Warning: Permanently added '[localhost]:32929' (ECDSA) to the list of known hosts.
2022/09/19 13:56:11 fuzzer started
2022/09/19 13:56:12 dialing manager at localhost:42121
syzkaller login: [ 44.308687] cgroup: Unknown subsys name 'net'
[ 44.396842] cgroup: Unknown subsys name 'rlimit'
2022/09/19 13:56:25 syscalls: 2215
2022/09/19 13:56:25 code coverage: enabled
2022/09/19 13:56:25 comparison tracing: enabled
2022/09/19 13:56:25 extra coverage: enabled
2022/09/19 13:56:25 setuid sandbox: enabled
2022/09/19 13:56:25 namespace sandbox: enabled
2022/09/19 13:56:25 Android sandbox: enabled
2022/09/19 13:56:25 fault injection: enabled
2022/09/19 13:56:25 leak checking: enabled
2022/09/19 13:56:25 net packet injection: enabled
2022/09/19 13:56:25 net device setup: enabled
2022/09/19 13:56:25 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist
2022/09/19 13:56:25 devlink PCI setup: PCI device 0000:00:10.0 is not available
2022/09/19 13:56:25 USB emulation: enabled
2022/09/19 13:56:25 hci packet injection: enabled
2022/09/19 13:56:25 wifi device emulation: failed to parse kernel version (6.0.0-rc6-next-20220919 )
2022/09/19 13:56:25 802.15.4 emulation: enabled
2022/09/19 13:56:25 fetching corpus: 0, signal 0/2000 (executing program)
2022/09/19 13:56:25 fetching corpus: 50, signal 30919/34251 (executing program)
2022/09/19 13:56:26 fetching corpus: 100, signal 41771/46391 (executing program)
2022/09/19 13:56:26 fetching corpus: 150, signal 50400/56203 (executing program)
2022/09/19 13:56:26 fetching corpus: 200, signal 59633/66347 (executing program)
2022/09/19 13:56:26 fetching corpus: 250, signal 63695/71517 (executing program)
2022/09/19 13:56:26 fetching corpus: 300, signal 67624/76437 (executing program)
2022/09/19 13:56:26 fetching corpus: 350, signal 72950/82562 (executing program)
2022/09/19 13:56:26 fetching corpus: 400, signal 75185/85811 (executing program)
2022/09/19 13:56:27 fetching corpus: 450, signal 78032/89548 (executing program)
2022/09/19 13:56:27 fetching corpus: 500, signal 80989/93301 (executing program)
2022/09/19 13:56:27 fetching corpus: 550, signal 83473/96624 (executing program)
2022/09/19 13:56:27 fetching corpus: 600, signal 87547/101184 (executing program)
2022/09/19 13:56:27 fetching corpus: 650, signal 92095/106073 (executing program)
2022/09/19 13:56:27 fetching corpus: 700, signal 96079/110384 (executing program)
2022/09/19 13:56:27 fetching corpus: 750, signal 98107/113010 (executing program)
2022/09/19 13:56:27 fetching corpus: 800, signal 99783/115315 (executing program)
2022/09/19 13:56:28 fetching corpus: 850, signal 102215/118146 (executing program)
2022/09/19 13:56:28 fetching corpus: 900, signal 104837/121103 (executing program)
2022/09/19 13:56:28 fetching corpus: 950, signal 107341/123915 (executing program)
2022/09/19 13:56:28 fetching corpus: 1000, signal 109794/126615 (executing program)
2022/09/19 13:56:28 fetching corpus: 1050, signal 111336/128627 (executing program)
2022/09/19 13:56:28 fetching corpus: 1100, signal 113181/130754 (executing program)
2022/09/19 13:56:29 fetching corpus: 1150, signal 115701/133369 (executing program)
2022/09/19 13:56:29 fetching corpus: 1200, signal 116905/135030 (executing program)
2022/09/19 13:56:29 fetching corpus: 1250, signal 118793/137184 (executing program)
2022/09/19 13:56:29 fetching corpus: 1300, signal 120083/138873 (executing program)
2022/09/19 13:56:29 fetching corpus: 1350, signal 122213/141263 (executing program)
2022/09/19 13:56:29 fetching corpus: 1400, signal 124509/143539 (executing program)
2022/09/19 13:56:29 fetching corpus: 1449, signal 127689/146369 (executing program)
2022/09/19 13:56:29 fetching corpus: 1499, signal 129751/148443 (executing program)
2022/09/19 13:56:30 fetching corpus: 1546, signal 131776/150429 (executing program)
2022/09/19 13:56:30 fetching corpus: 1596, signal 133672/152229 (executing program)
2022/09/19 13:56:30 fetching corpus: 1646, signal 134995/153642 (executing program)
2022/09/19 13:56:30 fetching corpus: 1695, signal 137102/155446 (executing program)
2022/09/19 13:56:30 fetching corpus: 1744, signal 138196/156616 (executing program)
2022/09/19 13:56:30 fetching corpus: 1793, signal 138993/157618 (executing program)
2022/09/19 13:56:30 fetching corpus: 1842, signal 140288/158929 (executing program)
2022/09/19 13:56:30 fetching corpus: 1892, signal 141455/160116 (executing program)
2022/09/19 13:56:31 fetching corpus: 1940, signal 143115/161546 (executing program)
2022/09/19 13:56:31 fetching corpus: 1990, signal 143990/162508 (executing program)
2022/09/19 13:56:31 fetching corpus: 2040, signal 145859/163975 (executing program)
2022/09/19 13:56:31 fetching corpus: 2088, signal 146651/164790 (executing program)
2022/09/19 13:56:31 fetching corpus: 2138, signal 147436/165677 (executing program)
2022/09/19 13:56:31 fetching corpus: 2188, signal 148514/166668 (executing program)
2022/09/19 13:56:31 fetching corpus: 2238, signal 149314/167496 (executing program)
2022/09/19 13:56:31 fetching corpus: 2288, signal 151593/168964 (executing program)
2022/09/19 13:56:31 fetching corpus: 2336, signal 152473/169819 (executing program)
2022/09/19 13:56:32 fetching corpus: 2386, signal 154324/171331 (executing program)
2022/09/19 13:56:32 fetching corpus: 2436, signal 155691/172302 (executing program)
2022/09/19 13:56:32 fetching corpus: 2483, signal 156921/173175 (executing program)
2022/09/19 13:56:32 fetching corpus: 2532, signal 158836/174330 (executing program)
2022/09/19 13:56:32 fetching corpus: 2582, signal 160314/175311 (executing program)
2022/09/19 13:56:32 fetching corpus: 2632, signal 161132/175967 (executing program)
2022/09/19 13:56:32 fetching corpus: 2682, signal 161594/176436 (executing program)
2022/09/19 13:56:33 fetching corpus: 2732, signal 162325/177031 (executing program)
2022/09/19 13:56:33 fetching corpus: 2782, signal 163349/177691 (executing program)
2022/09/19 13:56:33 fetching corpus: 2832, signal 164395/178311 (executing program)
2022/09/19 13:56:33 fetching corpus: 2882, signal 166634/179353 (executing program)
2022/09/19 13:56:33 fetching corpus: 2932, signal 167170/179780 (executing program)
2022/09/19 13:56:33 fetching corpus: 2982, signal 168128/180323 (executing program)
2022/09/19 13:56:33 fetching corpus: 3031, signal 169057/180835 (executing program)
2022/09/19 13:56:33 fetching corpus: 3081, signal 170003/181336 (executing program)
2022/09/19 13:56:34 fetching corpus: 3131, signal 170527/181704 (executing program)
2022/09/19 13:56:34 fetching corpus: 3181, signal 171444/182197 (executing program)
2022/09/19 13:56:34 fetching corpus: 3231, signal 172147/182589 (executing program)
2022/09/19 13:56:34 fetching corpus: 3281, signal 173382/183072 (executing program)
2022/09/19 13:56:34 fetching corpus: 3331, signal 174435/183543 (executing program)
2022/09/19 13:56:34 fetching corpus: 3380, signal 175384/183925 (executing program)
2022/09/19 13:56:34 fetching corpus: 3430, signal 176269/184252 (executing program)
2022/09/19 13:56:34 fetching corpus: 3480, signal 176999/184530 (executing program)
2022/09/19 13:56:35 fetching corpus: 3530, signal 177905/184808 (executing program)
2022/09/19 13:56:35 fetching corpus: 3580, signal 178976/185091 (executing program)
2022/09/19 13:56:35 fetching corpus: 3630, signal 179874/185358 (executing program)
2022/09/19 13:56:35 fetching corpus: 3679, signal 180420/185532 (executing program)
2022/09/19 13:56:35 fetching corpus: 3729, signal 181156/185745 (executing program)
2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/185894 (executing program)
2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/185949 (executing program)
2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186015 (executing program)
2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186058 (executing program)
2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186111 (executing program)
2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186171 (executing program)
2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186236 (executing program)
2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186293 (executing program)
2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186342 (executing program)
2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186385 (executing program)
2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186442 (executing program)
2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186501 (executing program)
2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186555 (executing program)
2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186612 (executing program)
2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186666 (executing program)
2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186681 (executing program)
2022/09/19 13:56:35 fetching corpus: 3757, signal 181439/186681 (executing program)
2022/09/19 13:56:38 starting 8 fuzzer processes
13:56:38 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r0, &(0x7f0000000100), 0x12)
write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5)
io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}])
r1 = socket$netlink(0x10, 0x3, 0x10)
sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0)
13:56:38 executing program 1:
r0 = socket$packet(0x11, 0x2, 0x300)
setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0), 0x4)
setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000180), 0x10)
13:56:38 executing program 2:
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000005, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x14)
setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000000c0)={@loopback}, 0x14)
13:56:38 executing program 3:
r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0)
ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000003400))
[ 70.408720] audit: type=1400 audit(1663595798.325:6): avc: denied { execmem } for pid=286 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1
13:56:38 executing program 4:
nanosleep(&(0x7f00000038c0)={0x0, 0x989680}, 0x0)
13:56:38 executing program 7:
prctl$PR_SET_MM(0x29, 0x0, &(0x7f0000ff6000/0x1000)=nil)
13:56:38 executing program 5:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="c4000000130031060000000000000000000000000000000000000000000000007f00000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015"], 0xc4}}, 0x0)
13:56:38 executing program 6:
syz_mount_image$iso9660(&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
execveat(0xffffffffffffffff, &(0x7f0000001b40)='./file0\x00', &(0x7f0000001c40), 0x0, 0x0)
[ 71.759510] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[ 71.761619] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 71.764445] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 71.768650] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 71.773052] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3
[ 71.774676] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[ 71.782321] Bluetooth: hci0: HCI_REQ-0x0c1a
[ 71.817689] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1
[ 71.821615] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1
[ 71.823350] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1
[ 71.824838] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1
[ 71.826609] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9
[ 71.827822] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9
[ 71.830061] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9
[ 71.832051] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9
[ 71.834672] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9
[ 71.836327] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9
[ 71.842312] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4
[ 71.844254] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4
[ 71.846905] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4
[ 71.849248] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3
[ 71.850939] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9
[ 71.853187] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3
[ 71.853336] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9
[ 71.855545] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3
[ 71.855766] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2
[ 71.857376] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2
[ 71.864232] Bluetooth: hci4: HCI_REQ-0x0c1a
[ 71.865935] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2
[ 71.873779] Bluetooth: hci3: HCI_REQ-0x0c1a
[ 71.874699] Bluetooth: hci1: HCI_REQ-0x0c1a
[ 71.879489] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4
[ 71.881447] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3
[ 71.891637] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2
[ 71.919769] Bluetooth: hci2: HCI_REQ-0x0c1a
[ 71.933244] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1
[ 71.935158] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9
[ 71.937062] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9
[ 71.939845] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4
[ 71.941773] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3
[ 71.943740] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2
[ 71.950088] Bluetooth: hci5: HCI_REQ-0x0c1a
[ 73.845423] Bluetooth: hci0: command 0x0409 tx timeout
[ 73.909028] Bluetooth: hci6: Opcode 0x c03 failed: -110
[ 73.909996] Bluetooth: hci4: command 0x0409 tx timeout
[ 73.910329] Bluetooth: hci7: Opcode 0x c03 failed: -110
[ 73.911195] Bluetooth: hci1: command 0x0409 tx timeout
[ 73.911705] Bluetooth: hci3: command 0x0409 tx timeout
[ 73.974008] Bluetooth: hci5: command 0x0409 tx timeout
[ 73.974478] Bluetooth: hci2: command 0x0409 tx timeout
[ 75.893147] Bluetooth: hci0: command 0x041b tx timeout
[ 75.957190] Bluetooth: hci3: command 0x041b tx timeout
[ 75.958174] Bluetooth: hci1: command 0x041b tx timeout
[ 75.959465] Bluetooth: hci4: command 0x041b tx timeout
[ 76.021077] Bluetooth: hci2: command 0x041b tx timeout
[ 76.021933] Bluetooth: hci5: command 0x041b tx timeout
[ 77.941063] Bluetooth: hci0: command 0x040f tx timeout
[ 78.005004] Bluetooth: hci4: command 0x040f tx timeout
[ 78.005492] Bluetooth: hci1: command 0x040f tx timeout
[ 78.005933] Bluetooth: hci3: command 0x040f tx timeout
[ 78.069008] Bluetooth: hci5: command 0x040f tx timeout
[ 78.069497] Bluetooth: hci2: command 0x040f tx timeout
[ 79.221085] Bluetooth: hci6: Opcode 0x c03 failed: -110
[ 79.285165] Bluetooth: hci7: Opcode 0x c03 failed: -110
[ 79.989050] Bluetooth: hci0: command 0x0419 tx timeout
[ 80.053061] Bluetooth: hci3: command 0x0419 tx timeout
[ 80.053857] Bluetooth: hci1: command 0x0419 tx timeout
[ 80.055563] Bluetooth: hci4: command 0x0419 tx timeout
[ 80.117011] Bluetooth: hci2: command 0x0419 tx timeout
[ 80.117488] Bluetooth: hci5: command 0x0419 tx timeout
[ 82.101683] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1
[ 82.103155] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9
[ 82.107355] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9
[ 82.118329] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4
[ 82.128468] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3
[ 82.132863] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2
[ 82.140153] Bluetooth: hci6: HCI_REQ-0x0c1a
[ 84.149173] Bluetooth: hci6: command 0x0409 tx timeout
[ 84.277038] Bluetooth: hci7: Opcode 0x c03 failed: -110
[ 86.197136] Bluetooth: hci6: command 0x041b tx timeout
[ 87.160891] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1
[ 87.162524] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9
[ 87.163759] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9
[ 87.166550] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4
[ 87.167886] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3
[ 87.169035] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2
[ 87.172877] Bluetooth: hci7: HCI_REQ-0x0c1a
[ 88.245117] Bluetooth: hci6: command 0x040f tx timeout
[ 89.205122] Bluetooth: hci7: command 0x0409 tx timeout
[ 90.293467] Bluetooth: hci6: command 0x0419 tx timeout
[ 91.253045] Bluetooth: hci7: command 0x041b tx timeout
[ 93.301119] Bluetooth: hci7: command 0x040f tx timeout
[ 95.349045] Bluetooth: hci7: command 0x0419 tx timeout
[ 126.729366] audit: type=1400 audit(1663595854.646:7): avc: denied { open } for pid=3545 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1
[ 126.731083] audit: type=1400 audit(1663595854.646:8): avc: denied { kernel } for pid=3545 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1
[ 126.742461] ------------[ cut here ]------------
[ 126.742482]
[ 126.742485] ======================================================
[ 126.742489] WARNING: possible circular locking dependency detected
[ 126.742493] 6.0.0-rc6-next-20220919 #1 Not tainted
[ 126.742500] ------------------------------------------------------
[ 126.742503] syz-executor.0/3546 is trying to acquire lock:
[ 126.742509] ffffffff853fa838 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70
[ 126.742549]
[ 126.742549] but task is already holding lock:
[ 126.742552] ffff88800ff76c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0
[ 126.742580]
[ 126.742580] which lock already depends on the new lock.
[ 126.742580]
[ 126.742583]
[ 126.742583] the existing dependency chain (in reverse order) is:
[ 126.742586]
[ 126.742586] -> #3 (&ctx->lock){....}-{2:2}:
[ 126.742600] _raw_spin_lock+0x2a/0x40
[ 126.742617] __perf_event_task_sched_out+0x53b/0x18d0
[ 126.742629] __schedule+0xedd/0x2470
[ 126.742640] schedule+0xda/0x1b0
[ 126.742650] exit_to_user_mode_prepare+0x114/0x1a0
[ 126.742670] syscall_exit_to_user_mode+0x19/0x40
[ 126.742687] do_syscall_64+0x48/0x90
[ 126.742701] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 126.742718]
[ 126.742718] -> #2 (&rq->__lock){-.-.}-{2:2}:
[ 126.742732] _raw_spin_lock_nested+0x30/0x40
[ 126.742747] raw_spin_rq_lock_nested+0x1e/0x30
[ 126.742760] task_fork_fair+0x63/0x4d0
[ 126.742777] sched_cgroup_fork+0x3d0/0x540
[ 126.742790] copy_process+0x4183/0x6e20
[ 126.742801] kernel_clone+0xe7/0x890
[ 126.742810] user_mode_thread+0xad/0xf0
[ 126.742820] rest_init+0x24/0x250
[ 126.742836] arch_call_rest_init+0xf/0x14
[ 126.742849] start_kernel+0x4c1/0x4e6
[ 126.742858] secondary_startup_64_no_verify+0xe0/0xeb
[ 126.742873]
[ 126.742873] -> #1 (&p->pi_lock){-.-.}-{2:2}:
[ 126.742886] _raw_spin_lock_irqsave+0x39/0x60
[ 126.742901] try_to_wake_up+0xab/0x1920
[ 126.742914] up+0x75/0xb0
[ 126.742925] __up_console_sem+0x6e/0x80
[ 126.742944] console_unlock+0x46a/0x590
[ 126.742959] vt_ioctl+0x2822/0x2ca0
[ 126.742973] tty_ioctl+0x7c4/0x1700
[ 126.742984] __x64_sys_ioctl+0x19a/0x210
[ 126.743000] do_syscall_64+0x3b/0x90
[ 126.743012] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 126.743029]
[ 126.743029] -> #0 ((console_sem).lock){....}-{2:2}:
[ 126.743043] __lock_acquire+0x2a02/0x5e70
[ 126.743059] lock_acquire+0x1a2/0x530
[ 126.743074] _raw_spin_lock_irqsave+0x39/0x60
[ 126.743088] down_trylock+0xe/0x70
[ 126.743100] __down_trylock_console_sem+0x3b/0xd0
[ 126.743116] vprintk_emit+0x16b/0x560
[ 126.743132] vprintk+0x84/0xa0
[ 126.743147] _printk+0xba/0xf1
[ 126.743165] report_bug.cold+0x72/0xab
[ 126.743177] handle_bug+0x3c/0x70
[ 126.743190] exc_invalid_op+0x14/0x50
[ 126.743203] asm_exc_invalid_op+0x16/0x20
[ 126.743219] group_sched_out.part.0+0x2c7/0x460
[ 126.743229] ctx_sched_out+0x8f1/0xc10
[ 126.743239] __perf_event_task_sched_out+0x6d0/0x18d0
[ 126.743251] __schedule+0xedd/0x2470
[ 126.743260] schedule+0xda/0x1b0
[ 126.743270] exit_to_user_mode_prepare+0x114/0x1a0
[ 126.743288] syscall_exit_to_user_mode+0x19/0x40
[ 126.743305] do_syscall_64+0x48/0x90
[ 126.743317] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 126.743334]
[ 126.743334] other info that might help us debug this:
[ 126.743334]
[ 126.743337] Chain exists of:
[ 126.743337] (console_sem).lock --> &rq->__lock --> &ctx->lock
[ 126.743337]
[ 126.743352] Possible unsafe locking scenario:
[ 126.743352]
[ 126.743354] CPU0 CPU1
[ 126.743357] ---- ----
[ 126.743359] lock(&ctx->lock);
[ 126.743365] lock(&rq->__lock);
[ 126.743371] lock(&ctx->lock);
[ 126.743377] lock((console_sem).lock);
[ 126.743383]
[ 126.743383] *** DEADLOCK ***
[ 126.743383]
[ 126.743385] 2 locks held by syz-executor.0/3546:
[ 126.743392] #0: ffff88806ce37d18 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470
[ 126.743418] #1: ffff88800ff76c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0
[ 126.743445]
[ 126.743445] stack backtrace:
[ 126.743448] CPU: 0 PID: 3546 Comm: syz-executor.0 Not tainted 6.0.0-rc6-next-20220919 #1
[ 126.743460] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 126.743468] Call Trace:
[ 126.743472]
[ 126.743476] dump_stack_lvl+0x8b/0xb3
[ 126.743491] check_noncircular+0x263/0x2e0
[ 126.743507] ? format_decode+0x26c/0xb50
[ 126.743522] ? print_circular_bug+0x450/0x450
[ 126.743539] ? enable_ptr_key_workfn+0x20/0x20
[ 126.743554] ? format_decode+0x26c/0xb50
[ 126.743569] ? alloc_chain_hlocks+0x1ec/0x5a0
[ 126.743587] __lock_acquire+0x2a02/0x5e70
[ 126.743608] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 126.743630] lock_acquire+0x1a2/0x530
[ 126.743646] ? down_trylock+0xe/0x70
[ 126.743661] ? lock_release+0x750/0x750
[ 126.743681] ? vprintk+0x84/0xa0
[ 126.743698] _raw_spin_lock_irqsave+0x39/0x60
[ 126.743713] ? down_trylock+0xe/0x70
[ 126.743727] down_trylock+0xe/0x70
[ 126.743740] ? vprintk+0x84/0xa0
[ 126.743756] __down_trylock_console_sem+0x3b/0xd0
[ 126.743773] vprintk_emit+0x16b/0x560
[ 126.743792] vprintk+0x84/0xa0
[ 126.743809] _printk+0xba/0xf1
[ 126.743826] ? record_print_text.cold+0x16/0x16
[ 126.743847] ? report_bug.cold+0x66/0xab
[ 126.743862] ? group_sched_out.part.0+0x2c7/0x460
[ 126.743873] report_bug.cold+0x72/0xab
[ 126.743888] handle_bug+0x3c/0x70
[ 126.743902] exc_invalid_op+0x14/0x50
[ 126.743916] asm_exc_invalid_op+0x16/0x20
[ 126.743933] RIP: 0010:group_sched_out.part.0+0x2c7/0x460
[ 126.743946] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d 5b 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00
[ 126.743957] RSP: 0018:ffff88801f71fc48 EFLAGS: 00010006
[ 126.743966] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000
[ 126.743974] RDX: ffff88803d905040 RSI: ffffffff81566077 RDI: 0000000000000005
[ 126.743997] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001
[ 126.744005] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff88800ff76c00
[ 126.744013] R13: ffff88806ce3d140 R14: ffffffff8547c620 R15: 0000000000000002
[ 126.744024] ? group_sched_out.part.0+0x2c7/0x460
[ 126.744037] ? group_sched_out.part.0+0x2c7/0x460
[ 126.744050] ctx_sched_out+0x8f1/0xc10
[ 126.744062] __perf_event_task_sched_out+0x6d0/0x18d0
[ 126.744077] ? lock_is_held_type+0xd7/0x130
[ 126.744095] ? __perf_cgroup_move+0x160/0x160
[ 126.744107] ? set_next_entity+0x304/0x550
[ 126.744124] ? update_curr+0x267/0x740
[ 126.744142] ? lock_is_held_type+0xd7/0x130
[ 126.744160] __schedule+0xedd/0x2470
[ 126.744174] ? io_schedule_timeout+0x150/0x150
[ 126.744187] ? rcu_read_lock_sched_held+0x3e/0x80
[ 126.744207] schedule+0xda/0x1b0
[ 126.744219] exit_to_user_mode_prepare+0x114/0x1a0
[ 126.744238] syscall_exit_to_user_mode+0x19/0x40
[ 126.744256] do_syscall_64+0x48/0x90
[ 126.744270] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 126.744288] RIP: 0033:0x7fc497ac5b19
[ 126.744296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 126.744307] RSP: 002b:00007fc49503b218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
[ 126.744318] RAX: 0000000000000001 RBX: 00007fc497bd8f68 RCX: 00007fc497ac5b19
[ 126.744326] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fc497bd8f6c
[ 126.744333] RBP: 00007fc497bd8f60 R08: 000000000000000e R09: 0000000000000000
[ 126.744341] R10: 0000000000000003 R11: 0000000000000246 R12: 00007fc497bd8f6c
[ 126.744348] R13: 00007ffd29e773ff R14: 00007fc49503b300 R15: 0000000000022000
[ 126.744361]
[ 126.799237] WARNING: CPU: 0 PID: 3546 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460
[ 126.799905] Modules linked in:
[ 126.800152] CPU: 0 PID: 3546 Comm: syz-executor.0 Not tainted 6.0.0-rc6-next-20220919 #1
[ 126.800727] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 126.801526] RIP: 0010:group_sched_out.part.0+0x2c7/0x460
[ 126.801918] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d 5b 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00
[ 126.803195] RSP: 0018:ffff88801f71fc48 EFLAGS: 00010006
[ 126.803571] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000
[ 126.804088] RDX: ffff88803d905040 RSI: ffffffff81566077 RDI: 0000000000000005
[ 126.804587] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001
[ 126.805099] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff88800ff76c00
[ 126.805601] R13: ffff88806ce3d140 R14: ffffffff8547c620 R15: 0000000000000002
[ 126.806110] FS: 00007fc49503b700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000
[ 126.806703] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 126.807146] CR2: 00007f2f2d602670 CR3: 000000000ec22000 CR4: 0000000000350ef0
[ 126.807690] Call Trace:
[ 126.807889]
[ 126.808080] ctx_sched_out+0x8f1/0xc10
[ 126.808381] __perf_event_task_sched_out+0x6d0/0x18d0
[ 126.808773] ? lock_is_held_type+0xd7/0x130
[ 126.809107] ? __perf_cgroup_move+0x160/0x160
[ 126.809448] ? set_next_entity+0x304/0x550
[ 126.809777] ? update_curr+0x267/0x740
[ 126.810089] ? lock_is_held_type+0xd7/0x130
[ 126.810425] __schedule+0xedd/0x2470
[ 126.810706] ? io_schedule_timeout+0x150/0x150
[ 126.811061] ? rcu_read_lock_sched_held+0x3e/0x80
[ 126.811437] schedule+0xda/0x1b0
[ 126.811697] exit_to_user_mode_prepare+0x114/0x1a0
[ 126.812085] syscall_exit_to_user_mode+0x19/0x40
[ 126.812455] do_syscall_64+0x48/0x90
[ 126.812745] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 126.813140] RIP: 0033:0x7fc497ac5b19
[ 126.813432] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 126.814769] RSP: 002b:00007fc49503b218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
[ 126.815349] RAX: 0000000000000001 RBX: 00007fc497bd8f68 RCX: 00007fc497ac5b19
[ 126.815882] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fc497bd8f6c
[ 126.816439] RBP: 00007fc497bd8f60 R08: 000000000000000e R09: 0000000000000000
[ 126.816984] R10: 0000000000000003 R11: 0000000000000246 R12: 00007fc497bd8f6c
[ 126.817519] R13: 00007ffd29e773ff R14: 00007fc49503b300 R15: 0000000000022000
[ 126.818046]
[ 126.818232] irq event stamp: 834
[ 126.818483] hardirqs last enabled at (833): [] exit_to_user_mode_prepare+0x109/0x1a0
[ 126.819189] hardirqs last disabled at (834): [] __schedule+0x1225/0x2470
[ 126.819799] softirqs last enabled at (650): [] __irq_exit_rcu+0x11b/0x180
[ 126.820451] softirqs last disabled at (479): [] __irq_exit_rcu+0x11b/0x180
[ 126.821085] ---[ end trace 0000000000000000 ]---
[ 127.180574] ieee80211 phy2: Selected rate control algorithm 'minstrel_ht'
13:57:35 executing program 1:
r0 = socket$packet(0x11, 0x2, 0x300)
setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0), 0x4)
setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000180), 0x10)
13:57:35 executing program 1:
r0 = socket$packet(0x11, 0x2, 0x300)
setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0), 0x4)
setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000180), 0x10)
[ 127.365317] ieee80211 phy3: Selected rate control algorithm 'minstrel_ht'
13:57:35 executing program 1:
r0 = socket$packet(0x11, 0x2, 0x300)
setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0), 0x4)
setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000180), 0x10)
[ 127.435489] syz-executor.0 (3546) used greatest stack depth: 24216 bytes left
[ 132.502800] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 133.863601] process 'syz-executor.6' launched '/dev/fd/-1/./file0' with NULL argv: empty string added
13:57:41 executing program 6:
ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, 0x0)
openat$cdrom(0xffffffffffffff9c, &(0x7f0000001580), 0x8000, 0x0)
13:57:41 executing program 7:
prctl$PR_SET_MM(0x29, 0x0, &(0x7f0000ff6000/0x1000)=nil)
13:57:41 executing program 2:
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000005, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x14)
setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000000c0)={@loopback}, 0x14)
13:57:41 executing program 4:
nanosleep(&(0x7f00000038c0)={0x0, 0x989680}, 0x0)
13:57:41 executing program 5:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="c4000000130031060000000000000000000000000000000000000000000000007f00000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015"], 0xc4}}, 0x0)
13:57:41 executing program 1:
r0 = socket$packet(0x11, 0x2, 0x300)
setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0), 0x4)
setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000180), 0x10)
13:57:41 executing program 3:
r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0)
ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000003400))
13:57:41 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r0, &(0x7f0000000100), 0x12)
write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5)
io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}])
r1 = socket$netlink(0x10, 0x3, 0x10)
sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0)
[ 133.924244] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 134.008107] ieee80211 phy4: Selected rate control algorithm 'minstrel_ht'
[ 134.097456] syz-executor.0 (3980) used greatest stack depth: 24088 bytes left
13:57:42 executing program 1:
r0 = socket$packet(0x11, 0x2, 0x300)
setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0), 0x4)
setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000180), 0x10)
13:57:42 executing program 2:
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000005, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x14)
setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000000c0)={@loopback}, 0x14)
13:57:42 executing program 4:
nanosleep(&(0x7f00000038c0)={0x0, 0x989680}, 0x0)
13:57:42 executing program 3:
r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0)
ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000003400))
13:57:42 executing program 7:
prctl$PR_SET_MM(0x29, 0x0, &(0x7f0000ff6000/0x1000)=nil)
13:57:42 executing program 5:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="c4000000130031060000000000000000000000000000000000000000000000007f00000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015"], 0xc4}}, 0x0)
13:57:42 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r0, &(0x7f0000000100), 0x12)
write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5)
io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}])
r1 = socket$netlink(0x10, 0x3, 0x10)
sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0)
13:57:42 executing program 6:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r0, &(0x7f0000000100), 0x12)
write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5)
io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}])
r1 = socket$netlink(0x10, 0x3, 0x10)
sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0)
[ 134.147679] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'.
13:57:42 executing program 3:
r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0)
ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000003400))
[ 134.206420] ieee80211 phy5: Selected rate control algorithm 'minstrel_ht'
13:57:42 executing program 7:
prctl$PR_SET_MM(0x29, 0x0, &(0x7f0000ff6000/0x1000)=nil)
13:57:42 executing program 5:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="c4000000130031060000000000000000000000000000000000000000000000007f00000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015"], 0xc4}}, 0x0)
13:57:42 executing program 4:
nanosleep(&(0x7f00000038c0)={0x0, 0x989680}, 0x0)
13:57:42 executing program 1:
r0 = socket$packet(0x11, 0x2, 0x300)
setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0), 0x4)
setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000180), 0x10)
13:57:42 executing program 2:
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000005, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x14)
setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000000c0)={@loopback}, 0x14)
[ 134.294841] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'.
13:57:42 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r0, &(0x7f0000000100), 0x12)
write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5)
io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}])
r1 = socket$netlink(0x10, 0x3, 0x10)
sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0)
13:57:42 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r0, &(0x7f0000000100), 0x12)
write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5)
io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}])
r1 = socket$netlink(0x10, 0x3, 0x10)
sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0)
[ 134.347921] ieee80211 phy6: Selected rate control algorithm 'minstrel_ht'
13:57:42 executing program 6:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r0, &(0x7f0000000100), 0x12)
write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5)
io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}])
r1 = socket$netlink(0x10, 0x3, 0x10)
sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0)
[ 134.442185] ieee80211 phy7: Selected rate control algorithm 'minstrel_ht'
[ 134.473962] hrtimer: interrupt took 18435 ns
[ 135.102629] ieee80211 phy8: Selected rate control algorithm 'minstrel_ht'
[ 135.200494] ieee80211 phy9: Selected rate control algorithm 'minstrel_ht'
13:57:43 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r0, &(0x7f0000000100), 0x12)
write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5)
io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}])
r1 = socket$netlink(0x10, 0x3, 0x10)
sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0)
13:57:43 executing program 1:
perf_event_open(&(0x7f0000000ec0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
13:57:43 executing program 5:
r0 = socket$inet6(0xa, 0x1, 0x0)
getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0))
ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4})
setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88)
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}})
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'})
r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0))
sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c)
13:57:43 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r0, &(0x7f0000000100), 0x12)
write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5)
io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}])
r1 = socket$netlink(0x10, 0x3, 0x10)
sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0)
13:57:43 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r0, &(0x7f0000000100), 0x12)
write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5)
io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}])
r1 = socket$netlink(0x10, 0x3, 0x10)
sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0)
13:57:43 executing program 6:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r0, &(0x7f0000000100), 0x12)
write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5)
io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}])
r1 = socket$netlink(0x10, 0x3, 0x10)
sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0)
13:57:43 executing program 4:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
13:57:43 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
setsockopt$inet_int(r0, 0x0, 0x18, 0x0, 0x0)
13:57:43 executing program 1:
perf_event_open(&(0x7f0000000ec0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
13:57:43 executing program 5:
r0 = socket$inet6(0xa, 0x1, 0x0)
getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0))
ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4})
setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88)
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}})
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'})
r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0))
sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c)
13:57:43 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
setsockopt$inet_int(r0, 0x0, 0x18, 0x0, 0x0)
[ 135.397836] loop4: detected capacity change from 0 to 256
[ 135.402582] ieee80211 phy10: Selected rate control algorithm 'minstrel_ht'
13:57:43 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
setsockopt$inet_int(r0, 0x0, 0x18, 0x0, 0x0)
[ 135.468899] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
13:57:43 executing program 5:
r0 = socket$inet6(0xa, 0x1, 0x0)
getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0))
ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4})
setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88)
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}})
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'})
r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0))
sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c)
13:57:43 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
setsockopt$inet_int(r0, 0x0, 0x18, 0x0, 0x0)
13:57:43 executing program 2:
r0 = socket$inet6(0xa, 0x1, 0x0)
getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0))
ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4})
setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88)
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}})
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'})
r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0))
sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c)
[ 135.588519] ieee80211 phy11: Selected rate control algorithm 'minstrel_ht'
13:57:43 executing program 1:
perf_event_open(&(0x7f0000000ec0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
[ 135.761276] ieee80211 phy12: Selected rate control algorithm 'minstrel_ht'
[ 135.960072] ieee80211 phy13: Selected rate control algorithm 'minstrel_ht'
[ 136.094198] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
13:57:44 executing program 2:
r0 = socket$inet6(0xa, 0x1, 0x0)
getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0))
ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4})
setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88)
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}})
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'})
r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0))
sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c)
13:57:44 executing program 1:
perf_event_open(&(0x7f0000000ec0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
13:57:44 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r0, &(0x7f0000000100), 0x12)
write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5)
io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}])
r1 = socket$netlink(0x10, 0x3, 0x10)
sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0)
13:57:44 executing program 6:
r0 = socket$inet6(0xa, 0x1, 0x0)
getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0))
ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4})
setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88)
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}})
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'})
r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0))
sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c)
13:57:44 executing program 0:
r0 = socket$inet6(0xa, 0x1, 0x0)
getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0))
ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4})
setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88)
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}})
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'})
r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0))
sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c)
13:57:44 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r0, &(0x7f0000000100), 0x12)
write(r0, &(0x7f00000003c0)="d96d36cd6e2cbc49977f0555ceea6d0e413bc7bfb30c43d84df12bc7cb270341400f5d56a34688aa5f4c5a78ea08a3b8a7ec3ec7670a1ff84c2c3d5b81669773fafe6dec5726662ebacd6e2bd380e83578ed3603a1cef253f3a66a2d2ce37227e0a680a7e8885779eabf9af1050cd8a4baf9ede0cc5193e5e17c760eaafab860e5c1fa7fa007423517830f91640637bd0ef414721346e53332f233cced301c705739492fee1111d2843400e1f78e0f3eeee083351d899a38c83bfb0167dd9964d22b43fae90dc4d3a960ff8c9ab074a2c01ab0c81a", 0xd5)
io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=')', 0x1}])
r1 = socket$netlink(0x10, 0x3, 0x10)
sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="200000001d0001000000000400000000040000000c000c83efc675a640adddb4557ac9"], 0x20}], 0x1}, 0x0)
13:57:44 executing program 5:
r0 = socket$inet6(0xa, 0x1, 0x0)
getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0))
ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4})
setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88)
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}})
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'})
r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0))
sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c)
13:57:44 executing program 4:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
[ 136.174518] ieee80211 phy14: Selected rate control algorithm 'minstrel_ht'
[ 136.175570] loop4: detected capacity change from 0 to 256
13:57:44 executing program 6:
r0 = socket$inet6(0xa, 0x1, 0x0)
getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0))
ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4})
setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88)
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}})
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'})
r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0))
sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c)
13:57:44 executing program 2:
r0 = socket$inet6(0xa, 0x1, 0x0)
getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0))
ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4})
setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88)
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}})
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'})
r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0))
sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c)
13:57:44 executing program 0:
r0 = socket$inet6(0xa, 0x1, 0x0)
getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0))
ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4})
setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88)
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}})
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'})
r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0))
sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c)
[ 136.237039] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 136.243550] loop1: detected capacity change from 0 to 256
[ 136.262537] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
13:57:44 executing program 1:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
13:57:44 executing program 5:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
13:57:44 executing program 6:
r0 = socket$inet6(0xa, 0x1, 0x0)
getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0))
ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4})
setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88)
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}})
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'})
r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0))
sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c)
[ 136.298804] loop5: detected capacity change from 0 to 256
[ 136.303837] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 136.335878] ieee80211 phy15: Selected rate control algorithm 'minstrel_ht'
13:57:44 executing program 0:
r0 = socket$inet6(0xa, 0x1, 0x0)
getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0))
ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4})
setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88)
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}})
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'})
r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0))
sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c)
13:57:44 executing program 7:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
[ 136.490006] loop7: detected capacity change from 0 to 256
[ 136.495501] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
13:57:44 executing program 6:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
[ 136.505515] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 136.515122] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 136.527013] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 136.531246] loop6: detected capacity change from 0 to 256
[ 136.543916] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 136.663841] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
13:57:44 executing program 5:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
[ 136.673331] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
13:57:44 executing program 6:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
13:57:44 executing program 2:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
13:57:44 executing program 3:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
13:57:44 executing program 1:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
13:57:44 executing program 4:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
13:57:44 executing program 0:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
13:57:44 executing program 7:
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
get_robust_list(0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xb, r0, 0x0)
r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[])
r2 = getpid()
pidfd_open(r2, 0x0)
r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x66cc1, 0x80)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000280)={0x9, 0x7f, 0x7f, 0x3ab})
syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4)
sendfile(r4, r3, 0x0, 0x100000)
execveat(r3, &(0x7f0000000040)='./file2\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='tmpfs\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x100)
perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x81, 0x0, 0x0, 0x81, 0x0, 0x2, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x49, 0x6, 0x3, 0x7, 0x1, 0x5, 0x0, 0x0, 0x80}, r2, 0xf, r3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x686ca9788886d8dc)
r5 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0)
write(r5, &(0x7f0000000080)="01", 0xffff8000)
[ 136.713818] loop5: detected capacity change from 0 to 256
[ 136.714232] loop4: detected capacity change from 0 to 256
[ 136.717402] loop6: detected capacity change from 0 to 256
[ 136.717705] loop1: detected capacity change from 0 to 256
[ 136.727078] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 136.728291] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[ 136.747751] loop2: detected capacity change from 0 to 256
VM DIAGNOSIS:
13:57:34 Registers:
info registers vcpu 0
RAX=0000000000000031 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8
RSI=ffffffff822b2e71 RDI=ffffffff87641ba0 RBP=ffffffff87641b60 RSP=ffff88801f71f698
R8 =0000000000000001 R9 =000000000000000a R10=0000000000000031 R11=0000000000000001
R12=0000000000000031 R13=ffffffff87641b60 R14=0000000000000010 R15=ffffffff822b2e60
RIP=ffffffff822b2ec9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 00007fc49503b700 00000000 00000000
GS =0000 ffff88806ce00000 00000000 00000000
LDT=0000 fffffe0000000000 00000000 00000000
TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy
GDT= fffffe0000001000 0000007f
IDT= fffffe0000000000 00000fff
CR0=80050033 CR2=00007f2f2d602670 CR3=000000000ec22000 CR4=00350ef0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM01=0000000000000000 0000000000000000 00007fc497bac7c0 00007fc497bac7c8
YMM02=0000000000000000 0000000000000000 00007fc497bac7e0 00007fc497bac7c0
YMM03=0000000000000000 0000000000000000 00007fc497bac7c8 00007fc497bac7c0
YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000
YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245
YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040
YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000
info registers vcpu 1
RAX=0000000000000000 RBX=00007f965edf3fff RCX=ffffffff840d3e9c RDX=ffff88800ef6d040
RSI=0000000000000000 RDI=0000000000000006 RBP=ffff88800e9c7ba0 RSP=ffff88800e9c79b0
R8 =0000000000000006 R9 =00007f965edf3fff R10=00007f965edf5fff R11=0000000000000001
R12=0000000000000001 R13=00007f965edf5fff R14=ffff88803e557e00 R15=ffff88803e557e0c
RIP=ffffffff8146132c RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 0000000000000000 00000000 00000000
GS =0000 ffff88806cf00000 00000000 00000000
LDT=0000 fffffe0000000000 00000000 00000000
TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy
GDT= fffffe0000048000 0000007f
IDT= fffffe0000000000 00000fff
CR0=80050033 CR2=00007f965f2ee6f4 CR3=000000000d3a0000 CR4=00350ee0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM01=0000000000000000 0000000000000000 00007f965f2fd470 00007f965f2fcf20
YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM03=0000000000000000 0000000000000000 756e20796d6d7564 20736e6f6974706f
YMM04=0000000000000000 0000000000000000 2f2f2f2f2f2f2f2f 2f2f2f2f2f2f2f2f
YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM08=0000000000000000 0000000000000000 73253d656d616e6c 6165722073253d73
YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000