)=0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) write$binfmt_aout(r3, 0x0, 0x718) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) ioctl$TUNGETVNETHDRSZ(r4, 0x400454e2, &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="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"]) prlimit64(r0, 0x0, &(0x7f0000000140)={0x7}, &(0x7f0000000180)) bind$unix(0xffffffffffffffff, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) setresuid(0x0, r1, 0x0) unshare(0x20000400) 15:19:58 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcaceb3843a0a27d26af18e26c51db155af69e0000000000000000000000000000df63a36fd407eb99643bb3409a86448396cd1499fc9043822e14cf2dbe93dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b76a9611ccb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x6}, 0x1c) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000240)=@req3={0x10000, 0x7ff, 0x401}, 0x1c) 15:19:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80108906, 0x0) 15:19:58 executing program 3: syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[{@uid={'uid', 0x3d, 0xee00}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0xdb8a) 15:19:58 executing program 2: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) mknodat$null(r1, &(0x7f0000000040)='./file0\x00', 0xffffc000, 0x103) 15:19:58 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @private}, @address_request}}}}, 0x0) 15:19:58 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000100001ff000400000000000003"], 0x28}}, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000001300)=[{0x0}], 0x0, &(0x7f0000000040)=ANY=[]) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) 15:19:58 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xff) 15:19:58 executing program 7: add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000080)={0x0, "be80b90ae0c74c556cd5e9c03fd442fd41e3e64b6abaea34bc63984a5662eacc09b514d4b567dadf0deceaa11421027662dec117d813d43a59bc99b545ebc135"}, 0x48, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f0000000080)=@keyring={'key_or_keyring:', 0x0, 0x2}) [ 143.837497] audit: type=1400 audit(1662995998.191:10): avc: denied { write } for pid=4198 comm="syz-executor.6" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 15:19:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80108906, 0x0) 15:19:58 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xff) 15:19:58 executing program 3: syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[{@uid={'uid', 0x3d, 0xee00}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0xdb8a) 15:19:58 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @private}, @address_request}}}}, 0x0) 15:19:58 executing program 2: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) mknodat$null(r1, &(0x7f0000000040)='./file0\x00', 0xffffc000, 0x103) 15:19:58 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000100001ff000400000000000003"], 0x28}}, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000001300)=[{0x0}], 0x0, &(0x7f0000000040)=ANY=[]) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) 15:19:58 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xff) 15:19:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80108906, 0x0) 15:19:58 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcaceb3843a0a27d26af18e26c51db155af69e0000000000000000000000000000df63a36fd407eb99643bb3409a86448396cd1499fc9043822e14cf2dbe93dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b76a9611ccb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x6}, 0x1c) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000240)=@req3={0x10000, 0x7ff, 0x401}, 0x1c) 15:19:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80108906, 0x0) 15:19:58 executing program 7: add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000080)={0x0, "be80b90ae0c74c556cd5e9c03fd442fd41e3e64b6abaea34bc63984a5662eacc09b514d4b567dadf0deceaa11421027662dec117d813d43a59bc99b545ebc135"}, 0x48, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f0000000080)=@keyring={'key_or_keyring:', 0x0, 0x2}) 15:19:58 executing program 3: syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[{@uid={'uid', 0x3d, 0xee00}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0xdb8a) 15:19:58 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @private}, @address_request}}}}, 0x0) 15:19:58 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xff) 15:19:58 executing program 2: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) mknodat$null(r1, &(0x7f0000000040)='./file0\x00', 0xffffc000, 0x103) 15:19:58 executing program 4: syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[{@uid={'uid', 0x3d, 0xee00}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0xdb8a) 15:19:58 executing program 3: syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[{@uid={'uid', 0x3d, 0xee00}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0xdb8a) 15:19:58 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000440)={'ip6tnl0\x00', 0x0}) 15:19:58 executing program 7: add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000080)={0x0, "be80b90ae0c74c556cd5e9c03fd442fd41e3e64b6abaea34bc63984a5662eacc09b514d4b567dadf0deceaa11421027662dec117d813d43a59bc99b545ebc135"}, 0x48, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f0000000080)=@keyring={'key_or_keyring:', 0x0, 0x2}) 15:19:58 executing program 6: r0 = eventfd2(0x7, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/14, 0xe}], 0x1) 15:19:58 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcaceb3843a0a27d26af18e26c51db155af69e0000000000000000000000000000df63a36fd407eb99643bb3409a86448396cd1499fc9043822e14cf2dbe93dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b76a9611ccb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x6}, 0x1c) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000240)=@req3={0x10000, 0x7ff, 0x401}, 0x1c) 15:19:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={{0x0, 0x2710}}) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) 15:19:58 executing program 4: syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[{@uid={'uid', 0x3d, 0xee00}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0xdb8a) 15:19:58 executing program 6: r0 = eventfd2(0x7, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/14, 0xe}], 0x1) 15:19:58 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x5385, &(0x7f0000000080)) 15:19:58 executing program 3: r0 = epoll_create(0x1) r1 = socket$packet(0x11, 0x3, 0x300) syz_mount_image$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x60000017}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) epoll_pwait(r0, &(0x7f0000000280)=[{}], 0x1, 0x0, 0x0, 0x0) 15:19:58 executing program 1: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2c, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000000}) 15:19:58 executing program 7: add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000080)={0x0, "be80b90ae0c74c556cd5e9c03fd442fd41e3e64b6abaea34bc63984a5662eacc09b514d4b567dadf0deceaa11421027662dec117d813d43a59bc99b545ebc135"}, 0x48, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f0000000080)=@keyring={'key_or_keyring:', 0x0, 0x2}) 15:19:58 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000011c0)={{r0}, 0x0, 0x0, @inherit={0x78, &(0x7f0000000500)={0x0, 0x6, 0x100, 0x129, {0x4, 0x2, 0x3, 0x0, 0x40}, [0x5, 0x8, 0x400, 0x7, 0x967, 0x81]}}, @subvolid=0x200}) 15:19:59 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x5385, &(0x7f0000000080)) 15:19:59 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000011c0)={{r0}, 0x0, 0x0, @inherit={0x78, &(0x7f0000000500)={0x0, 0x6, 0x100, 0x129, {0x4, 0x2, 0x3, 0x0, 0x40}, [0x5, 0x8, 0x400, 0x7, 0x967, 0x81]}}, @subvolid=0x200}) 15:19:59 executing program 6: r0 = eventfd2(0x7, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/14, 0xe}], 0x1) 15:19:59 executing program 1: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2c, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000000}) 15:19:59 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x8000}, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 15:19:59 executing program 4: syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[{@uid={'uid', 0x3d, 0xee00}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0xdb8a) 15:19:59 executing program 3: r0 = epoll_create(0x1) r1 = socket$packet(0x11, 0x3, 0x300) syz_mount_image$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x60000017}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) epoll_pwait(r0, &(0x7f0000000280)=[{}], 0x1, 0x0, 0x0, 0x0) 15:19:59 executing program 0: r0 = epoll_create(0x1) r1 = socket$packet(0x11, 0x3, 0x300) syz_mount_image$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x60000017}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) epoll_pwait(r0, &(0x7f0000000280)=[{}], 0x1, 0x0, 0x0, 0x0) 15:19:59 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x5385, &(0x7f0000000080)) 15:19:59 executing program 1: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2c, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000000}) 15:19:59 executing program 0: r0 = epoll_create(0x1) r1 = socket$packet(0x11, 0x3, 0x300) syz_mount_image$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x60000017}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) epoll_pwait(r0, &(0x7f0000000280)=[{}], 0x1, 0x0, 0x0, 0x0) 15:19:59 executing program 6: r0 = eventfd2(0x7, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/14, 0xe}], 0x1) VM DIAGNOSIS: 15:19:49 Registers: info registers vcpu 0 RAX=0000000000000073 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b1e41 RDI=ffffffff8763fae0 RBP=ffffffff8763faa0 RSP=ffff8880405c7698 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000073 R11=0000000000000001 R12=0000000000000073 R13=ffffffff8763faa0 R14=0000000000000010 R15=ffffffff822b1e30 RIP=ffffffff822b1e99 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fab2536e700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fa437a79620 CR3=000000000d948000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007fab27edf7c0 00007fab27edf7c8 YMM02=0000000000000000 0000000000000000 00007fab27edf7e0 00007fab27edf7c0 YMM03=0000000000000000 0000000000000000 00007fab27edf7c8 00007fab27edf7c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=0000000000000001 RCX=ffffffff81786115 RDX=1ffffffff0bdb286 RSI=ffffffff85ed942c RDI=ffffffff85bb76d0 RBP=ffff888040297480 RSP=ffff8880402973a8 R8 =ffffffff85ed942c R9 =ffffffff85ed9430 R10=ffffed1008052e92 R11=000000000003603d R12=ffff888040297469 R13=ffff888040297488 R14=ffff888040297428 R15=ffffffff81786115 RIP=ffffffff8111b61b RFL=00000212 [----A--] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007faa6fc0d8c0 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f58804fb8e0 CR3=00000000205c8000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM02=0000000000000000 0000000000000000 ffff000000000000 ffff0000ff000000 YMM03=0000000000000000 0000000000000000 00ff00000000ff00 000000ff000000ff YMM04=0000000000000000 0000000000000000 2f2f2f2f2f2f2f2f 2f2f2f2f2f2f2f2f YMM05=0000000000000000 0000000000000000 ffffffffffff0000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000006561 6124242f6867632f YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 00564e87a83eec00 007ffd00363a3762 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000