Warning: Permanently added '[localhost]:32929' (ECDSA) to the list of known hosts. 2022/09/19 13:56:11 fuzzer started 2022/09/19 13:56:12 dialing manager at localhost:42121 syzkaller login: [ 44.308687] cgroup: Unknown subsys name 'net' [ 44.396842] cgroup: Unknown subsys name 'rlimit' 2022/09/19 13:56:25 syscalls: 2215 2022/09/19 13:56:25 code coverage: enabled 2022/09/19 13:56:25 comparison tracing: enabled 2022/09/19 13:56:25 extra coverage: enabled 2022/09/19 13:56:25 setuid sandbox: enabled 2022/09/19 13:56:25 namespace sandbox: enabled 2022/09/19 13:56:25 Android sandbox: enabled 2022/09/19 13:56:25 fault injection: enabled 2022/09/19 13:56:25 leak checking: enabled 2022/09/19 13:56:25 net packet injection: enabled 2022/09/19 13:56:25 net device setup: enabled 2022/09/19 13:56:25 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/19 13:56:25 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/19 13:56:25 USB emulation: enabled 2022/09/19 13:56:25 hci packet injection: enabled 2022/09/19 13:56:25 wifi device emulation: failed to parse kernel version (6.0.0-rc6-next-20220919) 2022/09/19 13:56:25 802.15.4 emulation: enabled 2022/09/19 13:56:25 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/19 13:56:25 fetching corpus: 50, signal 30919/34251 (executing program) 2022/09/19 13:56:26 fetching corpus: 100, signal 41771/46391 (executing program) 2022/09/19 13:56:26 fetching corpus: 150, signal 50400/56203 (executing program) 2022/09/19 13:56:26 fetching corpus: 200, signal 59633/66347 (executing program) 2022/09/19 13:56:26 fetching corpus: 250, signal 63695/71517 (executing program) 2022/09/19 13:56:26 fetching corpus: 300, signal 67624/76437 (executing program) 2022/09/19 13:56:26 fetching corpus: 350, signal 72950/82562 (executing program) 2022/09/19 13:56:26 fetching corpus: 400, signal 75185/85811 (executing program) 2022/09/19 13:56:27 fetching corpus: 450, signal 78032/89548 (executing program) 2022/09/19 13:56:27 fetching corpus: 500, signal 80989/93301 (executing program) 2022/09/19 13:56:27 fetching corpus: 550, signal 83473/96624 (executing program) 2022/09/19 13:56:27 fetching corpus: 600, signal 87547/101184 (executing program) 2022/09/19 13:56:27 fetching corpus: 650, signal 92095/106073 (executing program) 2022/09/19 13:56:27 fetching corpus: 700, signal 96079/110384 (executing program) 2022/09/19 13:56:27 fetching corpus: 750, signal 98107/113010 (executing program) 2022/09/19 13:56:27 fetching corpus: 800, signal 99783/115315 (executing program) 2022/09/19 13:56:28 fetching corpus: 850, signal 102215/118146 (executing program) 2022/09/19 13:56:28 fetching corpus: 900, signal 104837/121103 (executing program) 2022/09/19 13:56:28 fetching corpus: 950, signal 107341/123915 (executing program) 2022/09/19 13:56:28 fetching corpus: 1000, signal 109794/126615 (executing program) 2022/09/19 13:56:28 fetching corpus: 1050, signal 111336/128627 (executing program) 2022/09/19 13:56:28 fetching corpus: 1100, signal 113181/130754 (executing program) 2022/09/19 13:56:29 fetching corpus: 1150, signal 115701/133369 (executing program) 2022/09/19 13:56:29 fetching corpus: 1200, signal 116905/135030 (executing program) 2022/09/19 13:56:29 fetching corpus: 1250, signal 118793/137184 (executing program) 2022/09/19 13:56:29 fetching corpus: 1300, signal 120083/138873 (executing program) 2022/09/19 13:56:29 fetching corpus: 1350, signal 122213/141263 (executing program) 2022/09/19 13:56:29 fetching corpus: 1400, signal 124509/143539 (executing program) 2022/09/19 13:56:29 fetching corpus: 1449, signal 127689/146369 (executing program) 2022/09/19 13:56:29 fetching corpus: 1499, signal 129751/148443 (executing program) 2022/09/19 13:56:30 fetching corpus: 1546, signal 131776/150429 (executing program) 2022/09/19 13:56:30 fetching corpus: 1596, signal 133672/152229 (executing program) 2022/09/19 13:56:30 fetching corpus: 1646, signal 134995/153642 (executing program) 2022/09/19 13:56:30 fetching corpus: 1695, signal 137102/155446 (executing program) 2022/09/19 13:56:30 fetching corpus: 1744, signal 138196/156616 (executing program) 2022/09/19 13:56:30 fetching corpus: 1793, signal 138993/157618 (executing program) 2022/09/19 13:56:30 fetching corpus: 1842, signal 140288/158929 (executing program) 2022/09/19 13:56:30 fetching corpus: 1892, signal 141455/160116 (executing program) 2022/09/19 13:56:31 fetching corpus: 1940, signal 143115/161546 (executing program) 2022/09/19 13:56:31 fetching corpus: 1990, signal 143990/162508 (executing program) 2022/09/19 13:56:31 fetching corpus: 2040, signal 145859/163975 (executing program) 2022/09/19 13:56:31 fetching corpus: 2088, signal 146651/164790 (executing program) 2022/09/19 13:56:31 fetching corpus: 2138, signal 147436/165677 (executing program) 2022/09/19 13:56:31 fetching corpus: 2188, signal 148514/166668 (executing program) 2022/09/19 13:56:31 fetching corpus: 2238, signal 149314/167496 (executing program) 2022/09/19 13:56:31 fetching corpus: 2288, signal 151593/168964 (executing program) 2022/09/19 13:56:31 fetching corpus: 2336, signal 152473/169819 (executing program) 2022/09/19 13:56:32 fetching corpus: 2386, signal 154324/171331 (executing program) 2022/09/19 13:56:32 fetching corpus: 2436, signal 155691/172302 (executing program) 2022/09/19 13:56:32 fetching corpus: 2483, signal 156921/173175 (executing program) 2022/09/19 13:56:32 fetching corpus: 2532, signal 158836/174330 (executing program) 2022/09/19 13:56:32 fetching corpus: 2582, signal 160314/175311 (executing program) 2022/09/19 13:56:32 fetching corpus: 2632, signal 161132/175967 (executing program) 2022/09/19 13:56:32 fetching corpus: 2682, signal 161594/176436 (executing program) 2022/09/19 13:56:33 fetching corpus: 2732, signal 162325/177031 (executing program) 2022/09/19 13:56:33 fetching corpus: 2782, signal 163349/177691 (executing program) 2022/09/19 13:56:33 fetching corpus: 2832, signal 164395/178311 (executing program) 2022/09/19 13:56:33 fetching corpus: 2882, signal 166634/179353 (executing program) 2022/09/19 13:56:33 fetching corpus: 2932, signal 167170/179780 (executing program) 2022/09/19 13:56:33 fetching corpus: 2982, signal 168128/180323 (executing program) 2022/09/19 13:56:33 fetching corpus: 3031, signal 169057/180835 (executing program) 2022/09/19 13:56:33 fetching corpus: 3081, signal 170003/181336 (executing program) 2022/09/19 13:56:34 fetching corpus: 3131, signal 170527/181704 (executing program) 2022/09/19 13:56:34 fetching corpus: 3181, signal 171444/182197 (executing program) 2022/09/19 13:56:34 fetching corpus: 3231, signal 172147/182589 (executing program) 2022/09/19 13:56:34 fetching corpus: 3281, signal 173382/183072 (executing program) 2022/09/19 13:56:34 fetching corpus: 3331, signal 174435/183543 (executing program) 2022/09/19 13:56:34 fetching corpus: 3380, signal 175384/183925 (executing program) 2022/09/19 13:56:34 fetching corpus: 3430, signal 176269/184252 (executing program) 2022/09/19 13:56:34 fetching corpus: 3480, signal 176999/184530 (executing program) 2022/09/19 13:56:35 fetching corpus: 3530, signal 177905/184808 (executing program) 2022/09/19 13:56:35 fetching corpus: 3580, signal 178976/185091 (executing program) 2022/09/19 13:56:35 fetching corpus: 3630, signal 179874/185358 (executing program) 2022/09/19 13:56:35 fetching corpus: 3679, signal 180420/185532 (executing program) 2022/09/19 13:56:35 fetching corpus: 3729, signal 181156/185745 (executing program) 2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/185894 (executing program) 2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/185949 (executing program) 2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186015 (executing program) 2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186058 (executing program) 2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186111 (executing program) 2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186171 (executing program) 2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186236 (executing program) 2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186293 (executing program) 2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186342 (executing program) 2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186385 (executing program) 2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186442 (executing program) 2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186501 (executing program) 2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186555 (executing program) 2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186612 (executing program) 2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186666 (executing program) 2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186681 (executing program) 2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186681 (executing program) 2022/09/19 13:56:38 starting 8 fuzzer processes 13:56:38 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5) io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}]) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0) 13:56:38 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0), 0x4) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000180), 0x10) 13:56:38 executing program 2: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000005, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000000c0)={@loopback}, 0x14) 13:56:38 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000003400)) [ 70.408720] audit: type=1400 audit(1663595798.325:6): avc: denied { execmem } for pid=286 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 13:56:38 executing program 4: nanosleep(&(0x7f00000038c0)={0x0, 0x989680}, 0x0) 13:56:38 executing program 7: prctl$PR_SET_MM(0x29, 0x0, &(0x7f0000ff6000/0x1000)=nil) 13:56:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="c4000000130031060000000000000000000000000000000000000000000000007f00000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015"], 0xc4}}, 0x0) 13:56:38 executing program 6: syz_mount_image$iso9660(&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000001b40)='./file0\x00', &(0x7f0000001c40), 0x0, 0x0) [ 71.759510] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 71.761619] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 71.764445] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 71.768650] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 71.773052] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 71.774676] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 71.782321] Bluetooth: hci0: HCI_REQ-0x0c1a [ 71.817689] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 71.821615] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 71.823350] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 71.824838] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 71.826609] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 71.827822] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 71.830061] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 71.832051] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 71.834672] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 71.836327] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 71.842312] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 71.844254] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 71.846905] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 71.849248] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 71.850939] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 71.853187] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 71.853336] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 71.855545] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 71.855766] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 71.857376] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 71.864232] Bluetooth: hci4: HCI_REQ-0x0c1a [ 71.865935] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 71.873779] Bluetooth: hci3: HCI_REQ-0x0c1a [ 71.874699] Bluetooth: hci1: HCI_REQ-0x0c1a [ 71.879489] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 71.881447] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 71.891637] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 71.919769] Bluetooth: hci2: HCI_REQ-0x0c1a [ 71.933244] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 71.935158] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 71.937062] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 71.939845] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 71.941773] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 71.943740] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 71.950088] Bluetooth: hci5: HCI_REQ-0x0c1a [ 73.845423] Bluetooth: hci0: command 0x0409 tx timeout [ 73.909028] Bluetooth: hci6: Opcode 0x c03 failed: -110 [ 73.909996] Bluetooth: hci4: command 0x0409 tx timeout [ 73.910329] Bluetooth: hci7: Opcode 0x c03 failed: -110 [ 73.911195] Bluetooth: hci1: command 0x0409 tx timeout [ 73.911705] Bluetooth: hci3: command 0x0409 tx timeout [ 73.974008] Bluetooth: hci5: command 0x0409 tx timeout [ 73.974478] Bluetooth: hci2: command 0x0409 tx timeout [ 75.893147] Bluetooth: hci0: command 0x041b tx timeout [ 75.957190] Bluetooth: hci3: command 0x041b tx timeout [ 75.958174] Bluetooth: hci1: command 0x041b tx timeout [ 75.959465] Bluetooth: hci4: command 0x041b tx timeout [ 76.021077] Bluetooth: hci2: command 0x041b tx timeout [ 76.021933] Bluetooth: hci5: command 0x041b tx timeout [ 77.941063] Bluetooth: hci0: command 0x040f tx timeout [ 78.005004] Bluetooth: hci4: command 0x040f tx timeout [ 78.005492] Bluetooth: hci1: command 0x040f tx timeout [ 78.005933] Bluetooth: hci3: command 0x040f tx timeout [ 78.069008] Bluetooth: hci5: command 0x040f tx timeout [ 78.069497] Bluetooth: hci2: command 0x040f tx timeout [ 79.221085] Bluetooth: hci6: Opcode 0x c03 failed: -110 [ 79.285165] Bluetooth: hci7: Opcode 0x c03 failed: -110 [ 79.989050] Bluetooth: hci0: command 0x0419 tx timeout [ 80.053061] Bluetooth: hci3: command 0x0419 tx timeout [ 80.053857] Bluetooth: hci1: command 0x0419 tx timeout [ 80.055563] Bluetooth: hci4: command 0x0419 tx timeout [ 80.117011] Bluetooth: hci2: command 0x0419 tx timeout [ 80.117488] Bluetooth: hci5: command 0x0419 tx timeout [ 82.101683] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 82.103155] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 82.107355] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 82.118329] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 82.128468] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 82.132863] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 82.140153] Bluetooth: hci6: HCI_REQ-0x0c1a [ 84.149173] Bluetooth: hci6: command 0x0409 tx timeout [ 84.277038] Bluetooth: hci7: Opcode 0x c03 failed: -110 [ 86.197136] Bluetooth: hci6: command 0x041b tx timeout [ 87.160891] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 87.162524] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 87.163759] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 87.166550] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 87.167886] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 87.169035] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 87.172877] Bluetooth: hci7: HCI_REQ-0x0c1a [ 88.245117] Bluetooth: hci6: command 0x040f tx timeout [ 89.205122] Bluetooth: hci7: command 0x0409 tx timeout [ 90.293467] Bluetooth: hci6: command 0x0419 tx timeout [ 91.253045] Bluetooth: hci7: command 0x041b tx timeout [ 93.301119] Bluetooth: hci7: command 0x040f tx timeout [ 95.349045] Bluetooth: hci7: command 0x0419 tx timeout [ 126.729366] audit: type=1400 audit(1663595854.646:7): avc: denied { open } for pid=3545 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 126.731083] audit: type=1400 audit(1663595854.646:8): avc: denied { kernel } for pid=3545 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 126.742461] ------------[ cut here ]------------ [ 126.742482] [ 126.742485] ====================================================== [ 126.742489] WARNING: possible circular locking dependency detected [ 126.742493] 6.0.0-rc6-next-20220919 #1 Not tainted [ 126.742500] ------------------------------------------------------ [ 126.742503] syz-executor.0/3546 is trying to acquire lock: [ 126.742509] ffffffff853fa838 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 126.742549] [ 126.742549] but task is already holding lock: [ 126.742552] ffff88800ff76c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 126.742580] [ 126.742580] which lock already depends on the new lock. [ 126.742580] [ 126.742583] [ 126.742583] the existing dependency chain (in reverse order) is: [ 126.742586] [ 126.742586] -> #3 (&ctx->lock){....}-{2:2}: [ 126.742600] _raw_spin_lock+0x2a/0x40 [ 126.742617] __perf_event_task_sched_out+0x53b/0x18d0 [ 126.742629] __schedule+0xedd/0x2470 [ 126.742640] schedule+0xda/0x1b0 [ 126.742650] exit_to_user_mode_prepare+0x114/0x1a0 [ 126.742670] syscall_exit_to_user_mode+0x19/0x40 [ 126.742687] do_syscall_64+0x48/0x90 [ 126.742701] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.742718] [ 126.742718] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 126.742732] _raw_spin_lock_nested+0x30/0x40 [ 126.742747] raw_spin_rq_lock_nested+0x1e/0x30 [ 126.742760] task_fork_fair+0x63/0x4d0 [ 126.742777] sched_cgroup_fork+0x3d0/0x540 [ 126.742790] copy_process+0x4183/0x6e20 [ 126.742801] kernel_clone+0xe7/0x890 [ 126.742810] user_mode_thread+0xad/0xf0 [ 126.742820] rest_init+0x24/0x250 [ 126.742836] arch_call_rest_init+0xf/0x14 [ 126.742849] start_kernel+0x4c1/0x4e6 [ 126.742858] secondary_startup_64_no_verify+0xe0/0xeb [ 126.742873] [ 126.742873] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 126.742886] _raw_spin_lock_irqsave+0x39/0x60 [ 126.742901] try_to_wake_up+0xab/0x1920 [ 126.742914] up+0x75/0xb0 [ 126.742925] __up_console_sem+0x6e/0x80 [ 126.742944] console_unlock+0x46a/0x590 [ 126.742959] vt_ioctl+0x2822/0x2ca0 [ 126.742973] tty_ioctl+0x7c4/0x1700 [ 126.742984] __x64_sys_ioctl+0x19a/0x210 [ 126.743000] do_syscall_64+0x3b/0x90 [ 126.743012] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.743029] [ 126.743029] -> #0 ((console_sem).lock){....}-{2:2}: [ 126.743043] __lock_acquire+0x2a02/0x5e70 [ 126.743059] lock_acquire+0x1a2/0x530 [ 126.743074] _raw_spin_lock_irqsave+0x39/0x60 [ 126.743088] down_trylock+0xe/0x70 [ 126.743100] __down_trylock_console_sem+0x3b/0xd0 [ 126.743116] vprintk_emit+0x16b/0x560 [ 126.743132] vprintk+0x84/0xa0 [ 126.743147] _printk+0xba/0xf1 [ 126.743165] report_bug.cold+0x72/0xab [ 126.743177] handle_bug+0x3c/0x70 [ 126.743190] exc_invalid_op+0x14/0x50 [ 126.743203] asm_exc_invalid_op+0x16/0x20 [ 126.743219] group_sched_out.part.0+0x2c7/0x460 [ 126.743229] ctx_sched_out+0x8f1/0xc10 [ 126.743239] __perf_event_task_sched_out+0x6d0/0x18d0 [ 126.743251] __schedule+0xedd/0x2470 [ 126.743260] schedule+0xda/0x1b0 [ 126.743270] exit_to_user_mode_prepare+0x114/0x1a0 [ 126.743288] syscall_exit_to_user_mode+0x19/0x40 [ 126.743305] do_syscall_64+0x48/0x90 [ 126.743317] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.743334] [ 126.743334] other info that might help us debug this: [ 126.743334] [ 126.743337] Chain exists of: [ 126.743337] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 126.743337] [ 126.743352] Possible unsafe locking scenario: [ 126.743352] [ 126.743354] CPU0 CPU1 [ 126.743357] ---- ---- [ 126.743359] lock(&ctx->lock); [ 126.743365] lock(&rq->__lock); [ 126.743371] lock(&ctx->lock); [ 126.743377] lock((console_sem).lock); [ 126.743383] [ 126.743383] *** DEADLOCK *** [ 126.743383] [ 126.743385] 2 locks held by syz-executor.0/3546: [ 126.743392] #0: ffff88806ce37d18 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 126.743418] #1: ffff88800ff76c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 126.743445] [ 126.743445] stack backtrace: [ 126.743448] CPU: 0 PID: 3546 Comm: syz-executor.0 Not tainted 6.0.0-rc6-next-20220919 #1 [ 126.743460] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 126.743468] Call Trace: [ 126.743472] [ 126.743476] dump_stack_lvl+0x8b/0xb3 [ 126.743491] check_noncircular+0x263/0x2e0 [ 126.743507] ? format_decode+0x26c/0xb50 [ 126.743522] ? print_circular_bug+0x450/0x450 [ 126.743539] ? enable_ptr_key_workfn+0x20/0x20 [ 126.743554] ? format_decode+0x26c/0xb50 [ 126.743569] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 126.743587] __lock_acquire+0x2a02/0x5e70 [ 126.743608] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 126.743630] lock_acquire+0x1a2/0x530 [ 126.743646] ? down_trylock+0xe/0x70 [ 126.743661] ? lock_release+0x750/0x750 [ 126.743681] ? vprintk+0x84/0xa0 [ 126.743698] _raw_spin_lock_irqsave+0x39/0x60 [ 126.743713] ? down_trylock+0xe/0x70 [ 126.743727] down_trylock+0xe/0x70 [ 126.743740] ? vprintk+0x84/0xa0 [ 126.743756] __down_trylock_console_sem+0x3b/0xd0 [ 126.743773] vprintk_emit+0x16b/0x560 [ 126.743792] vprintk+0x84/0xa0 [ 126.743809] _printk+0xba/0xf1 [ 126.743826] ? record_print_text.cold+0x16/0x16 [ 126.743847] ? report_bug.cold+0x66/0xab [ 126.743862] ? group_sched_out.part.0+0x2c7/0x460 [ 126.743873] report_bug.cold+0x72/0xab [ 126.743888] handle_bug+0x3c/0x70 [ 126.743902] exc_invalid_op+0x14/0x50 [ 126.743916] asm_exc_invalid_op+0x16/0x20 [ 126.743933] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 126.743946] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d 5b 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 126.743957] RSP: 0018:ffff88801f71fc48 EFLAGS: 00010006 [ 126.743966] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 126.743974] RDX: ffff88803d905040 RSI: ffffffff81566077 RDI: 0000000000000005 [ 126.743997] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 126.744005] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff88800ff76c00 [ 126.744013] R13: ffff88806ce3d140 R14: ffffffff8547c620 R15: 0000000000000002 [ 126.744024] ? group_sched_out.part.0+0x2c7/0x460 [ 126.744037] ? group_sched_out.part.0+0x2c7/0x460 [ 126.744050] ctx_sched_out+0x8f1/0xc10 [ 126.744062] __perf_event_task_sched_out+0x6d0/0x18d0 [ 126.744077] ? lock_is_held_type+0xd7/0x130 [ 126.744095] ? __perf_cgroup_move+0x160/0x160 [ 126.744107] ? set_next_entity+0x304/0x550 [ 126.744124] ? update_curr+0x267/0x740 [ 126.744142] ? lock_is_held_type+0xd7/0x130 [ 126.744160] __schedule+0xedd/0x2470 [ 126.744174] ? io_schedule_timeout+0x150/0x150 [ 126.744187] ? rcu_read_lock_sched_held+0x3e/0x80 [ 126.744207] schedule+0xda/0x1b0 [ 126.744219] exit_to_user_mode_prepare+0x114/0x1a0 [ 126.744238] syscall_exit_to_user_mode+0x19/0x40 [ 126.744256] do_syscall_64+0x48/0x90 [ 126.744270] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.744288] RIP: 0033:0x7fc497ac5b19 [ 126.744296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 126.744307] RSP: 002b:00007fc49503b218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 126.744318] RAX: 0000000000000001 RBX: 00007fc497bd8f68 RCX: 00007fc497ac5b19 [ 126.744326] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fc497bd8f6c [ 126.744333] RBP: 00007fc497bd8f60 R08: 000000000000000e R09: 0000000000000000 [ 126.744341] R10: 0000000000000003 R11: 0000000000000246 R12: 00007fc497bd8f6c [ 126.744348] R13: 00007ffd29e773ff R14: 00007fc49503b300 R15: 0000000000022000 [ 126.744361] [ 126.799237] WARNING: CPU: 0 PID: 3546 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 126.799905] Modules linked in: [ 126.800152] CPU: 0 PID: 3546 Comm: syz-executor.0 Not tainted 6.0.0-rc6-next-20220919 #1 [ 126.800727] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 126.801526] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 126.801918] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d 5b 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 126.803195] RSP: 0018:ffff88801f71fc48 EFLAGS: 00010006 [ 126.803571] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 126.804088] RDX: ffff88803d905040 RSI: ffffffff81566077 RDI: 0000000000000005 [ 126.804587] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 126.805099] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff88800ff76c00 [ 126.805601] R13: ffff88806ce3d140 R14: ffffffff8547c620 R15: 0000000000000002 [ 126.806110] FS: 00007fc49503b700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 126.806703] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 126.807146] CR2: 00007f2f2d602670 CR3: 000000000ec22000 CR4: 0000000000350ef0 [ 126.807690] Call Trace: [ 126.807889] [ 126.808080] ctx_sched_out+0x8f1/0xc10 [ 126.808381] __perf_event_task_sched_out+0x6d0/0x18d0 [ 126.808773] ? lock_is_held_type+0xd7/0x130 [ 126.809107] ? __perf_cgroup_move+0x160/0x160 [ 126.809448] ? set_next_entity+0x304/0x550 [ 126.809777] ? update_curr+0x267/0x740 [ 126.810089] ? lock_is_held_type+0xd7/0x130 [ 126.810425] __schedule+0xedd/0x2470 [ 126.810706] ? io_schedule_timeout+0x150/0x150 [ 126.811061] ? rcu_read_lock_sched_held+0x3e/0x80 [ 126.811437] schedule+0xda/0x1b0 [ 126.811697] exit_to_user_mode_prepare+0x114/0x1a0 [ 126.812085] syscall_exit_to_user_mode+0x19/0x40 [ 126.812455] do_syscall_64+0x48/0x90 [ 126.812745] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.813140] RIP: 0033:0x7fc497ac5b19 [ 126.813432] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 126.814769] RSP: 002b:00007fc49503b218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 126.815349] RAX: 0000000000000001 RBX: 00007fc497bd8f68 RCX: 00007fc497ac5b19 [ 126.815882] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fc497bd8f6c [ 126.816439] RBP: 00007fc497bd8f60 R08: 000000000000000e R09: 0000000000000000 [ 126.816984] R10: 0000000000000003 R11: 0000000000000246 R12: 00007fc497bd8f6c [ 126.817519] R13: 00007ffd29e773ff R14: 00007fc49503b300 R15: 0000000000022000 [ 126.818046] [ 126.818232] irq event stamp: 834 [ 126.818483] hardirqs last enabled at (833): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 126.819189] hardirqs last disabled at (834): [] __schedule+0x1225/0x2470 [ 126.819799] softirqs last enabled at (650): [] __irq_exit_rcu+0x11b/0x180 [ 126.820451] softirqs last disabled at (479): [] __irq_exit_rcu+0x11b/0x180 [ 126.821085] ---[ end trace 0000000000000000 ]--- [ 127.180574] ieee80211 phy2: Selected rate control algorithm 'minstrel_ht' 13:57:35 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0), 0x4) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000180), 0x10) 13:57:35 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0), 0x4) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000180), 0x10) [ 127.365317] ieee80211 phy3: Selected rate control algorithm 'minstrel_ht' 13:57:35 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0), 0x4) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000180), 0x10) [ 127.435489] syz-executor.0 (3546) used greatest stack depth: 24216 bytes left [ 132.502800] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 133.863601] process 'syz-executor.6' launched '/dev/fd/-1/./file0' with NULL argv: empty string added 13:57:41 executing program 6: ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000001580), 0x8000, 0x0) 13:57:41 executing program 7: prctl$PR_SET_MM(0x29, 0x0, &(0x7f0000ff6000/0x1000)=nil) 13:57:41 executing program 2: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000005, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000000c0)={@loopback}, 0x14) 13:57:41 executing program 4: nanosleep(&(0x7f00000038c0)={0x0, 0x989680}, 0x0) 13:57:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="c4000000130031060000000000000000000000000000000000000000000000007f00000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015"], 0xc4}}, 0x0) 13:57:41 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0), 0x4) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000180), 0x10) 13:57:41 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000003400)) 13:57:41 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5) io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}]) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0) [ 133.924244] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 134.008107] ieee80211 phy4: Selected rate control algorithm 'minstrel_ht' [ 134.097456] syz-executor.0 (3980) used greatest stack depth: 24088 bytes left 13:57:42 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0), 0x4) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000180), 0x10) 13:57:42 executing program 2: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000005, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000000c0)={@loopback}, 0x14) 13:57:42 executing program 4: nanosleep(&(0x7f00000038c0)={0x0, 0x989680}, 0x0) 13:57:42 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000003400)) 13:57:42 executing program 7: prctl$PR_SET_MM(0x29, 0x0, &(0x7f0000ff6000/0x1000)=nil) 13:57:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="c4000000130031060000000000000000000000000000000000000000000000007f00000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015"], 0xc4}}, 0x0) 13:57:42 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5) io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}]) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0) 13:57:42 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5) io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}]) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0) [ 134.147679] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:57:42 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000003400)) [ 134.206420] ieee80211 phy5: Selected rate control algorithm 'minstrel_ht' 13:57:42 executing program 7: prctl$PR_SET_MM(0x29, 0x0, &(0x7f0000ff6000/0x1000)=nil) 13:57:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="c4000000130031060000000000000000000000000000000000000000000000007f00000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015"], 0xc4}}, 0x0) 13:57:42 executing program 4: nanosleep(&(0x7f00000038c0)={0x0, 0x989680}, 0x0) 13:57:42 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0), 0x4) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000180), 0x10) 13:57:42 executing program 2: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000005, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000000c0)={@loopback}, 0x14) [ 134.294841] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:57:42 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5) io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}]) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0) 13:57:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5) io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}]) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0) [ 134.347921] ieee80211 phy6: Selected rate control algorithm 'minstrel_ht' 13:57:42 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5) io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}]) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0) [ 134.442185] ieee80211 phy7: Selected rate control algorithm 'minstrel_ht' [ 134.473962] hrtimer: interrupt took 18435 ns [ 135.102629] ieee80211 phy8: Selected rate control algorithm 'minstrel_ht' [ 135.200494] ieee80211 phy9: Selected rate control algorithm 'minstrel_ht' 13:57:43 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5) io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}]) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0) 13:57:43 executing program 1: perf_event_open(&(0x7f0000000ec0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:57:43 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 13:57:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5) io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}]) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0) 13:57:43 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5) io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}]) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0) 13:57:43 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5) io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}]) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0) 13:57:43 executing program 4: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) get_robust_list(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xb, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r2 = getpid() pidfd_open(r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4) sendfile(r4, r3, 0x0, 0x100000) execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc) r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0xffff8000) 13:57:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x18, 0x0, 0x0) 13:57:43 executing program 1: perf_event_open(&(0x7f0000000ec0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:57:43 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 13:57:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x18, 0x0, 0x0) [ 135.397836] loop4: detected capacity change from 0 to 256 [ 135.402582] ieee80211 phy10: Selected rate control algorithm 'minstrel_ht' 13:57:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x18, 0x0, 0x0) [ 135.468899] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 13:57:43 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 13:57:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x18, 0x0, 0x0) 13:57:43 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) [ 135.588519] ieee80211 phy11: Selected rate control algorithm 'minstrel_ht' 13:57:43 executing program 1: perf_event_open(&(0x7f0000000ec0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 135.761276] ieee80211 phy12: Selected rate control algorithm 'minstrel_ht' [ 135.960072] ieee80211 phy13: Selected rate control algorithm 'minstrel_ht' [ 136.094198] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 13:57:44 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 13:57:44 executing program 1: perf_event_open(&(0x7f0000000ec0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:57:44 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5) io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}]) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0) 13:57:44 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 13:57:44 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 13:57:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5) io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}]) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0) 13:57:44 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 13:57:44 executing program 4: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) get_robust_list(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xb, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r2 = getpid() pidfd_open(r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4) sendfile(r4, r3, 0x0, 0x100000) execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc) r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0xffff8000) [ 136.174518] ieee80211 phy14: Selected rate control algorithm 'minstrel_ht' [ 136.175570] loop4: detected capacity change from 0 to 256 13:57:44 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 13:57:44 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 13:57:44 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) [ 136.237039] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 136.243550] loop1: detected capacity change from 0 to 256 [ 136.262537] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 13:57:44 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) get_robust_list(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xb, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r2 = getpid() pidfd_open(r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4) sendfile(r4, r3, 0x0, 0x100000) execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc) r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0xffff8000) 13:57:44 executing program 5: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) get_robust_list(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xb, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r2 = getpid() pidfd_open(r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4) sendfile(r4, r3, 0x0, 0x100000) execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc) r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0xffff8000) 13:57:44 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) [ 136.298804] loop5: detected capacity change from 0 to 256 [ 136.303837] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 136.335878] ieee80211 phy15: Selected rate control algorithm 'minstrel_ht' 13:57:44 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 13:57:44 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) get_robust_list(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xb, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r2 = getpid() pidfd_open(r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4) sendfile(r4, r3, 0x0, 0x100000) execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc) r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0xffff8000) [ 136.490006] loop7: detected capacity change from 0 to 256 [ 136.495501] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 13:57:44 executing program 6: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) get_robust_list(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xb, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r2 = getpid() pidfd_open(r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4) sendfile(r4, r3, 0x0, 0x100000) execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc) r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0xffff8000) [ 136.505515] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 136.515122] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 136.527013] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 136.531246] loop6: detected capacity change from 0 to 256 [ 136.543916] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 136.663841] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 13:57:44 executing program 5: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) get_robust_list(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xb, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r2 = getpid() pidfd_open(r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4) sendfile(r4, r3, 0x0, 0x100000) execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc) r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0xffff8000) [ 136.673331] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 13:57:44 executing program 6: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) get_robust_list(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xb, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r2 = getpid() pidfd_open(r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4) sendfile(r4, r3, 0x0, 0x100000) execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc) r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0xffff8000) 13:57:44 executing program 2: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) get_robust_list(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xb, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r2 = getpid() pidfd_open(r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4) sendfile(r4, r3, 0x0, 0x100000) execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc) r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0xffff8000) 13:57:44 executing program 3: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) get_robust_list(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xb, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r2 = getpid() pidfd_open(r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4) sendfile(r4, r3, 0x0, 0x100000) execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc) r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0xffff8000) 13:57:44 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) get_robust_list(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xb, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r2 = getpid() pidfd_open(r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4) sendfile(r4, r3, 0x0, 0x100000) execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc) r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0xffff8000) 13:57:44 executing program 4: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) get_robust_list(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xb, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r2 = getpid() pidfd_open(r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4) sendfile(r4, r3, 0x0, 0x100000) execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc) r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0xffff8000) 13:57:44 executing program 0: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) get_robust_list(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xb, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r2 = getpid() pidfd_open(r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4) sendfile(r4, r3, 0x0, 0x100000) execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc) r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0xffff8000) 13:57:44 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) get_robust_list(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xb, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r2 = getpid() pidfd_open(r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4) sendfile(r4, r3, 0x0, 0x100000) execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc) r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0xffff8000) [ 136.713818] loop5: detected capacity change from 0 to 256 [ 136.714232] loop4: detected capacity change from 0 to 256 [ 136.717402] loop6: detected capacity change from 0 to 256 [ 136.717705] loop1: detected capacity change from 0 to 256 [ 136.727078] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 136.728291] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 136.747751] loop2: detected capacity change from 0 to 256 VM DIAGNOSIS: 13:57:34 Registers: info registers vcpu 0 RAX=0000000000000031 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b2e71 RDI=ffffffff87641ba0 RBP=ffffffff87641b60 RSP=ffff88801f71f698 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000031 R11=0000000000000001 R12=0000000000000031 R13=ffffffff87641b60 R14=0000000000000010 R15=ffffffff822b2e60 RIP=ffffffff822b2ec9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fc49503b700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f2f2d602670 CR3=000000000ec22000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007fc497bac7c0 00007fc497bac7c8 YMM02=0000000000000000 0000000000000000 00007fc497bac7e0 00007fc497bac7c0 YMM03=0000000000000000 0000000000000000 00007fc497bac7c8 00007fc497bac7c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=00007f965edf3fff RCX=ffffffff840d3e9c RDX=ffff88800ef6d040 RSI=0000000000000000 RDI=0000000000000006 RBP=ffff88800e9c7ba0 RSP=ffff88800e9c79b0 R8 =0000000000000006 R9 =00007f965edf3fff R10=00007f965edf5fff R11=0000000000000001 R12=0000000000000001 R13=00007f965edf5fff R14=ffff88803e557e00 R15=ffff88803e557e0c RIP=ffffffff8146132c RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f965f2ee6f4 CR3=000000000d3a0000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f965f2fd470 00007f965f2fcf20 YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 756e20796d6d7564 20736e6f6974706f YMM04=0000000000000000 0000000000000000 2f2f2f2f2f2f2f2f 2f2f2f2f2f2f2f2f YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 73253d656d616e6c 6165722073253d73 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000