Warning: Permanently added '[localhost]:5073' (ECDSA) to the list of known hosts. 2022/09/19 12:48:38 fuzzer started 2022/09/19 12:48:39 dialing manager at localhost:42121 syzkaller login: [ 43.922065] cgroup: Unknown subsys name 'net' [ 44.010071] cgroup: Unknown subsys name 'rlimit' 2022/09/19 12:48:53 syscalls: 2215 2022/09/19 12:48:53 code coverage: enabled 2022/09/19 12:48:53 comparison tracing: enabled 2022/09/19 12:48:53 extra coverage: enabled 2022/09/19 12:48:53 setuid sandbox: enabled 2022/09/19 12:48:53 namespace sandbox: enabled 2022/09/19 12:48:53 Android sandbox: enabled 2022/09/19 12:48:53 fault injection: enabled 2022/09/19 12:48:53 leak checking: enabled 2022/09/19 12:48:53 net packet injection: enabled 2022/09/19 12:48:53 net device setup: enabled 2022/09/19 12:48:53 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/19 12:48:53 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/19 12:48:53 USB emulation: enabled 2022/09/19 12:48:53 hci packet injection: enabled 2022/09/19 12:48:53 wifi device emulation: failed to parse kernel version (6.0.0-rc6-next-20220919) 2022/09/19 12:48:53 802.15.4 emulation: enabled 2022/09/19 12:48:53 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/19 12:48:54 fetching corpus: 50, signal 31743/34105 (executing program) 2022/09/19 12:48:54 fetching corpus: 100, signal 40016/42880 (executing program) 2022/09/19 12:48:54 fetching corpus: 150, signal 50625/53363 (executing program) 2022/09/19 12:48:54 fetching corpus: 200, signal 54678/57557 (executing program) 2022/09/19 12:48:54 fetching corpus: 250, signal 59564/62222 (executing program) 2022/09/19 12:48:54 fetching corpus: 300, signal 65345/67467 (executing program) 2022/09/19 12:48:55 fetching corpus: 350, signal 70550/71929 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/75879 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/75940 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/75996 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/76053 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/76103 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/76156 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/76207 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/76257 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/76306 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/76369 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/76412 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/76465 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/76507 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/76562 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/76612 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/76658 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/76718 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/76774 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/76828 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/76895 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/76949 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/76998 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/77044 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/77096 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/77151 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/77201 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/77251 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/77303 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/77370 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/77420 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/77439 (executing program) 2022/09/19 12:48:55 fetching corpus: 398, signal 75401/77439 (executing program) 2022/09/19 12:48:57 starting 8 fuzzer processes 12:48:57 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000080), 0x4) 12:48:57 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 12:48:57 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@multicast, @empty, @void, {@ipv4={0x806, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @multicast1}, {0x0, 0x0, 0x0, @empty}}}}}, 0x0) 12:48:57 executing program 3: syz_emit_ethernet(0x1d, &(0x7f0000000000)={@local, @random="7700c24d06a7", @void, {@ipv4={0x800, @igmp={{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @private, {[@lsrr={0x83, 0x1}]}}, {0x0, 0x0, 0x0, @dev}}}}}, 0x0) [ 62.806726] audit: type=1400 audit(1663591738.007:6): avc: denied { execmem } for pid=289 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 12:48:58 executing program 7: add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) 12:48:58 executing program 4: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 12:48:58 executing program 5: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() ptrace$setopts(0x4206, r0, 0x0, 0x0) 12:48:58 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x1}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000)=0x8000, 0x4) [ 64.183669] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 64.185779] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 64.188103] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 64.189575] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 64.190964] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 64.196927] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 64.200475] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 64.202091] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 64.202308] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 64.204568] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 64.205504] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 64.205923] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 64.206623] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 64.208526] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 64.210549] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 64.211939] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 64.213442] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 64.213709] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 64.215978] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 64.221675] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 64.225399] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 64.226989] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 64.228283] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 64.229614] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 64.231358] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 64.232801] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 64.242512] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 64.244469] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 64.245746] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 64.246958] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 64.247013] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 64.248231] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 64.250660] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 64.250682] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 64.253228] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 64.254409] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 64.256156] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 64.257523] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 64.259206] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 64.262099] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 64.263437] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 64.269548] Bluetooth: hci1: HCI_REQ-0x0c1a [ 64.270251] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 64.270915] Bluetooth: hci4: HCI_REQ-0x0c1a [ 64.271741] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 64.273592] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 64.282593] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 64.285793] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 64.288466] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 64.289916] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 64.291227] Bluetooth: hci5: HCI_REQ-0x0c1a [ 64.298941] Bluetooth: hci2: HCI_REQ-0x0c1a [ 64.304271] Bluetooth: hci7: HCI_REQ-0x0c1a [ 64.304913] Bluetooth: hci0: HCI_REQ-0x0c1a [ 64.305447] Bluetooth: hci3: HCI_REQ-0x0c1a [ 64.325417] Bluetooth: hci6: HCI_REQ-0x0c1a [ 66.341327] Bluetooth: hci6: command 0x0409 tx timeout [ 66.341913] Bluetooth: hci0: command 0x0409 tx timeout [ 66.341948] Bluetooth: hci2: command 0x0409 tx timeout [ 66.342595] Bluetooth: hci3: command 0x0409 tx timeout [ 66.343646] Bluetooth: hci7: command 0x0409 tx timeout [ 66.344073] Bluetooth: hci5: command 0x0409 tx timeout [ 66.344744] Bluetooth: hci4: command 0x0409 tx timeout [ 66.344959] Bluetooth: hci1: command 0x0409 tx timeout [ 68.388908] Bluetooth: hci4: command 0x041b tx timeout [ 68.389361] Bluetooth: hci2: command 0x041b tx timeout [ 68.389940] Bluetooth: hci1: command 0x041b tx timeout [ 68.390456] Bluetooth: hci5: command 0x041b tx timeout [ 68.391243] Bluetooth: hci7: command 0x041b tx timeout [ 68.391686] Bluetooth: hci3: command 0x041b tx timeout [ 68.393583] Bluetooth: hci0: command 0x041b tx timeout [ 68.394725] Bluetooth: hci6: command 0x041b tx timeout [ 70.437990] Bluetooth: hci6: command 0x040f tx timeout [ 70.438631] Bluetooth: hci0: command 0x040f tx timeout [ 70.439258] Bluetooth: hci3: command 0x040f tx timeout [ 70.439697] Bluetooth: hci7: command 0x040f tx timeout [ 70.441940] Bluetooth: hci5: command 0x040f tx timeout [ 70.442432] Bluetooth: hci1: command 0x040f tx timeout [ 70.443818] Bluetooth: hci2: command 0x040f tx timeout [ 70.444995] Bluetooth: hci4: command 0x040f tx timeout [ 72.485075] Bluetooth: hci4: command 0x0419 tx timeout [ 72.485914] Bluetooth: hci2: command 0x0419 tx timeout [ 72.486720] Bluetooth: hci1: command 0x0419 tx timeout [ 72.489781] Bluetooth: hci5: command 0x0419 tx timeout [ 72.490619] Bluetooth: hci7: command 0x0419 tx timeout [ 72.492731] Bluetooth: hci3: command 0x0419 tx timeout [ 72.495007] Bluetooth: hci0: command 0x0419 tx timeout [ 72.495774] Bluetooth: hci6: command 0x0419 tx timeout 12:49:50 executing program 3: syz_emit_ethernet(0x1d, &(0x7f0000000000)={@local, @random="7700c24d06a7", @void, {@ipv4={0x800, @igmp={{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @private, {[@lsrr={0x83, 0x1}]}}, {0x0, 0x0, 0x0, @dev}}}}}, 0x0) 12:49:50 executing program 3: syz_emit_ethernet(0x1d, &(0x7f0000000000)={@local, @random="7700c24d06a7", @void, {@ipv4={0x800, @igmp={{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @private, {[@lsrr={0x83, 0x1}]}}, {0x0, 0x0, 0x0, @dev}}}}}, 0x0) 12:49:50 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 12:49:50 executing program 3: syz_emit_ethernet(0x1d, &(0x7f0000000000)={@local, @random="7700c24d06a7", @void, {@ipv4={0x800, @igmp={{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @private, {[@lsrr={0x83, 0x1}]}}, {0x0, 0x0, 0x0, @dev}}}}}, 0x0) 12:49:50 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 12:49:50 executing program 3: ioprio_set$pid(0x2, 0xffffffffffffffff, 0x0) 12:49:50 executing program 3: ioprio_set$pid(0x2, 0xffffffffffffffff, 0x0) 12:49:50 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) [ 117.649171] loop4: detected capacity change from 0 to 256 [ 117.672898] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 117.692015] loop4: detected capacity change from 0 to 256 [ 117.811607] audit: type=1400 audit(1663591793.012:7): avc: denied { open } for pid=3966 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 117.813306] audit: type=1400 audit(1663591793.012:8): avc: denied { kernel } for pid=3966 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 117.815958] ------------[ cut here ]------------ [ 117.815979] [ 117.815982] ====================================================== [ 117.815986] WARNING: possible circular locking dependency detected [ 117.815990] 6.0.0-rc6-next-20220919 #1 Not tainted [ 117.815997] ------------------------------------------------------ [ 117.816000] syz-executor.5/3967 is trying to acquire lock: [ 117.816007] ffffffff853fa838 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 117.816042] [ 117.816042] but task is already holding lock: [ 117.816045] ffff888008ac5020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 117.816075] [ 117.816075] which lock already depends on the new lock. [ 117.816075] [ 117.816078] [ 117.816078] the existing dependency chain (in reverse order) is: [ 117.816081] [ 117.816081] -> #3 (&ctx->lock){....}-{2:2}: [ 117.816096] _raw_spin_lock+0x2a/0x40 [ 117.816114] __perf_event_task_sched_out+0x53b/0x18d0 [ 117.816128] __schedule+0xedd/0x2470 [ 117.816139] schedule+0xda/0x1b0 [ 117.816150] exit_to_user_mode_prepare+0x114/0x1a0 [ 117.816171] syscall_exit_to_user_mode+0x19/0x40 [ 117.816190] do_syscall_64+0x48/0x90 [ 117.816205] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 117.816223] [ 117.816223] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 117.816239] _raw_spin_lock_nested+0x30/0x40 [ 117.816255] raw_spin_rq_lock_nested+0x1e/0x30 [ 117.816269] task_fork_fair+0x63/0x4d0 [ 117.816286] sched_cgroup_fork+0x3d0/0x540 [ 117.816301] copy_process+0x4183/0x6e20 [ 117.816313] kernel_clone+0xe7/0x890 [ 117.816323] user_mode_thread+0xad/0xf0 [ 117.816334] rest_init+0x24/0x250 [ 117.816352] arch_call_rest_init+0xf/0x14 [ 117.816364] start_kernel+0x4c1/0x4e6 [ 117.816375] secondary_startup_64_no_verify+0xe0/0xeb [ 117.816390] [ 117.816390] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 117.816405] _raw_spin_lock_irqsave+0x39/0x60 [ 117.816421] try_to_wake_up+0xab/0x1920 [ 117.816435] up+0x75/0xb0 [ 117.816448] __up_console_sem+0x6e/0x80 [ 117.816464] console_unlock+0x46a/0x590 [ 117.816481] do_con_write+0xc05/0x1d50 [ 117.816493] con_write+0x21/0x40 [ 117.816504] n_tty_write+0x4d4/0xfe0 [ 117.816517] file_tty_write.constprop.0+0x49c/0x8f0 [ 117.816530] vfs_write+0x9c3/0xd90 [ 117.816549] ksys_write+0x127/0x250 [ 117.816567] do_syscall_64+0x3b/0x90 [ 117.816581] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 117.816600] [ 117.816600] -> #0 ((console_sem).lock){....}-{2:2}: [ 117.816615] __lock_acquire+0x2a02/0x5e70 [ 117.816633] lock_acquire+0x1a2/0x530 [ 117.816650] _raw_spin_lock_irqsave+0x39/0x60 [ 117.816666] down_trylock+0xe/0x70 [ 117.816680] __down_trylock_console_sem+0x3b/0xd0 [ 117.816697] vprintk_emit+0x16b/0x560 [ 117.816714] vprintk+0x84/0xa0 [ 117.816731] _printk+0xba/0xf1 [ 117.816750] report_bug.cold+0x72/0xab [ 117.816764] handle_bug+0x3c/0x70 [ 117.816778] exc_invalid_op+0x14/0x50 [ 117.816792] asm_exc_invalid_op+0x16/0x20 [ 117.816810] group_sched_out.part.0+0x2c7/0x460 [ 117.816821] ctx_sched_out+0x8f1/0xc10 [ 117.816832] __perf_event_task_sched_out+0x6d0/0x18d0 [ 117.816845] __schedule+0xedd/0x2470 [ 117.816856] schedule+0xda/0x1b0 [ 117.816867] exit_to_user_mode_prepare+0x114/0x1a0 [ 117.816887] syscall_exit_to_user_mode+0x19/0x40 [ 117.816906] do_syscall_64+0x48/0x90 [ 117.816920] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 117.816938] [ 117.816938] other info that might help us debug this: [ 117.816938] [ 117.816941] Chain exists of: [ 117.816941] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 117.816941] [ 117.816958] Possible unsafe locking scenario: [ 117.816958] [ 117.816960] CPU0 CPU1 [ 117.816962] ---- ---- [ 117.816965] lock(&ctx->lock); [ 117.816971] lock(&rq->__lock); [ 117.816978] lock(&ctx->lock); [ 117.816985] lock((console_sem).lock); [ 117.816991] [ 117.816991] *** DEADLOCK *** [ 117.816991] [ 117.816993] 2 locks held by syz-executor.5/3967: [ 117.817001] #0: ffff88806ce37d18 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 117.817030] #1: ffff888008ac5020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 117.817061] [ 117.817061] stack backtrace: [ 117.817063] CPU: 0 PID: 3967 Comm: syz-executor.5 Not tainted 6.0.0-rc6-next-20220919 #1 [ 117.817077] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 117.817086] Call Trace: [ 117.817089] [ 117.817094] dump_stack_lvl+0x8b/0xb3 [ 117.817110] check_noncircular+0x263/0x2e0 [ 117.817128] ? format_decode+0x26c/0xb50 [ 117.817144] ? print_circular_bug+0x450/0x450 [ 117.817162] ? enable_ptr_key_workfn+0x20/0x20 [ 117.817178] ? __lockdep_reset_lock+0x180/0x180 [ 117.817196] ? format_decode+0x26c/0xb50 [ 117.817213] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 117.817233] __lock_acquire+0x2a02/0x5e70 [ 117.817256] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 117.817281] lock_acquire+0x1a2/0x530 [ 117.817299] ? down_trylock+0xe/0x70 [ 117.817315] ? lock_release+0x750/0x750 [ 117.817335] ? find_held_lock+0x2c/0x110 [ 117.817353] ? vprintk+0x84/0xa0 [ 117.817373] _raw_spin_lock_irqsave+0x39/0x60 [ 117.817390] ? down_trylock+0xe/0x70 [ 117.817405] down_trylock+0xe/0x70 [ 117.817420] ? vprintk+0x84/0xa0 [ 117.817438] __down_trylock_console_sem+0x3b/0xd0 [ 117.817457] vprintk_emit+0x16b/0x560 [ 117.817477] vprintk+0x84/0xa0 [ 117.817496] _printk+0xba/0xf1 [ 117.817516] ? record_print_text.cold+0x16/0x16 [ 117.817538] ? hrtimer_try_to_cancel+0x163/0x2c0 [ 117.817552] ? lock_downgrade+0x6d0/0x6d0 [ 117.817572] ? report_bug.cold+0x66/0xab [ 117.817587] ? group_sched_out.part.0+0x2c7/0x460 [ 117.817600] report_bug.cold+0x72/0xab [ 117.817617] handle_bug+0x3c/0x70 [ 117.817632] exc_invalid_op+0x14/0x50 [ 117.817648] asm_exc_invalid_op+0x16/0x20 [ 117.817667] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 117.817681] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d 5b 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 117.817694] RSP: 0018:ffff88800d217c48 EFLAGS: 00010006 [ 117.817704] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 117.817712] RDX: ffff8880206ab580 RSI: ffffffff81566077 RDI: 0000000000000005 [ 117.817721] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 117.817729] R10: 0000000000000000 R11: 0000000000000001 R12: ffff888008ac5000 [ 117.817738] R13: ffff88806ce3d140 R14: ffffffff8547bf80 R15: 0000000000000002 [ 117.817750] ? group_sched_out.part.0+0x2c7/0x460 [ 117.817765] ? group_sched_out.part.0+0x2c7/0x460 [ 117.817779] ctx_sched_out+0x8f1/0xc10 [ 117.817793] __perf_event_task_sched_out+0x6d0/0x18d0 [ 117.817810] ? lock_is_held_type+0xd7/0x130 [ 117.817831] ? __perf_cgroup_move+0x160/0x160 [ 117.817844] ? set_next_entity+0x304/0x550 [ 117.817863] ? update_curr+0x267/0x740 [ 117.817883] ? lock_is_held_type+0xd7/0x130 [ 117.817903] __schedule+0xedd/0x2470 [ 117.817919] ? io_schedule_timeout+0x150/0x150 [ 117.817933] ? __x64_sys_futex_time32+0x480/0x480 [ 117.817948] schedule+0xda/0x1b0 [ 117.817960] exit_to_user_mode_prepare+0x114/0x1a0 [ 117.817983] syscall_exit_to_user_mode+0x19/0x40 [ 117.818002] do_syscall_64+0x48/0x90 [ 117.818018] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 117.818038] RIP: 0033:0x7f42a4eb5b19 [ 117.818047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 117.818060] RSP: 002b:00007f42a242b218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 117.818072] RAX: 0000000000000001 RBX: 00007f42a4fc8f68 RCX: 00007f42a4eb5b19 [ 117.818080] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f42a4fc8f6c [ 117.818089] RBP: 00007f42a4fc8f60 R08: 000000000000000e R09: 0000000000000000 [ 117.818097] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f42a4fc8f6c [ 117.818105] R13: 00007fff6cbd8c9f R14: 00007f42a242b300 R15: 0000000000022000 [ 117.818119] [ 117.880197] WARNING: CPU: 0 PID: 3967 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 117.880948] Modules linked in: [ 117.881214] CPU: 0 PID: 3967 Comm: syz-executor.5 Not tainted 6.0.0-rc6-next-20220919 #1 [ 117.881873] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 117.882773] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 117.883211] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d 5b 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 117.884665] RSP: 0018:ffff88800d217c48 EFLAGS: 00010006 [ 117.885099] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 117.885677] RDX: ffff8880206ab580 RSI: ffffffff81566077 RDI: 0000000000000005 [ 117.886253] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 117.886829] R10: 0000000000000000 R11: 0000000000000001 R12: ffff888008ac5000 [ 117.887422] R13: ffff88806ce3d140 R14: ffffffff8547bf80 R15: 0000000000000002 [ 117.888000] FS: 00007f42a242b700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 117.888713] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 117.889160] CR2: 00007f42a4fc9018 CR3: 0000000018bf4000 CR4: 0000000000350ef0 [ 117.889704] Call Trace: [ 117.889908] [ 117.890090] ctx_sched_out+0x8f1/0xc10 [ 117.890400] __perf_event_task_sched_out+0x6d0/0x18d0 [ 117.890804] ? lock_is_held_type+0xd7/0x130 [ 117.891151] ? __perf_cgroup_move+0x160/0x160 [ 117.891504] ? set_next_entity+0x304/0x550 [ 117.891840] ? update_curr+0x267/0x740 [ 117.892153] ? lock_is_held_type+0xd7/0x130 [ 117.892496] __schedule+0xedd/0x2470 [ 117.892791] ? io_schedule_timeout+0x150/0x150 [ 117.893150] ? __x64_sys_futex_time32+0x480/0x480 [ 117.893529] schedule+0xda/0x1b0 [ 117.893796] exit_to_user_mode_prepare+0x114/0x1a0 [ 117.894186] syscall_exit_to_user_mode+0x19/0x40 [ 117.894562] do_syscall_64+0x48/0x90 [ 117.894859] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 117.895271] RIP: 0033:0x7f42a4eb5b19 [ 117.895560] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 117.896940] RSP: 002b:00007f42a242b218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 117.897522] RAX: 0000000000000001 RBX: 00007f42a4fc8f68 RCX: 00007f42a4eb5b19 [ 117.898072] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f42a4fc8f6c [ 117.898616] RBP: 00007f42a4fc8f60 R08: 000000000000000e R09: 0000000000000000 [ 117.899172] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f42a4fc8f6c [ 117.899715] R13: 00007fff6cbd8c9f R14: 00007f42a242b300 R15: 0000000000022000 [ 117.900266] [ 117.900453] irq event stamp: 538 [ 117.900712] hardirqs last enabled at (537): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 117.901436] hardirqs last disabled at (538): [] __schedule+0x1225/0x2470 [ 117.902067] softirqs last enabled at (390): [] __irq_exit_rcu+0x11b/0x180 [ 117.902712] softirqs last disabled at (273): [] __irq_exit_rcu+0x11b/0x180 [ 117.903364] ---[ end trace 0000000000000000 ]--- [ 117.933835] hrtimer: interrupt took 12183 ns 12:49:53 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000080), 0x4) 12:49:53 executing program 3: ioprio_set$pid(0x2, 0xffffffffffffffff, 0x0) 12:49:53 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@multicast, @empty, @void, {@ipv4={0x806, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @multicast1}, {0x0, 0x0, 0x0, @empty}}}}}, 0x0) 12:49:53 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x1}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000)=0x8000, 0x4) 12:49:53 executing program 4: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 12:49:53 executing program 5: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() ptrace$setopts(0x4206, r0, 0x0, 0x0) 12:49:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='attr/current\x00') process_mrelease(0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000002040), 0x22c00, 0x0) 12:49:53 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) [ 118.103903] loop4: detected capacity change from 0 to 256 12:49:53 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@multicast, @empty, @void, {@ipv4={0x806, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @multicast1}, {0x0, 0x0, 0x0, @empty}}}}}, 0x0) 12:49:53 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x1}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000)=0x8000, 0x4) 12:49:53 executing program 3: ioprio_set$pid(0x2, 0xffffffffffffffff, 0x0) 12:49:53 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) 12:49:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='attr/current\x00') process_mrelease(0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000002040), 0x22c00, 0x0) 12:49:53 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000080), 0x4) 12:49:53 executing program 4: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 12:49:53 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x1}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000)=0x8000, 0x4) 12:49:53 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@multicast, @empty, @void, {@ipv4={0x806, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @multicast1}, {0x0, 0x0, 0x0, @empty}}}}}, 0x0) 12:49:53 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='attr/current\x00') process_mrelease(0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000002040), 0x22c00, 0x0) 12:49:53 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) 12:49:53 executing program 5: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() ptrace$setopts(0x4206, r0, 0x0, 0x0) 12:49:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='attr/current\x00') process_mrelease(0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000002040), 0x22c00, 0x0) [ 118.263428] loop4: detected capacity change from 0 to 256 12:49:53 executing program 6: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() ptrace$setopts(0x4206, r0, 0x0, 0x0) 12:49:53 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000080), 0x4) 12:49:54 executing program 5: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() ptrace$setopts(0x4206, r0, 0x0, 0x0) 12:49:54 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) 12:49:54 executing program 4: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 12:49:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='attr/current\x00') process_mrelease(0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000002040), 0x22c00, 0x0) 12:49:54 executing program 0: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() ptrace$setopts(0x4206, r0, 0x0, 0x0) 12:49:54 executing program 6: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() ptrace$setopts(0x4206, r0, 0x0, 0x0) 12:49:54 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='attr/current\x00') process_mrelease(0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000002040), 0x22c00, 0x0) 12:49:54 executing program 2: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) [ 119.375571] loop4: detected capacity change from 0 to 256 12:49:54 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='attr/current\x00') process_mrelease(0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000002040), 0x22c00, 0x0) [ 119.418302] loop2: detected capacity change from 0 to 256 12:49:54 executing program 7: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 12:49:54 executing program 4: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) [ 119.448351] loop7: detected capacity change from 0 to 256 12:49:54 executing program 6: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() ptrace$setopts(0x4206, r0, 0x0, 0x0) 12:49:54 executing program 1: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) [ 119.515597] loop1: detected capacity change from 0 to 256 [ 119.568218] loop4: detected capacity change from 0 to 256 12:49:55 executing program 7: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 12:49:55 executing program 2: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 12:49:55 executing program 3: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 12:49:55 executing program 6: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 12:49:55 executing program 0: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() ptrace$setopts(0x4206, r0, 0x0, 0x0) 12:49:55 executing program 5: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 12:49:55 executing program 1: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 12:49:55 executing program 4: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) [ 120.380259] loop6: detected capacity change from 0 to 256 [ 120.394927] loop4: detected capacity change from 0 to 256 [ 120.402072] loop1: detected capacity change from 0 to 256 [ 120.422107] loop7: detected capacity change from 0 to 256 12:49:55 executing program 6: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) [ 120.441322] loop2: detected capacity change from 0 to 256 [ 120.442305] loop5: detected capacity change from 0 to 256 [ 120.446252] loop3: detected capacity change from 0 to 256 12:49:55 executing program 4: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 12:49:55 executing program 7: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) [ 120.482568] loop6: detected capacity change from 0 to 256 12:49:55 executing program 1: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 12:49:55 executing program 0: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() ptrace$setopts(0x4206, r0, 0x0, 0x0) 12:49:55 executing program 2: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) [ 120.535317] loop7: detected capacity change from 0 to 256 12:49:55 executing program 5: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 12:49:55 executing program 6: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 12:49:55 executing program 3: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) [ 120.575995] loop4: detected capacity change from 0 to 256 [ 120.615348] loop1: detected capacity change from 0 to 256 [ 120.615368] loop6: detected capacity change from 0 to 256 [ 120.617441] loop3: detected capacity change from 0 to 256 [ 120.619079] loop5: detected capacity change from 0 to 256 [ 120.637658] loop2: detected capacity change from 0 to 256 12:49:55 executing program 3: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 12:49:55 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x1}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000)=0x8000, 0x4) 12:49:55 executing program 5: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 12:49:55 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000)=0x1, 0x4) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x0, @empty}, 0x10, &(0x7f0000001480)=[{&(0x7f0000000140)="01", 0x7ffff000}], 0x1}, 0x20000040) 12:49:55 executing program 6: getpid() exit_group(0x1) getpid() 12:49:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@ceph_nfs_confh={0x10}, 0x0) 12:49:55 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x1}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000)=0x8000, 0x4) [ 120.741616] loop5: detected capacity change from 0 to 256 12:49:55 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) write$selinux_attr(r0, 0x0, 0x0) 12:49:55 executing program 2: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @inquiry_info_with_rssi_and_pscan_mode={{0x22, 0x1f}, {0x2, [{@none, 0x0, 0x0, 0x0, "3d1f13"}, {@any, 0x0, 0x0, 0x0, "8b233f"}]}}}, 0x22) syz_emit_vhci(&(0x7f0000000100)=@HCI_SCODATA_PKT, 0x4) syz_emit_vhci(&(0x7f00000002c0)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x0, @none, "8cea19342b17838e9d792c21a471025e3bbc672775ce1abaeb09f4adb1c655aeff8b3e6410da7e8cf5f759ec0a11b56ef965cd09e0e66db076a5413039a018c65c7deed8a1d5c3fdeba6fdc82f739f1172e0a2901dd74184fe874c45b6d22bef42c59366f390aca1b390de547042affd0d629da0e31066562721ba74921708c5ffc94298f311e0d49262a13d78475537a56b59ec56a46b7770b797e22172e3ae36e82e39050ecabb26fa8336841b4f70ccc0bd94cc6cc6b331717ba26b0cd115ec6a91d3d18c75109d3a255236c4517139953059c5198198b7f0de79aaf65080215ad40b60e2fb0bb156a0010fd45764fec9159cc46b39f9"}}}, 0x102) syz_emit_vhci(&(0x7f0000000840)=@HCI_EVENT_PKT={0x4, @hci_ev_mode_change={{0x14, 0x6}}}, 0x9) syz_emit_vhci(&(0x7f0000000880)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_host_features={{0x3d, 0xe}, {@none, "1b46404df347665d"}}}, 0x11) 12:49:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@ceph_nfs_confh={0x10}, 0x0) 12:49:55 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x1}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000)=0x8000, 0x4) [ 120.787313] loop3: detected capacity change from 0 to 256 [ 120.801776] Bluetooth: hci6: SCO packet for unknown connection handle 0 12:49:56 executing program 2: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @inquiry_info_with_rssi_and_pscan_mode={{0x22, 0x1f}, {0x2, [{@none, 0x0, 0x0, 0x0, "3d1f13"}, {@any, 0x0, 0x0, 0x0, "8b233f"}]}}}, 0x22) syz_emit_vhci(&(0x7f0000000100)=@HCI_SCODATA_PKT, 0x4) syz_emit_vhci(&(0x7f00000002c0)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x0, @none, "8cea19342b17838e9d792c21a471025e3bbc672775ce1abaeb09f4adb1c655aeff8b3e6410da7e8cf5f759ec0a11b56ef965cd09e0e66db076a5413039a018c65c7deed8a1d5c3fdeba6fdc82f739f1172e0a2901dd74184fe874c45b6d22bef42c59366f390aca1b390de547042affd0d629da0e31066562721ba74921708c5ffc94298f311e0d49262a13d78475537a56b59ec56a46b7770b797e22172e3ae36e82e39050ecabb26fa8336841b4f70ccc0bd94cc6cc6b331717ba26b0cd115ec6a91d3d18c75109d3a255236c4517139953059c5198198b7f0de79aaf65080215ad40b60e2fb0bb156a0010fd45764fec9159cc46b39f9"}}}, 0x102) syz_emit_vhci(&(0x7f0000000840)=@HCI_EVENT_PKT={0x4, @hci_ev_mode_change={{0x14, 0x6}}}, 0x9) syz_emit_vhci(&(0x7f0000000880)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_host_features={{0x3d, 0xe}, {@none, "1b46404df347665d"}}}, 0x11) 12:49:56 executing program 7: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x2c, 0x0, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_LABELS_MASK={0x18, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, 0x2c}}, 0x0) 12:49:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000)=0x1, 0x4) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x0, @empty}, 0x10, &(0x7f0000001480)=[{&(0x7f0000000140)="01", 0x7ffff000}], 0x1}, 0x20000040) 12:49:56 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000100)=""/4096, 0x1000) 12:49:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@ceph_nfs_confh={0x10}, 0x0) 12:49:56 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) write$selinux_attr(r0, 0x0, 0x0) 12:49:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000)=0x1, 0x4) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x0, @empty}, 0x10, &(0x7f0000001480)=[{&(0x7f0000000140)="01", 0x7ffff000}], 0x1}, 0x20000040) [ 120.802578] Bluetooth: hci6: SCO packet for unknown connection handle 0 [ 121.016936] audit: type=1400 audit(1663591796.214:9): avc: denied { read } for pid=4127 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 12:49:56 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sfeatures}) 12:49:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@ceph_nfs_confh={0x10}, 0x0) 12:49:56 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) write$selinux_attr(r0, 0x0, 0x0) 12:49:56 executing program 7: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x2c, 0x0, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_LABELS_MASK={0x18, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, 0x2c}}, 0x0) 12:49:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000)=0x1, 0x4) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x0, @empty}, 0x10, &(0x7f0000001480)=[{&(0x7f0000000140)="01", 0x7ffff000}], 0x1}, 0x20000040) 12:49:56 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000100)=""/4096, 0x1000) 12:49:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000)=0x1, 0x4) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x0, @empty}, 0x10, &(0x7f0000001480)=[{&(0x7f0000000140)="01", 0x7ffff000}], 0x1}, 0x20000040) 12:49:56 executing program 2: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @inquiry_info_with_rssi_and_pscan_mode={{0x22, 0x1f}, {0x2, [{@none, 0x0, 0x0, 0x0, "3d1f13"}, {@any, 0x0, 0x0, 0x0, "8b233f"}]}}}, 0x22) syz_emit_vhci(&(0x7f0000000100)=@HCI_SCODATA_PKT, 0x4) syz_emit_vhci(&(0x7f00000002c0)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x0, @none, "8cea19342b17838e9d792c21a471025e3bbc672775ce1abaeb09f4adb1c655aeff8b3e6410da7e8cf5f759ec0a11b56ef965cd09e0e66db076a5413039a018c65c7deed8a1d5c3fdeba6fdc82f739f1172e0a2901dd74184fe874c45b6d22bef42c59366f390aca1b390de547042affd0d629da0e31066562721ba74921708c5ffc94298f311e0d49262a13d78475537a56b59ec56a46b7770b797e22172e3ae36e82e39050ecabb26fa8336841b4f70ccc0bd94cc6cc6b331717ba26b0cd115ec6a91d3d18c75109d3a255236c4517139953059c5198198b7f0de79aaf65080215ad40b60e2fb0bb156a0010fd45764fec9159cc46b39f9"}}}, 0x102) syz_emit_vhci(&(0x7f0000000840)=@HCI_EVENT_PKT={0x4, @hci_ev_mode_change={{0x14, 0x6}}}, 0x9) syz_emit_vhci(&(0x7f0000000880)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_host_features={{0x3d, 0xe}, {@none, "1b46404df347665d"}}}, 0x11) 12:49:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000)=0x1, 0x4) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x0, @empty}, 0x10, &(0x7f0000001480)=[{&(0x7f0000000140)="01", 0x7ffff000}], 0x1}, 0x20000040) 12:49:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000)=0x1, 0x4) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x0, @empty}, 0x10, &(0x7f0000001480)=[{&(0x7f0000000140)="01", 0x7ffff000}], 0x1}, 0x20000040) 12:49:56 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) write$selinux_attr(r0, 0x0, 0x0) 12:49:56 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000100)=""/4096, 0x1000) 12:49:56 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sfeatures}) 12:49:56 executing program 7: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x2c, 0x0, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_LABELS_MASK={0x18, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, 0x2c}}, 0x0) 12:49:56 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000100)=""/4096, 0x1000) [ 121.055067] Bluetooth: hci6: SCO packet for unknown connection handle 0 12:49:56 executing program 2: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @inquiry_info_with_rssi_and_pscan_mode={{0x22, 0x1f}, {0x2, [{@none, 0x0, 0x0, 0x0, "3d1f13"}, {@any, 0x0, 0x0, 0x0, "8b233f"}]}}}, 0x22) syz_emit_vhci(&(0x7f0000000100)=@HCI_SCODATA_PKT, 0x4) syz_emit_vhci(&(0x7f00000002c0)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x0, @none, "8cea19342b17838e9d792c21a471025e3bbc672775ce1abaeb09f4adb1c655aeff8b3e6410da7e8cf5f759ec0a11b56ef965cd09e0e66db076a5413039a018c65c7deed8a1d5c3fdeba6fdc82f739f1172e0a2901dd74184fe874c45b6d22bef42c59366f390aca1b390de547042affd0d629da0e31066562721ba74921708c5ffc94298f311e0d49262a13d78475537a56b59ec56a46b7770b797e22172e3ae36e82e39050ecabb26fa8336841b4f70ccc0bd94cc6cc6b331717ba26b0cd115ec6a91d3d18c75109d3a255236c4517139953059c5198198b7f0de79aaf65080215ad40b60e2fb0bb156a0010fd45764fec9159cc46b39f9"}}}, 0x102) syz_emit_vhci(&(0x7f0000000840)=@HCI_EVENT_PKT={0x4, @hci_ev_mode_change={{0x14, 0x6}}}, 0x9) syz_emit_vhci(&(0x7f0000000880)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_host_features={{0x3d, 0xe}, {@none, "1b46404df347665d"}}}, 0x11) 12:49:56 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sfeatures}) 12:49:56 executing program 7: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x2c, 0x0, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_LABELS_MASK={0x18, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, 0x2c}}, 0x0) [ 121.264910] Bluetooth: hci6: SCO packet for unknown connection handle 0 12:49:56 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000100)=""/4096, 0x1000) 12:49:56 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000100)=""/4096, 0x1000) 12:49:56 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sfeatures}) 12:49:56 executing program 1: r0 = fork() ioprio_get$pid(0x3, r0) 12:49:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$netlink(r0, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)=[{&(0x7f0000001340)={0x50, 0x21, 0x1, 0x0, 0x0, "", [@nested={0x3d, 0x0, 0x0, 0x1, [@generic="58f4db24ff596a629b0dc8a7e568fe2b0f23f18e2f6d4200b3bdabe512e9c9a79d7b673561a300cc1f5694f4e0e817c3d70a9cedd8fa1829be"]}]}, 0x50}], 0x1}, 0x0) 12:49:56 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 12:49:56 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000003400), 0x0) 12:49:56 executing program 5: openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x801, 0x0) 12:49:56 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000003400), 0x0) 12:49:56 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000100)=""/4096, 0x1000) 12:49:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$netlink(r0, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)=[{&(0x7f0000001340)={0x50, 0x21, 0x1, 0x0, 0x0, "", [@nested={0x3d, 0x0, 0x0, 0x1, [@generic="58f4db24ff596a629b0dc8a7e568fe2b0f23f18e2f6d4200b3bdabe512e9c9a79d7b673561a300cc1f5694f4e0e817c3d70a9cedd8fa1829be"]}]}, 0x50}], 0x1}, 0x0) 12:49:56 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000003400), 0x0) 12:49:56 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000003400), 0x0) 12:49:56 executing program 3: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000540)={0x5, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000380)={0x8, {{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) openat$incfs(r2, &(0x7f0000000180)='.pending_reads\x00', 0x0, 0x1) r3 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r3, 0x29, 0x50, 0x0, &(0x7f0000000080)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x1, 0x2, 0x1, 0x7, 0x0, 0x8}, 0x20) syz_io_uring_setup(0x1cb6, &(0x7f00000001c0), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) recvfrom(r1, &(0x7f0000000000)=""/136, 0x88, 0x100, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r4, 0x29, 0x50, 0x0, &(0x7f0000000080)) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) 12:49:56 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$CDROMRESUME(r0, 0x5302) ioctl$CDROMREADRAW(0xffffffffffffffff, 0x5314, &(0x7f0000000200)={0x8, 0x0, 0x40, 0x4, 0x0, 0xec}) ioctl$CDROM_SET_OPTIONS(0xffffffffffffffff, 0x5320, 0x0) 12:49:56 executing program 1: r0 = fork() ioprio_get$pid(0x3, r0) 12:49:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$netlink(r0, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)=[{&(0x7f0000001340)={0x50, 0x21, 0x1, 0x0, 0x0, "", [@nested={0x3d, 0x0, 0x0, 0x1, [@generic="58f4db24ff596a629b0dc8a7e568fe2b0f23f18e2f6d4200b3bdabe512e9c9a79d7b673561a300cc1f5694f4e0e817c3d70a9cedd8fa1829be"]}]}, 0x50}], 0x1}, 0x0) 12:49:56 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000003400), 0x0) 12:49:57 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000540)={0x5, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000380)={0x8, {{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) openat$incfs(r2, &(0x7f0000000180)='.pending_reads\x00', 0x0, 0x1) r3 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r3, 0x29, 0x50, 0x0, &(0x7f0000000080)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x1, 0x2, 0x1, 0x7, 0x0, 0x8}, 0x20) syz_io_uring_setup(0x1cb6, &(0x7f00000001c0), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) recvfrom(r1, &(0x7f0000000000)=""/136, 0x88, 0x100, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r4, 0x29, 0x50, 0x0, &(0x7f0000000080)) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) 12:49:57 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000003400), 0x0) 12:49:57 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$CDROMRESUME(r0, 0x5302) ioctl$CDROMREADRAW(0xffffffffffffffff, 0x5314, &(0x7f0000000200)={0x8, 0x0, 0x40, 0x4, 0x0, 0xec}) ioctl$CDROM_SET_OPTIONS(0xffffffffffffffff, 0x5320, 0x0) 12:49:57 executing program 6: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) rename(0x0, &(0x7f0000000040)='./file1\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(0xffffffffffffffff, 0x0, 0x40, 0x1) openat(r0, &(0x7f0000000200)='./file1\x00', 0x80000, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x1cd802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2811, r2, 0x0) r3 = openat2(r2, &(0x7f0000000000)='./file1\x00', &(0x7f00000001c0)={0x101000, 0x101, 0x11}, 0x18) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r4, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x0) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="0702bb36edefdf8fef90cc99fd26b912bc9bfc3e2d485b598390aa39f3897b10d03bc2682aa953379ed8236c609bd71ab0ab291b82bf4a43072d6cba93bb6354b2fb3f96ff2702cc173f0f082641a049966edca98826b3d92f3e728f5b2a07fecaecf45876b68d67eea2e25b5e94f8de", 0x70}, {&(0x7f0000000380)="a1e1d63a5f76c9b7780f97886ba74e970d5ec2ac8ff37e5c0490e864b975087aac20d1e14ac6dd8cda0e030963c297c8c236061b1efbeef27cad5d9653f299560039f45fc5816310a32e24b23cba756eca76dc4a07250d3b7297b4513f31773c9adf5c2ab0076d5568bf457543e68353b7397807e759ba3508cf9bcafb2d41e6e166ad3ae0b18cbd18135d61680d9a5b86696d7fdd77d19651cec1d1a75a5316e41ff6", 0xa3}, {&(0x7f0000000440)="def80b8db0c796fd5537ce41b187d128adc82d16f0c39e9c6448e1705aa9b8eb8ec799d0ced0fc64eacbd103a9457872fcf94e00887453e950a13a292d6272ee13a066fc6a7f71b01ad53c18c6f8ccd7e850189c630d7c2cb2519c78ff", 0x5d}, {&(0x7f00000004c0)="a3808eb3934f3df40907a015fd1ffce225cc4147403d6ed67127ece4b81aba77ad8fe6ae3ded384743ea26ef9ad9d4ba5b14bd3b9afff0bc0d51a8c6514501336b83dc38d81a6b026a6344732d801fb416b7f3e859fd78ec8a6ad5b519be8aaa641d457848c514", 0x67}], 0x4, 0x8, 0x401) 12:49:57 executing program 1: r0 = fork() ioprio_get$pid(0x3, r0) 12:49:57 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000003400), 0x0) 12:49:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$netlink(r0, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)=[{&(0x7f0000001340)={0x50, 0x21, 0x1, 0x0, 0x0, "", [@nested={0x3d, 0x0, 0x0, 0x1, [@generic="58f4db24ff596a629b0dc8a7e568fe2b0f23f18e2f6d4200b3bdabe512e9c9a79d7b673561a300cc1f5694f4e0e817c3d70a9cedd8fa1829be"]}]}, 0x50}], 0x1}, 0x0) 12:49:57 executing program 3: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000540)={0x5, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000380)={0x8, {{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) openat$incfs(r2, &(0x7f0000000180)='.pending_reads\x00', 0x0, 0x1) r3 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r3, 0x29, 0x50, 0x0, &(0x7f0000000080)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x1, 0x2, 0x1, 0x7, 0x0, 0x8}, 0x20) syz_io_uring_setup(0x1cb6, &(0x7f00000001c0), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) recvfrom(r1, &(0x7f0000000000)=""/136, 0x88, 0x100, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r4, 0x29, 0x50, 0x0, &(0x7f0000000080)) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) 12:49:57 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$CDROMRESUME(r0, 0x5302) ioctl$CDROMREADRAW(0xffffffffffffffff, 0x5314, &(0x7f0000000200)={0x8, 0x0, 0x40, 0x4, 0x0, 0xec}) ioctl$CDROM_SET_OPTIONS(0xffffffffffffffff, 0x5320, 0x0) 12:49:57 executing program 3: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000540)={0x5, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000380)={0x8, {{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) openat$incfs(r2, &(0x7f0000000180)='.pending_reads\x00', 0x0, 0x1) r3 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r3, 0x29, 0x50, 0x0, &(0x7f0000000080)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x1, 0x2, 0x1, 0x7, 0x0, 0x8}, 0x20) syz_io_uring_setup(0x1cb6, &(0x7f00000001c0), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) recvfrom(r1, &(0x7f0000000000)=""/136, 0x88, 0x100, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r4, 0x29, 0x50, 0x0, &(0x7f0000000080)) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) 12:49:57 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000540)={0x5, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000380)={0x8, {{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) openat$incfs(r2, &(0x7f0000000180)='.pending_reads\x00', 0x0, 0x1) r3 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r3, 0x29, 0x50, 0x0, &(0x7f0000000080)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x1, 0x2, 0x1, 0x7, 0x0, 0x8}, 0x20) syz_io_uring_setup(0x1cb6, &(0x7f00000001c0), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) recvfrom(r1, &(0x7f0000000000)=""/136, 0x88, 0x100, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r4, 0x29, 0x50, 0x0, &(0x7f0000000080)) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) 12:49:57 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000540)={0x5, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000380)={0x8, {{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) openat$incfs(r2, &(0x7f0000000180)='.pending_reads\x00', 0x0, 0x1) r3 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r3, 0x29, 0x50, 0x0, &(0x7f0000000080)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x1, 0x2, 0x1, 0x7, 0x0, 0x8}, 0x20) syz_io_uring_setup(0x1cb6, &(0x7f00000001c0), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) recvfrom(r1, &(0x7f0000000000)=""/136, 0x88, 0x100, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r4, 0x29, 0x50, 0x0, &(0x7f0000000080)) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) 12:49:57 executing program 1: r0 = fork() ioprio_get$pid(0x3, r0) 12:49:57 executing program 6: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) rename(0x0, &(0x7f0000000040)='./file1\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(0xffffffffffffffff, 0x0, 0x40, 0x1) openat(r0, &(0x7f0000000200)='./file1\x00', 0x80000, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x1cd802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2811, r2, 0x0) r3 = openat2(r2, &(0x7f0000000000)='./file1\x00', &(0x7f00000001c0)={0x101000, 0x101, 0x11}, 0x18) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r4, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x0) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="0702bb36edefdf8fef90cc99fd26b912bc9bfc3e2d485b598390aa39f3897b10d03bc2682aa953379ed8236c609bd71ab0ab291b82bf4a43072d6cba93bb6354b2fb3f96ff2702cc173f0f082641a049966edca98826b3d92f3e728f5b2a07fecaecf45876b68d67eea2e25b5e94f8de", 0x70}, {&(0x7f0000000380)="a1e1d63a5f76c9b7780f97886ba74e970d5ec2ac8ff37e5c0490e864b975087aac20d1e14ac6dd8cda0e030963c297c8c236061b1efbeef27cad5d9653f299560039f45fc5816310a32e24b23cba756eca76dc4a07250d3b7297b4513f31773c9adf5c2ab0076d5568bf457543e68353b7397807e759ba3508cf9bcafb2d41e6e166ad3ae0b18cbd18135d61680d9a5b86696d7fdd77d19651cec1d1a75a5316e41ff6", 0xa3}, {&(0x7f0000000440)="def80b8db0c796fd5537ce41b187d128adc82d16f0c39e9c6448e1705aa9b8eb8ec799d0ced0fc64eacbd103a9457872fcf94e00887453e950a13a292d6272ee13a066fc6a7f71b01ad53c18c6f8ccd7e850189c630d7c2cb2519c78ff", 0x5d}, {&(0x7f00000004c0)="a3808eb3934f3df40907a015fd1ffce225cc4147403d6ed67127ece4b81aba77ad8fe6ae3ded384743ea26ef9ad9d4ba5b14bd3b9afff0bc0d51a8c6514501336b83dc38d81a6b026a6344732d801fb416b7f3e859fd78ec8a6ad5b519be8aaa641d457848c514", 0x67}], 0x4, 0x8, 0x401) 12:49:57 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$CDROMRESUME(r0, 0x5302) ioctl$CDROMREADRAW(0xffffffffffffffff, 0x5314, &(0x7f0000000200)={0x8, 0x0, 0x40, 0x4, 0x0, 0xec}) ioctl$CDROM_SET_OPTIONS(0xffffffffffffffff, 0x5320, 0x0) 12:49:57 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000540)={0x5, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000380)={0x8, {{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) openat$incfs(r2, &(0x7f0000000180)='.pending_reads\x00', 0x0, 0x1) r3 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r3, 0x29, 0x50, 0x0, &(0x7f0000000080)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x1, 0x2, 0x1, 0x7, 0x0, 0x8}, 0x20) syz_io_uring_setup(0x1cb6, &(0x7f00000001c0), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) recvfrom(r1, &(0x7f0000000000)=""/136, 0x88, 0x100, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r4, 0x29, 0x50, 0x0, &(0x7f0000000080)) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) 12:49:57 executing program 4: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) rename(0x0, &(0x7f0000000040)='./file1\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(0xffffffffffffffff, 0x0, 0x40, 0x1) openat(r0, &(0x7f0000000200)='./file1\x00', 0x80000, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x1cd802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2811, r2, 0x0) r3 = openat2(r2, &(0x7f0000000000)='./file1\x00', &(0x7f00000001c0)={0x101000, 0x101, 0x11}, 0x18) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r4, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x0) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="0702bb36edefdf8fef90cc99fd26b912bc9bfc3e2d485b598390aa39f3897b10d03bc2682aa953379ed8236c609bd71ab0ab291b82bf4a43072d6cba93bb6354b2fb3f96ff2702cc173f0f082641a049966edca98826b3d92f3e728f5b2a07fecaecf45876b68d67eea2e25b5e94f8de", 0x70}, {&(0x7f0000000380)="a1e1d63a5f76c9b7780f97886ba74e970d5ec2ac8ff37e5c0490e864b975087aac20d1e14ac6dd8cda0e030963c297c8c236061b1efbeef27cad5d9653f299560039f45fc5816310a32e24b23cba756eca76dc4a07250d3b7297b4513f31773c9adf5c2ab0076d5568bf457543e68353b7397807e759ba3508cf9bcafb2d41e6e166ad3ae0b18cbd18135d61680d9a5b86696d7fdd77d19651cec1d1a75a5316e41ff6", 0xa3}, {&(0x7f0000000440)="def80b8db0c796fd5537ce41b187d128adc82d16f0c39e9c6448e1705aa9b8eb8ec799d0ced0fc64eacbd103a9457872fcf94e00887453e950a13a292d6272ee13a066fc6a7f71b01ad53c18c6f8ccd7e850189c630d7c2cb2519c78ff", 0x5d}, {&(0x7f00000004c0)="a3808eb3934f3df40907a015fd1ffce225cc4147403d6ed67127ece4b81aba77ad8fe6ae3ded384743ea26ef9ad9d4ba5b14bd3b9afff0bc0d51a8c6514501336b83dc38d81a6b026a6344732d801fb416b7f3e859fd78ec8a6ad5b519be8aaa641d457848c514", 0x67}], 0x4, 0x8, 0x401) 12:49:57 executing program 0: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) rename(0x0, &(0x7f0000000040)='./file1\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(0xffffffffffffffff, 0x0, 0x40, 0x1) openat(r0, &(0x7f0000000200)='./file1\x00', 0x80000, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x1cd802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2811, r2, 0x0) r3 = openat2(r2, &(0x7f0000000000)='./file1\x00', &(0x7f00000001c0)={0x101000, 0x101, 0x11}, 0x18) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r4, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x0) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="0702bb36edefdf8fef90cc99fd26b912bc9bfc3e2d485b598390aa39f3897b10d03bc2682aa953379ed8236c609bd71ab0ab291b82bf4a43072d6cba93bb6354b2fb3f96ff2702cc173f0f082641a049966edca98826b3d92f3e728f5b2a07fecaecf45876b68d67eea2e25b5e94f8de", 0x70}, {&(0x7f0000000380)="a1e1d63a5f76c9b7780f97886ba74e970d5ec2ac8ff37e5c0490e864b975087aac20d1e14ac6dd8cda0e030963c297c8c236061b1efbeef27cad5d9653f299560039f45fc5816310a32e24b23cba756eca76dc4a07250d3b7297b4513f31773c9adf5c2ab0076d5568bf457543e68353b7397807e759ba3508cf9bcafb2d41e6e166ad3ae0b18cbd18135d61680d9a5b86696d7fdd77d19651cec1d1a75a5316e41ff6", 0xa3}, {&(0x7f0000000440)="def80b8db0c796fd5537ce41b187d128adc82d16f0c39e9c6448e1705aa9b8eb8ec799d0ced0fc64eacbd103a9457872fcf94e00887453e950a13a292d6272ee13a066fc6a7f71b01ad53c18c6f8ccd7e850189c630d7c2cb2519c78ff", 0x5d}, {&(0x7f00000004c0)="a3808eb3934f3df40907a015fd1ffce225cc4147403d6ed67127ece4b81aba77ad8fe6ae3ded384743ea26ef9ad9d4ba5b14bd3b9afff0bc0d51a8c6514501336b83dc38d81a6b026a6344732d801fb416b7f3e859fd78ec8a6ad5b519be8aaa641d457848c514", 0x67}], 0x4, 0x8, 0x401) 12:49:57 executing program 1: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) rename(0x0, &(0x7f0000000040)='./file1\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(0xffffffffffffffff, 0x0, 0x40, 0x1) openat(r0, &(0x7f0000000200)='./file1\x00', 0x80000, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x1cd802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2811, r2, 0x0) r3 = openat2(r2, &(0x7f0000000000)='./file1\x00', &(0x7f00000001c0)={0x101000, 0x101, 0x11}, 0x18) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r4, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x0) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="0702bb36edefdf8fef90cc99fd26b912bc9bfc3e2d485b598390aa39f3897b10d03bc2682aa953379ed8236c609bd71ab0ab291b82bf4a43072d6cba93bb6354b2fb3f96ff2702cc173f0f082641a049966edca98826b3d92f3e728f5b2a07fecaecf45876b68d67eea2e25b5e94f8de", 0x70}, {&(0x7f0000000380)="a1e1d63a5f76c9b7780f97886ba74e970d5ec2ac8ff37e5c0490e864b975087aac20d1e14ac6dd8cda0e030963c297c8c236061b1efbeef27cad5d9653f299560039f45fc5816310a32e24b23cba756eca76dc4a07250d3b7297b4513f31773c9adf5c2ab0076d5568bf457543e68353b7397807e759ba3508cf9bcafb2d41e6e166ad3ae0b18cbd18135d61680d9a5b86696d7fdd77d19651cec1d1a75a5316e41ff6", 0xa3}, {&(0x7f0000000440)="def80b8db0c796fd5537ce41b187d128adc82d16f0c39e9c6448e1705aa9b8eb8ec799d0ced0fc64eacbd103a9457872fcf94e00887453e950a13a292d6272ee13a066fc6a7f71b01ad53c18c6f8ccd7e850189c630d7c2cb2519c78ff", 0x5d}, {&(0x7f00000004c0)="a3808eb3934f3df40907a015fd1ffce225cc4147403d6ed67127ece4b81aba77ad8fe6ae3ded384743ea26ef9ad9d4ba5b14bd3b9afff0bc0d51a8c6514501336b83dc38d81a6b026a6344732d801fb416b7f3e859fd78ec8a6ad5b519be8aaa641d457848c514", 0x67}], 0x4, 0x8, 0x401) 12:49:57 executing program 6: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) rename(0x0, &(0x7f0000000040)='./file1\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(0xffffffffffffffff, 0x0, 0x40, 0x1) openat(r0, &(0x7f0000000200)='./file1\x00', 0x80000, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x1cd802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2811, r2, 0x0) r3 = openat2(r2, &(0x7f0000000000)='./file1\x00', &(0x7f00000001c0)={0x101000, 0x101, 0x11}, 0x18) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r4, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x0) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="0702bb36edefdf8fef90cc99fd26b912bc9bfc3e2d485b598390aa39f3897b10d03bc2682aa953379ed8236c609bd71ab0ab291b82bf4a43072d6cba93bb6354b2fb3f96ff2702cc173f0f082641a049966edca98826b3d92f3e728f5b2a07fecaecf45876b68d67eea2e25b5e94f8de", 0x70}, {&(0x7f0000000380)="a1e1d63a5f76c9b7780f97886ba74e970d5ec2ac8ff37e5c0490e864b975087aac20d1e14ac6dd8cda0e030963c297c8c236061b1efbeef27cad5d9653f299560039f45fc5816310a32e24b23cba756eca76dc4a07250d3b7297b4513f31773c9adf5c2ab0076d5568bf457543e68353b7397807e759ba3508cf9bcafb2d41e6e166ad3ae0b18cbd18135d61680d9a5b86696d7fdd77d19651cec1d1a75a5316e41ff6", 0xa3}, {&(0x7f0000000440)="def80b8db0c796fd5537ce41b187d128adc82d16f0c39e9c6448e1705aa9b8eb8ec799d0ced0fc64eacbd103a9457872fcf94e00887453e950a13a292d6272ee13a066fc6a7f71b01ad53c18c6f8ccd7e850189c630d7c2cb2519c78ff", 0x5d}, {&(0x7f00000004c0)="a3808eb3934f3df40907a015fd1ffce225cc4147403d6ed67127ece4b81aba77ad8fe6ae3ded384743ea26ef9ad9d4ba5b14bd3b9afff0bc0d51a8c6514501336b83dc38d81a6b026a6344732d801fb416b7f3e859fd78ec8a6ad5b519be8aaa641d457848c514", 0x67}], 0x4, 0x8, 0x401) 12:49:57 executing program 4: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) rename(0x0, &(0x7f0000000040)='./file1\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(0xffffffffffffffff, 0x0, 0x40, 0x1) openat(r0, &(0x7f0000000200)='./file1\x00', 0x80000, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x1cd802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2811, r2, 0x0) r3 = openat2(r2, &(0x7f0000000000)='./file1\x00', &(0x7f00000001c0)={0x101000, 0x101, 0x11}, 0x18) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r4, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x0) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="0702bb36edefdf8fef90cc99fd26b912bc9bfc3e2d485b598390aa39f3897b10d03bc2682aa953379ed8236c609bd71ab0ab291b82bf4a43072d6cba93bb6354b2fb3f96ff2702cc173f0f082641a049966edca98826b3d92f3e728f5b2a07fecaecf45876b68d67eea2e25b5e94f8de", 0x70}, {&(0x7f0000000380)="a1e1d63a5f76c9b7780f97886ba74e970d5ec2ac8ff37e5c0490e864b975087aac20d1e14ac6dd8cda0e030963c297c8c236061b1efbeef27cad5d9653f299560039f45fc5816310a32e24b23cba756eca76dc4a07250d3b7297b4513f31773c9adf5c2ab0076d5568bf457543e68353b7397807e759ba3508cf9bcafb2d41e6e166ad3ae0b18cbd18135d61680d9a5b86696d7fdd77d19651cec1d1a75a5316e41ff6", 0xa3}, {&(0x7f0000000440)="def80b8db0c796fd5537ce41b187d128adc82d16f0c39e9c6448e1705aa9b8eb8ec799d0ced0fc64eacbd103a9457872fcf94e00887453e950a13a292d6272ee13a066fc6a7f71b01ad53c18c6f8ccd7e850189c630d7c2cb2519c78ff", 0x5d}, {&(0x7f00000004c0)="a3808eb3934f3df40907a015fd1ffce225cc4147403d6ed67127ece4b81aba77ad8fe6ae3ded384743ea26ef9ad9d4ba5b14bd3b9afff0bc0d51a8c6514501336b83dc38d81a6b026a6344732d801fb416b7f3e859fd78ec8a6ad5b519be8aaa641d457848c514", 0x67}], 0x4, 0x8, 0x401) 12:49:57 executing program 1: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) rename(0x0, &(0x7f0000000040)='./file1\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(0xffffffffffffffff, 0x0, 0x40, 0x1) openat(r0, &(0x7f0000000200)='./file1\x00', 0x80000, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x1cd802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2811, r2, 0x0) r3 = openat2(r2, &(0x7f0000000000)='./file1\x00', &(0x7f00000001c0)={0x101000, 0x101, 0x11}, 0x18) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r4, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x0) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="0702bb36edefdf8fef90cc99fd26b912bc9bfc3e2d485b598390aa39f3897b10d03bc2682aa953379ed8236c609bd71ab0ab291b82bf4a43072d6cba93bb6354b2fb3f96ff2702cc173f0f082641a049966edca98826b3d92f3e728f5b2a07fecaecf45876b68d67eea2e25b5e94f8de", 0x70}, {&(0x7f0000000380)="a1e1d63a5f76c9b7780f97886ba74e970d5ec2ac8ff37e5c0490e864b975087aac20d1e14ac6dd8cda0e030963c297c8c236061b1efbeef27cad5d9653f299560039f45fc5816310a32e24b23cba756eca76dc4a07250d3b7297b4513f31773c9adf5c2ab0076d5568bf457543e68353b7397807e759ba3508cf9bcafb2d41e6e166ad3ae0b18cbd18135d61680d9a5b86696d7fdd77d19651cec1d1a75a5316e41ff6", 0xa3}, {&(0x7f0000000440)="def80b8db0c796fd5537ce41b187d128adc82d16f0c39e9c6448e1705aa9b8eb8ec799d0ced0fc64eacbd103a9457872fcf94e00887453e950a13a292d6272ee13a066fc6a7f71b01ad53c18c6f8ccd7e850189c630d7c2cb2519c78ff", 0x5d}, {&(0x7f00000004c0)="a3808eb3934f3df40907a015fd1ffce225cc4147403d6ed67127ece4b81aba77ad8fe6ae3ded384743ea26ef9ad9d4ba5b14bd3b9afff0bc0d51a8c6514501336b83dc38d81a6b026a6344732d801fb416b7f3e859fd78ec8a6ad5b519be8aaa641d457848c514", 0x67}], 0x4, 0x8, 0x401) 12:49:57 executing program 6: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) rename(0x0, &(0x7f0000000040)='./file1\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(0xffffffffffffffff, 0x0, 0x40, 0x1) openat(r0, &(0x7f0000000200)='./file1\x00', 0x80000, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x1cd802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2811, r2, 0x0) r3 = openat2(r2, &(0x7f0000000000)='./file1\x00', &(0x7f00000001c0)={0x101000, 0x101, 0x11}, 0x18) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r4, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x0) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="0702bb36edefdf8fef90cc99fd26b912bc9bfc3e2d485b598390aa39f3897b10d03bc2682aa953379ed8236c609bd71ab0ab291b82bf4a43072d6cba93bb6354b2fb3f96ff2702cc173f0f082641a049966edca98826b3d92f3e728f5b2a07fecaecf45876b68d67eea2e25b5e94f8de", 0x70}, {&(0x7f0000000380)="a1e1d63a5f76c9b7780f97886ba74e970d5ec2ac8ff37e5c0490e864b975087aac20d1e14ac6dd8cda0e030963c297c8c236061b1efbeef27cad5d9653f299560039f45fc5816310a32e24b23cba756eca76dc4a07250d3b7297b4513f31773c9adf5c2ab0076d5568bf457543e68353b7397807e759ba3508cf9bcafb2d41e6e166ad3ae0b18cbd18135d61680d9a5b86696d7fdd77d19651cec1d1a75a5316e41ff6", 0xa3}, {&(0x7f0000000440)="def80b8db0c796fd5537ce41b187d128adc82d16f0c39e9c6448e1705aa9b8eb8ec799d0ced0fc64eacbd103a9457872fcf94e00887453e950a13a292d6272ee13a066fc6a7f71b01ad53c18c6f8ccd7e850189c630d7c2cb2519c78ff", 0x5d}, {&(0x7f00000004c0)="a3808eb3934f3df40907a015fd1ffce225cc4147403d6ed67127ece4b81aba77ad8fe6ae3ded384743ea26ef9ad9d4ba5b14bd3b9afff0bc0d51a8c6514501336b83dc38d81a6b026a6344732d801fb416b7f3e859fd78ec8a6ad5b519be8aaa641d457848c514", 0x67}], 0x4, 0x8, 0x401) 12:49:57 executing program 0: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) rename(0x0, &(0x7f0000000040)='./file1\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(0xffffffffffffffff, 0x0, 0x40, 0x1) openat(r0, &(0x7f0000000200)='./file1\x00', 0x80000, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x1cd802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2811, r2, 0x0) r3 = openat2(r2, &(0x7f0000000000)='./file1\x00', &(0x7f00000001c0)={0x101000, 0x101, 0x11}, 0x18) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r4, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x0) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="0702bb36edefdf8fef90cc99fd26b912bc9bfc3e2d485b598390aa39f3897b10d03bc2682aa953379ed8236c609bd71ab0ab291b82bf4a43072d6cba93bb6354b2fb3f96ff2702cc173f0f082641a049966edca98826b3d92f3e728f5b2a07fecaecf45876b68d67eea2e25b5e94f8de", 0x70}, {&(0x7f0000000380)="a1e1d63a5f76c9b7780f97886ba74e970d5ec2ac8ff37e5c0490e864b975087aac20d1e14ac6dd8cda0e030963c297c8c236061b1efbeef27cad5d9653f299560039f45fc5816310a32e24b23cba756eca76dc4a07250d3b7297b4513f31773c9adf5c2ab0076d5568bf457543e68353b7397807e759ba3508cf9bcafb2d41e6e166ad3ae0b18cbd18135d61680d9a5b86696d7fdd77d19651cec1d1a75a5316e41ff6", 0xa3}, {&(0x7f0000000440)="def80b8db0c796fd5537ce41b187d128adc82d16f0c39e9c6448e1705aa9b8eb8ec799d0ced0fc64eacbd103a9457872fcf94e00887453e950a13a292d6272ee13a066fc6a7f71b01ad53c18c6f8ccd7e850189c630d7c2cb2519c78ff", 0x5d}, {&(0x7f00000004c0)="a3808eb3934f3df40907a015fd1ffce225cc4147403d6ed67127ece4b81aba77ad8fe6ae3ded384743ea26ef9ad9d4ba5b14bd3b9afff0bc0d51a8c6514501336b83dc38d81a6b026a6344732d801fb416b7f3e859fd78ec8a6ad5b519be8aaa641d457848c514", 0x67}], 0x4, 0x8, 0x401) 12:49:57 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000540)={0x5, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000380)={0x8, {{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) openat$incfs(r2, &(0x7f0000000180)='.pending_reads\x00', 0x0, 0x1) r3 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r3, 0x29, 0x50, 0x0, &(0x7f0000000080)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x1, 0x2, 0x1, 0x7, 0x0, 0x8}, 0x20) syz_io_uring_setup(0x1cb6, &(0x7f00000001c0), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) recvfrom(r1, &(0x7f0000000000)=""/136, 0x88, 0x100, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r4, 0x29, 0x50, 0x0, &(0x7f0000000080)) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) 12:49:57 executing program 3: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000540)={0x5, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000380)={0x8, {{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) openat$incfs(r2, &(0x7f0000000180)='.pending_reads\x00', 0x0, 0x1) r3 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r3, 0x29, 0x50, 0x0, &(0x7f0000000080)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x1, 0x2, 0x1, 0x7, 0x0, 0x8}, 0x20) syz_io_uring_setup(0x1cb6, &(0x7f00000001c0), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) recvfrom(r1, &(0x7f0000000000)=""/136, 0x88, 0x100, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r4, 0x29, 0x50, 0x0, &(0x7f0000000080)) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &( VM DIAGNOSIS: 12:49:53 Registers: info registers vcpu 0 RAX=dffffc0000000060 RBX=00000000000003fd RCX=0000000000000000 RDX=00000000000003fd RSI=ffffffff822b2dec RDI=ffffffff87641ba0 RBP=ffffffff87641b60 RSP=ffff88800d217640 R8 =0000000000000004 R9 =0000000000000010 R10=0000000000000010 R11=0000000000000001 R12=0000000000002710 R13=0000000000000020 R14=fffffbfff0ec83c3 R15=dffffc0000000000 RIP=ffffffff822b2e41 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f42a242b700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f42a4fc9018 CR3=0000000018bf4000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f42a4f9c7c0 00007f42a4f9c7c8 YMM02=0000000000000000 0000000000000000 00007f42a4f9c7e0 00007f42a4f9c7c0 YMM03=0000000000000000 0000000000000000 00007f42a4f9c7c8 00007f42a4f9c7c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000004d25c466d0 RBX=0000000000000000 RCX=00000000000006e0 RDX=000000000000004d RSI=ffff88806cf27140 RDI=0000000000050913 RBP=ffff88806cf27140 RSP=ffff88806cf09ed8 R8 =0000000000000007 R9 =0000000000000000 R10=00000000000e69fd R11=0000000000000001 R12=0000000000050913 R13=0000000000000000 R14=0000000000000000 R15=ffff88806cf2a640 RIP=ffffffff810f2f41 RFL=00000016 [----AP-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fedf188b6f4 CR3=0000000005226000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007fedf189a470 00007fedf1899f20 YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 756e20796d6d7564 20736e6f6974706f YMM04=0000000000000000 0000000000000000 2f2f2f2f2f2f2f2f 2f2f2f2f2f2f2f2f YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 73253d656d616e6c 6165722073253d73 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000