Warning: Permanently added '[localhost]:1566' (ECDSA) to the list of known hosts. 2022/09/19 14:32:20 fuzzer started 2022/09/19 14:32:20 dialing manager at localhost:42121 syzkaller login: [ 40.541459] cgroup: Unknown subsys name 'net' [ 40.651693] cgroup: Unknown subsys name 'rlimit' 2022/09/19 14:32:33 syscalls: 2215 2022/09/19 14:32:33 code coverage: enabled 2022/09/19 14:32:33 comparison tracing: enabled 2022/09/19 14:32:33 extra coverage: enabled 2022/09/19 14:32:33 setuid sandbox: enabled 2022/09/19 14:32:33 namespace sandbox: enabled 2022/09/19 14:32:33 Android sandbox: enabled 2022/09/19 14:32:33 fault injection: enabled 2022/09/19 14:32:33 leak checking: enabled 2022/09/19 14:32:33 net packet injection: enabled 2022/09/19 14:32:33 net device setup: enabled 2022/09/19 14:32:33 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/19 14:32:33 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/19 14:32:33 USB emulation: enabled 2022/09/19 14:32:33 hci packet injection: enabled 2022/09/19 14:32:33 wifi device emulation: failed to parse kernel version (6.0.0-rc6-next-20220919) 2022/09/19 14:32:33 802.15.4 emulation: enabled 2022/09/19 14:32:33 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/19 14:32:34 fetching corpus: 50, signal 28657/32139 (executing program) 2022/09/19 14:32:34 fetching corpus: 100, signal 46420/51161 (executing program) 2022/09/19 14:32:34 fetching corpus: 150, signal 59929/65703 (executing program) 2022/09/19 14:32:34 fetching corpus: 200, signal 64698/71699 (executing program) 2022/09/19 14:32:34 fetching corpus: 250, signal 71794/79883 (executing program) 2022/09/19 14:32:34 fetching corpus: 300, signal 75293/84539 (executing program) 2022/09/19 14:32:35 fetching corpus: 350, signal 79700/89889 (executing program) 2022/09/19 14:32:35 fetching corpus: 400, signal 84895/95924 (executing program) 2022/09/19 14:32:35 fetching corpus: 450, signal 90039/101814 (executing program) 2022/09/19 14:32:35 fetching corpus: 500, signal 92477/105183 (executing program) 2022/09/19 14:32:35 fetching corpus: 550, signal 96127/109647 (executing program) 2022/09/19 14:32:35 fetching corpus: 600, signal 97891/112317 (executing program) 2022/09/19 14:32:35 fetching corpus: 650, signal 99961/115230 (executing program) 2022/09/19 14:32:35 fetching corpus: 700, signal 102385/118377 (executing program) 2022/09/19 14:32:36 fetching corpus: 750, signal 109312/125361 (executing program) 2022/09/19 14:32:36 fetching corpus: 800, signal 112265/128866 (executing program) 2022/09/19 14:32:36 fetching corpus: 850, signal 114169/131434 (executing program) 2022/09/19 14:32:36 fetching corpus: 900, signal 115973/133900 (executing program) 2022/09/19 14:32:36 fetching corpus: 950, signal 119170/137497 (executing program) 2022/09/19 14:32:36 fetching corpus: 1000, signal 121956/140643 (executing program) 2022/09/19 14:32:37 fetching corpus: 1050, signal 123914/143097 (executing program) 2022/09/19 14:32:37 fetching corpus: 1100, signal 125475/145226 (executing program) 2022/09/19 14:32:37 fetching corpus: 1150, signal 126799/147121 (executing program) 2022/09/19 14:32:37 fetching corpus: 1200, signal 129540/150114 (executing program) 2022/09/19 14:32:37 fetching corpus: 1250, signal 130932/152015 (executing program) 2022/09/19 14:32:37 fetching corpus: 1300, signal 132752/154227 (executing program) 2022/09/19 14:32:37 fetching corpus: 1350, signal 133793/155776 (executing program) 2022/09/19 14:32:37 fetching corpus: 1400, signal 136489/158540 (executing program) 2022/09/19 14:32:38 fetching corpus: 1450, signal 139124/161188 (executing program) 2022/09/19 14:32:38 fetching corpus: 1500, signal 140753/163066 (executing program) 2022/09/19 14:32:38 fetching corpus: 1550, signal 142169/164770 (executing program) 2022/09/19 14:32:38 fetching corpus: 1600, signal 144213/166881 (executing program) 2022/09/19 14:32:38 fetching corpus: 1650, signal 145810/168630 (executing program) 2022/09/19 14:32:38 fetching corpus: 1700, signal 146729/169966 (executing program) 2022/09/19 14:32:38 fetching corpus: 1750, signal 147835/171387 (executing program) 2022/09/19 14:32:38 fetching corpus: 1800, signal 149368/173079 (executing program) 2022/09/19 14:32:38 fetching corpus: 1850, signal 150842/174711 (executing program) 2022/09/19 14:32:39 fetching corpus: 1900, signal 152497/176412 (executing program) 2022/09/19 14:32:39 fetching corpus: 1950, signal 154199/178117 (executing program) 2022/09/19 14:32:39 fetching corpus: 2000, signal 155891/179776 (executing program) 2022/09/19 14:32:39 fetching corpus: 2050, signal 156702/180866 (executing program) 2022/09/19 14:32:39 fetching corpus: 2100, signal 158233/182348 (executing program) 2022/09/19 14:32:39 fetching corpus: 2150, signal 159708/183819 (executing program) 2022/09/19 14:32:39 fetching corpus: 2200, signal 160722/184980 (executing program) 2022/09/19 14:32:39 fetching corpus: 2250, signal 161284/185860 (executing program) 2022/09/19 14:32:40 fetching corpus: 2300, signal 163119/187438 (executing program) 2022/09/19 14:32:40 fetching corpus: 2350, signal 164353/188647 (executing program) 2022/09/19 14:32:40 fetching corpus: 2400, signal 166474/190316 (executing program) 2022/09/19 14:32:40 fetching corpus: 2450, signal 167396/191307 (executing program) 2022/09/19 14:32:40 fetching corpus: 2500, signal 169028/192637 (executing program) 2022/09/19 14:32:40 fetching corpus: 2550, signal 170388/193825 (executing program) 2022/09/19 14:32:41 fetching corpus: 2600, signal 171649/194960 (executing program) 2022/09/19 14:32:41 fetching corpus: 2650, signal 172056/195596 (executing program) 2022/09/19 14:32:41 fetching corpus: 2700, signal 172925/196448 (executing program) 2022/09/19 14:32:41 fetching corpus: 2750, signal 173797/197465 (executing program) 2022/09/19 14:32:41 fetching corpus: 2800, signal 174760/198314 (executing program) 2022/09/19 14:32:41 fetching corpus: 2850, signal 175414/199023 (executing program) 2022/09/19 14:32:41 fetching corpus: 2900, signal 175870/199630 (executing program) 2022/09/19 14:32:41 fetching corpus: 2950, signal 176883/200473 (executing program) 2022/09/19 14:32:41 fetching corpus: 3000, signal 177771/201228 (executing program) 2022/09/19 14:32:41 fetching corpus: 3050, signal 178970/202168 (executing program) 2022/09/19 14:32:42 fetching corpus: 3100, signal 179870/202970 (executing program) 2022/09/19 14:32:42 fetching corpus: 3150, signal 181011/203812 (executing program) 2022/09/19 14:32:42 fetching corpus: 3200, signal 181558/204416 (executing program) 2022/09/19 14:32:42 fetching corpus: 3250, signal 182335/205057 (executing program) 2022/09/19 14:32:42 fetching corpus: 3300, signal 183222/205726 (executing program) 2022/09/19 14:32:42 fetching corpus: 3350, signal 184214/206437 (executing program) 2022/09/19 14:32:42 fetching corpus: 3400, signal 184877/207069 (executing program) 2022/09/19 14:32:42 fetching corpus: 3450, signal 185542/207600 (executing program) 2022/09/19 14:32:43 fetching corpus: 3500, signal 186541/208244 (executing program) 2022/09/19 14:32:43 fetching corpus: 3550, signal 187247/208760 (executing program) 2022/09/19 14:32:43 fetching corpus: 3600, signal 188008/209322 (executing program) 2022/09/19 14:32:43 fetching corpus: 3650, signal 188542/209801 (executing program) 2022/09/19 14:32:43 fetching corpus: 3700, signal 189344/210365 (executing program) 2022/09/19 14:32:43 fetching corpus: 3750, signal 190301/210934 (executing program) 2022/09/19 14:32:43 fetching corpus: 3800, signal 190920/211370 (executing program) 2022/09/19 14:32:43 fetching corpus: 3850, signal 191548/211819 (executing program) 2022/09/19 14:32:44 fetching corpus: 3900, signal 192283/212302 (executing program) 2022/09/19 14:32:44 fetching corpus: 3950, signal 193575/212895 (executing program) 2022/09/19 14:32:44 fetching corpus: 4000, signal 194543/213364 (executing program) 2022/09/19 14:32:44 fetching corpus: 4050, signal 195577/213838 (executing program) 2022/09/19 14:32:44 fetching corpus: 4100, signal 196111/214204 (executing program) 2022/09/19 14:32:44 fetching corpus: 4150, signal 197119/214669 (executing program) 2022/09/19 14:32:44 fetching corpus: 4200, signal 197793/215016 (executing program) 2022/09/19 14:32:45 fetching corpus: 4250, signal 198593/215417 (executing program) 2022/09/19 14:32:45 fetching corpus: 4300, signal 199117/215747 (executing program) 2022/09/19 14:32:45 fetching corpus: 4350, signal 199854/216146 (executing program) 2022/09/19 14:32:45 fetching corpus: 4400, signal 200855/216463 (executing program) 2022/09/19 14:32:45 fetching corpus: 4450, signal 201357/216778 (executing program) 2022/09/19 14:32:45 fetching corpus: 4500, signal 201854/217026 (executing program) 2022/09/19 14:32:45 fetching corpus: 4550, signal 202392/217280 (executing program) 2022/09/19 14:32:45 fetching corpus: 4600, signal 202730/217495 (executing program) 2022/09/19 14:32:45 fetching corpus: 4650, signal 203451/217755 (executing program) 2022/09/19 14:32:46 fetching corpus: 4700, signal 204243/218024 (executing program) 2022/09/19 14:32:46 fetching corpus: 4750, signal 204959/218223 (executing program) 2022/09/19 14:32:46 fetching corpus: 4800, signal 206145/218533 (executing program) 2022/09/19 14:32:46 fetching corpus: 4850, signal 206813/218721 (executing program) 2022/09/19 14:32:46 fetching corpus: 4900, signal 207830/218955 (executing program) 2022/09/19 14:32:46 fetching corpus: 4950, signal 208592/219126 (executing program) 2022/09/19 14:32:47 fetching corpus: 5000, signal 209656/219300 (executing program) 2022/09/19 14:32:47 fetching corpus: 5050, signal 210112/219408 (executing program) 2022/09/19 14:32:47 fetching corpus: 5100, signal 210801/219612 (executing program) 2022/09/19 14:32:47 fetching corpus: 5150, signal 211318/219723 (executing program) 2022/09/19 14:32:47 fetching corpus: 5200, signal 212245/219836 (executing program) 2022/09/19 14:32:47 fetching corpus: 5250, signal 212827/219909 (executing program) 2022/09/19 14:32:47 fetching corpus: 5300, signal 213791/220006 (executing program) 2022/09/19 14:32:48 fetching corpus: 5328, signal 214166/220058 (executing program) 2022/09/19 14:32:48 fetching corpus: 5328, signal 214166/220058 (executing program) 2022/09/19 14:32:50 starting 8 fuzzer processes 14:32:50 executing program 0: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000005, 0x32, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f0000000140)) 14:32:50 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) 14:32:50 executing program 2: openat$nvram(0xffffffffffffff9c, &(0x7f0000000700), 0x181, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000001f80), 0x0, 0x0) 14:32:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 14:32:50 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='mpol=tnterleave=static:15-4', @ANYRESOCT=0x0]) [ 70.994102] audit: type=1400 audit(1663597970.989:6): avc: denied { execmem } for pid=285 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 14:32:51 executing program 5: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) mknodat$null(r1, &(0x7f0000000040)='./file0\x00', 0xffffc000, 0x103) 14:32:51 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000ac0)={'mangle\x00'}, &(0x7f0000000b40)=0x54) 14:32:51 executing program 6: syz_io_uring_setup(0x5591, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), 0x0) syz_io_uring_setup(0x3a3d, &(0x7f0000000140), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000bff000/0x400000)=nil, &(0x7f00000001c0), 0x0) syz_io_uring_setup(0x3e5b, &(0x7f0000000100), &(0x7f0000d09000/0x1000)=nil, &(0x7f0000dc2000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x74a8, &(0x7f00000003c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000eb7000/0x2000)=nil, &(0x7f0000000440), &(0x7f00000000c0)) [ 72.380654] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 72.382838] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 72.384140] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 72.385647] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 72.386863] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 72.388032] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 72.391084] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 72.392216] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 72.393999] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 72.395099] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 72.396885] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 72.398140] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 72.410674] Bluetooth: hci0: HCI_REQ-0x0c1a [ 72.411833] Bluetooth: hci1: HCI_REQ-0x0c1a [ 72.425999] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 72.427513] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 72.429153] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 72.430463] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 72.444532] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 72.445878] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 72.448487] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 72.449893] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 72.452399] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 72.459471] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 72.460603] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 72.462015] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 72.463831] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 72.465292] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 72.468016] Bluetooth: hci2: HCI_REQ-0x0c1a [ 72.474309] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 72.476396] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 72.477309] Bluetooth: hci3: HCI_REQ-0x0c1a [ 72.481666] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 72.482979] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 72.484345] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 72.485558] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 72.492672] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 72.500990] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 72.504018] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 72.505814] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 72.507191] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 72.511198] Bluetooth: hci6: HCI_REQ-0x0c1a [ 72.511481] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 72.513905] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 72.516578] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 72.518224] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 72.519465] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 72.524349] Bluetooth: hci7: HCI_REQ-0x0c1a [ 72.566429] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 72.580208] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 72.583623] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 72.595580] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 72.596721] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 72.598796] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 72.612148] Bluetooth: hci4: HCI_REQ-0x0c1a [ 72.618118] Bluetooth: hci5: HCI_REQ-0x0c1a [ 74.451298] Bluetooth: hci1: command 0x0409 tx timeout [ 74.451890] Bluetooth: hci0: command 0x0409 tx timeout [ 74.512286] Bluetooth: hci2: command 0x0409 tx timeout [ 74.512291] Bluetooth: hci3: command 0x0409 tx timeout [ 74.576283] Bluetooth: hci6: command 0x0409 tx timeout [ 74.577107] Bluetooth: hci7: command 0x0409 tx timeout [ 74.640305] Bluetooth: hci5: command 0x0409 tx timeout [ 74.640333] Bluetooth: hci4: command 0x0409 tx timeout [ 76.496631] Bluetooth: hci0: command 0x041b tx timeout [ 76.497087] Bluetooth: hci1: command 0x041b tx timeout [ 76.560281] Bluetooth: hci3: command 0x041b tx timeout [ 76.561307] Bluetooth: hci2: command 0x041b tx timeout [ 76.624295] Bluetooth: hci7: command 0x041b tx timeout [ 76.624789] Bluetooth: hci6: command 0x041b tx timeout [ 76.689371] Bluetooth: hci4: command 0x041b tx timeout [ 76.689834] Bluetooth: hci5: command 0x041b tx timeout [ 78.545294] Bluetooth: hci1: command 0x040f tx timeout [ 78.545834] Bluetooth: hci0: command 0x040f tx timeout [ 78.609373] Bluetooth: hci2: command 0x040f tx timeout [ 78.609909] Bluetooth: hci3: command 0x040f tx timeout [ 78.672292] Bluetooth: hci6: command 0x040f tx timeout [ 78.672834] Bluetooth: hci7: command 0x040f tx timeout [ 78.737343] Bluetooth: hci5: command 0x040f tx timeout [ 78.737870] Bluetooth: hci4: command 0x040f tx timeout [ 80.593316] Bluetooth: hci0: command 0x0419 tx timeout [ 80.593803] Bluetooth: hci1: command 0x0419 tx timeout [ 80.656335] Bluetooth: hci3: command 0x0419 tx timeout [ 80.656779] Bluetooth: hci2: command 0x0419 tx timeout [ 80.720368] Bluetooth: hci7: command 0x0419 tx timeout [ 80.720834] Bluetooth: hci6: command 0x0419 tx timeout [ 80.785300] Bluetooth: hci4: command 0x0419 tx timeout [ 80.785760] Bluetooth: hci5: command 0x0419 tx timeout [ 128.727575] tmpfs: Bad value for 'mpol' [ 128.729672] tmpfs: Bad value for 'mpol' [ 130.518957] audit: type=1400 audit(1663598030.514:7): avc: denied { write } for pid=3945 comm="syz-executor.1" name="task" dev="proc" ino=13848 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 [ 130.520884] audit: type=1400 audit(1663598030.516:8): avc: denied { add_name } for pid=3945 comm="syz-executor.1" name="3946" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 [ 130.524085] audit: type=1400 audit(1663598030.519:9): avc: denied { create } for pid=3945 comm="syz-executor.1" name="3946" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:kernel_t:s0 tclass=file permissive=1 14:33:50 executing program 0: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000005, 0x32, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f0000000140)) 14:33:50 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmmsg$inet(r0, &(0x7f0000001a00)=[{{&(0x7f00000000c0)={0x2, 0x4e22}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="38000000000000000000000007000000442025000000000000000000000000000000000000000000000000000000000001940400000000001c000000000000000000000008"], 0x58}}, {{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f00000002c0)="c3", 0x1}], 0x1}}], 0x2, 0x8080) sendmmsg$inet(r0, &(0x7f0000000180)=[{{&(0x7f00000000c0), 0x10, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="380000001300b9ee000000004a880000070000e3c413fa3a3b9526ffc130b49cd64bfd202500000000000000000000000000000000000000000000000000000000000104000000000000", @ANYRES32], 0x58}}, {{0x0, 0x0, &(0x7f0000001580), 0x5f}}], 0x2, 0x8080) 14:33:50 executing program 6: syz_io_uring_setup(0x5591, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), 0x0) syz_io_uring_setup(0x3a3d, &(0x7f0000000140), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000bff000/0x400000)=nil, &(0x7f00000001c0), 0x0) syz_io_uring_setup(0x3e5b, &(0x7f0000000100), &(0x7f0000d09000/0x1000)=nil, &(0x7f0000dc2000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x74a8, &(0x7f00000003c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000eb7000/0x2000)=nil, &(0x7f0000000440), &(0x7f00000000c0)) 14:33:50 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5423, &(0x7f0000000040)) 14:33:50 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) 14:33:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3740, &(0x7f0000000700)={0x0, 0x573c}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffff7) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x40000, 0x80) syz_io_uring_setup(0xaaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) 14:33:50 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='mpol=tnterleave=static:15-4', @ANYRESOCT=0x0]) 14:33:50 executing program 5: syz_io_uring_setup(0x5591, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), 0x0) syz_io_uring_setup(0x3a3d, &(0x7f0000000140), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000bff000/0x400000)=nil, &(0x7f00000001c0), 0x0) syz_io_uring_setup(0x3e5b, &(0x7f0000000100), &(0x7f0000d09000/0x1000)=nil, &(0x7f0000dc2000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x74a8, &(0x7f00000003c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000eb7000/0x2000)=nil, &(0x7f0000000440), &(0x7f00000000c0)) [ 130.589966] tmpfs: Bad value for 'mpol' [ 130.594730] audit: type=1400 audit(1663598030.590:10): avc: denied { open } for pid=3957 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 130.596211] audit: type=1400 audit(1663598030.590:11): avc: denied { kernel } for pid=3957 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 130.613844] ------------[ cut here ]------------ [ 130.613866] [ 130.613869] ====================================================== [ 130.613872] WARNING: possible circular locking dependency detected [ 130.613877] 6.0.0-rc6-next-20220919 #1 Not tainted [ 130.613883] ------------------------------------------------------ [ 130.613887] syz-executor.2/3958 is trying to acquire lock: [ 130.613893] ffffffff853fa838 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 130.613932] [ 130.613932] but task is already holding lock: [ 130.613935] ffff88800996ec20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 130.613963] [ 130.613963] which lock already depends on the new lock. [ 130.613963] [ 130.613966] [ 130.613966] the existing dependency chain (in reverse order) is: [ 130.613970] [ 130.613970] -> #3 (&ctx->lock){....}-{2:2}: [ 130.613984] _raw_spin_lock+0x2a/0x40 [ 130.614001] __perf_event_task_sched_out+0x53b/0x18d0 [ 130.614013] __schedule+0xedd/0x2470 [ 130.614024] schedule+0xda/0x1b0 [ 130.614034] exit_to_user_mode_prepare+0x114/0x1a0 [ 130.614054] syscall_exit_to_user_mode+0x19/0x40 [ 130.614072] do_syscall_64+0x48/0x90 [ 130.614086] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 130.614103] [ 130.614103] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 130.614117] _raw_spin_lock_nested+0x30/0x40 [ 130.614132] raw_spin_rq_lock_nested+0x1e/0x30 [ 130.614145] task_fork_fair+0x63/0x4d0 [ 130.614161] sched_cgroup_fork+0x3d0/0x540 [ 130.614175] copy_process+0x4183/0x6e20 [ 130.614186] kernel_clone+0xe7/0x890 [ 130.614196] user_mode_thread+0xad/0xf0 [ 130.614206] rest_init+0x24/0x250 [ 130.614222] arch_call_rest_init+0xf/0x14 [ 130.614238] start_kernel+0x4c1/0x4e6 [ 130.614248] secondary_startup_64_no_verify+0xe0/0xeb [ 130.614262] [ 130.614262] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 130.614276] _raw_spin_lock_irqsave+0x39/0x60 [ 130.614291] try_to_wake_up+0xab/0x1920 [ 130.614304] up+0x75/0xb0 [ 130.614315] __up_console_sem+0x6e/0x80 [ 130.614331] console_unlock+0x46a/0x590 [ 130.614346] vt_ioctl+0x2822/0x2ca0 [ 130.614359] tty_ioctl+0x7c4/0x1700 [ 130.614370] __x64_sys_ioctl+0x19a/0x210 [ 130.614386] do_syscall_64+0x3b/0x90 [ 130.614399] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 130.614416] [ 130.614416] -> #0 ((console_sem).lock){....}-{2:2}: [ 130.614430] __lock_acquire+0x2a02/0x5e70 [ 130.614446] lock_acquire+0x1a2/0x530 [ 130.614461] _raw_spin_lock_irqsave+0x39/0x60 [ 130.614476] down_trylock+0xe/0x70 [ 130.614487] __down_trylock_console_sem+0x3b/0xd0 [ 130.614503] vprintk_emit+0x16b/0x560 [ 130.614519] vprintk+0x84/0xa0 [ 130.614534] _printk+0xba/0xf1 [ 130.614552] report_bug.cold+0x72/0xab [ 130.614564] handle_bug+0x3c/0x70 [ 130.614577] exc_invalid_op+0x14/0x50 [ 130.614590] asm_exc_invalid_op+0x16/0x20 [ 130.614606] group_sched_out.part.0+0x2c7/0x460 [ 130.614616] ctx_sched_out+0x8f1/0xc10 [ 130.614626] __perf_event_task_sched_out+0x6d0/0x18d0 [ 130.614638] __schedule+0xedd/0x2470 [ 130.614648] schedule+0xda/0x1b0 [ 130.614657] exit_to_user_mode_prepare+0x114/0x1a0 [ 130.614675] syscall_exit_to_user_mode+0x19/0x40 [ 130.614692] do_syscall_64+0x48/0x90 [ 130.614705] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 130.614722] [ 130.614722] other info that might help us debug this: [ 130.614722] [ 130.614724] Chain exists of: [ 130.614724] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 130.614724] [ 130.614739] Possible unsafe locking scenario: [ 130.614739] [ 130.614742] CPU0 CPU1 [ 130.614744] ---- ---- [ 130.614747] lock(&ctx->lock); [ 130.614752] lock(&rq->__lock); [ 130.614759] lock(&ctx->lock); [ 130.614765] lock((console_sem).lock); [ 130.614770] [ 130.614770] *** DEADLOCK *** [ 130.614770] [ 130.614772] 2 locks held by syz-executor.2/3958: [ 130.614779] #0: ffff88806cf37d18 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 130.614805] #1: ffff88800996ec20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 130.614832] [ 130.614832] stack backtrace: [ 130.614835] CPU: 1 PID: 3958 Comm: syz-executor.2 Not tainted 6.0.0-rc6-next-20220919 #1 [ 130.614848] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 130.614856] Call Trace: [ 130.614860] [ 130.614864] dump_stack_lvl+0x8b/0xb3 [ 130.614879] check_noncircular+0x263/0x2e0 [ 130.614895] ? format_decode+0x26c/0xb50 [ 130.614911] ? print_circular_bug+0x450/0x450 [ 130.614927] ? enable_ptr_key_workfn+0x20/0x20 [ 130.614942] ? format_decode+0x26c/0xb50 [ 130.614958] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 130.614975] __lock_acquire+0x2a02/0x5e70 [ 130.614996] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 130.615018] lock_acquire+0x1a2/0x530 [ 130.615034] ? down_trylock+0xe/0x70 [ 130.615048] ? lock_release+0x750/0x750 [ 130.615068] ? vprintk+0x84/0xa0 [ 130.615086] _raw_spin_lock_irqsave+0x39/0x60 [ 130.615101] ? down_trylock+0xe/0x70 [ 130.615114] down_trylock+0xe/0x70 [ 130.615127] ? vprintk+0x84/0xa0 [ 130.615143] __down_trylock_console_sem+0x3b/0xd0 [ 130.615160] vprintk_emit+0x16b/0x560 [ 130.615179] vprintk+0x84/0xa0 [ 130.615196] _printk+0xba/0xf1 [ 130.615213] ? record_print_text.cold+0x16/0x16 [ 130.615235] ? report_bug.cold+0x66/0xab [ 130.615249] ? group_sched_out.part.0+0x2c7/0x460 [ 130.615260] report_bug.cold+0x72/0xab [ 130.615275] handle_bug+0x3c/0x70 [ 130.615289] exc_invalid_op+0x14/0x50 [ 130.615303] asm_exc_invalid_op+0x16/0x20 [ 130.615320] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 130.615333] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d 5b 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 130.615345] RSP: 0018:ffff8880409ffc48 EFLAGS: 00010006 [ 130.615354] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 130.615362] RDX: ffff88801d9e8000 RSI: ffffffff81566077 RDI: 0000000000000005 [ 130.615370] RBP: ffff88803fe30000 R08: 0000000000000005 R09: 0000000000000001 [ 130.615378] R10: 0000000000000000 R11: ffffffff865ac05b R12: ffff88800996ec00 [ 130.615386] R13: ffff88806cf3d140 R14: ffffffff8547c620 R15: 0000000000000002 [ 130.615406] ? group_sched_out.part.0+0x2c7/0x460 [ 130.615419] ? group_sched_out.part.0+0x2c7/0x460 [ 130.615432] ctx_sched_out+0x8f1/0xc10 [ 130.615444] __perf_event_task_sched_out+0x6d0/0x18d0 [ 130.615459] ? lock_is_held_type+0xd7/0x130 [ 130.615477] ? __perf_cgroup_move+0x160/0x160 [ 130.615489] ? set_next_entity+0x304/0x550 [ 130.615506] ? update_curr+0x267/0x740 [ 130.615524] ? lock_is_held_type+0xd7/0x130 [ 130.615543] __schedule+0xedd/0x2470 [ 130.615556] ? io_schedule_timeout+0x150/0x150 [ 130.615568] ? trace_rcu_dyntick+0x1a7/0x250 [ 130.615590] schedule+0xda/0x1b0 [ 130.615601] exit_to_user_mode_prepare+0x114/0x1a0 [ 130.615621] syscall_exit_to_user_mode+0x19/0x40 [ 130.615639] do_syscall_64+0x48/0x90 [ 130.615653] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 130.615670] RIP: 0033:0x7f5dfc186b19 [ 130.615679] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 130.615690] RSP: 002b:00007f5df96fc218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 130.615701] RAX: 0000000000000001 RBX: 00007f5dfc299f68 RCX: 00007f5dfc186b19 [ 130.615708] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f5dfc299f6c [ 130.615716] RBP: 00007f5dfc299f60 R08: 000000000000000e R09: 0000000000000000 [ 130.615723] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f5dfc299f6c [ 130.615731] R13: 00007ffffe917aff R14: 00007f5df96fc300 R15: 0000000000022000 [ 130.615744] [ 130.672073] WARNING: CPU: 1 PID: 3958 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 130.672762] Modules linked in: [ 130.673004] CPU: 1 PID: 3958 Comm: syz-executor.2 Not tainted 6.0.0-rc6-next-20220919 #1 [ 130.673597] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 130.674423] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 130.674837] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d 5b 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 130.676192] RSP: 0018:ffff8880409ffc48 EFLAGS: 00010006 [ 130.676589] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 130.677119] RDX: ffff88801d9e8000 RSI: ffffffff81566077 RDI: 0000000000000005 [ 130.677649] RBP: ffff88803fe30000 R08: 0000000000000005 R09: 0000000000000001 [ 130.678175] R10: 0000000000000000 R11: ffffffff865ac05b R12: ffff88800996ec00 [ 130.678708] R13: ffff88806cf3d140 R14: ffffffff8547c620 R15: 0000000000000002 [ 130.679241] FS: 00007f5df96fc700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 130.679881] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 130.680331] CR2: 00007f0485a2955c CR3: 000000004031a000 CR4: 0000000000350ee0 [ 130.680860] Call Trace: [ 130.681053] [ 130.681231] ctx_sched_out+0x8f1/0xc10 [ 130.681528] __perf_event_task_sched_out+0x6d0/0x18d0 [ 130.681936] ? lock_is_held_type+0xd7/0x130 [ 130.682282] ? __perf_cgroup_move+0x160/0x160 [ 130.682627] ? set_next_entity+0x304/0x550 [ 130.682953] ? update_curr+0x267/0x740 [ 130.683258] ? lock_is_held_type+0xd7/0x130 [ 130.683599] __schedule+0xedd/0x2470 [ 130.683886] ? io_schedule_timeout+0x150/0x150 [ 130.684230] ? trace_rcu_dyntick+0x1a7/0x250 [ 130.684579] schedule+0xda/0x1b0 [ 130.684840] exit_to_user_mode_prepare+0x114/0x1a0 [ 130.685214] syscall_exit_to_user_mode+0x19/0x40 [ 130.685579] do_syscall_64+0x48/0x90 [ 130.685872] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 130.686279] RIP: 0033:0x7f5dfc186b19 [ 130.686579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 130.687960] RSP: 002b:00007f5df96fc218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 130.688519] RAX: 0000000000000001 RBX: 00007f5dfc299f68 RCX: 00007f5dfc186b19 [ 130.689046] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f5dfc299f6c [ 130.689566] RBP: 00007f5dfc299f60 R08: 000000000000000e R09: 0000000000000000 [ 130.690089] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f5dfc299f6c [ 130.690621] R13: 00007ffffe917aff R14: 00007f5df96fc300 R15: 0000000000022000 [ 130.691155] [ 130.691326] irq event stamp: 662 [ 130.691588] hardirqs last enabled at (661): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 130.692281] hardirqs last disabled at (662): [] __schedule+0x1225/0x2470 [ 130.692885] softirqs last enabled at (66): [] __irq_exit_rcu+0x11b/0x180 [ 130.693500] softirqs last disabled at (35): [] __irq_exit_rcu+0x11b/0x180 [ 130.694117] ---[ end trace 0000000000000000 ]--- 14:33:50 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) 14:33:50 executing program 0: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000005, 0x32, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f0000000140)) 14:33:50 executing program 3: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) 14:33:50 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='mpol=tnterleave=static:15-4', @ANYRESOCT=0x0]) 14:33:50 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000140), &(0x7f0000000180)=0x4) 14:33:50 executing program 5: syz_io_uring_setup(0x5591, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), 0x0) syz_io_uring_setup(0x3a3d, &(0x7f0000000140), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000bff000/0x400000)=nil, &(0x7f00000001c0), 0x0) syz_io_uring_setup(0x3e5b, &(0x7f0000000100), &(0x7f0000d09000/0x1000)=nil, &(0x7f0000dc2000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x74a8, &(0x7f00000003c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000eb7000/0x2000)=nil, &(0x7f0000000440), &(0x7f00000000c0)) 14:33:50 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmmsg$inet(r0, &(0x7f0000001a00)=[{{&(0x7f00000000c0)={0x2, 0x4e22}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="38000000000000000000000007000000442025000000000000000000000000000000000000000000000000000000000001940400000000001c000000000000000000000008"], 0x58}}, {{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f00000002c0)="c3", 0x1}], 0x1}}], 0x2, 0x8080) sendmmsg$inet(r0, &(0x7f0000000180)=[{{&(0x7f00000000c0), 0x10, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="380000001300b9ee000000004a880000070000e3c413fa3a3b9526ffc130b49cd64bfd202500000000000000000000000000000000000000000000000000000000000104000000000000", @ANYRES32], 0x58}}, {{0x0, 0x0, &(0x7f0000001580), 0x5f}}], 0x2, 0x8080) 14:33:50 executing program 0: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000005, 0x32, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f0000000140)) 14:33:50 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmmsg$inet(r0, &(0x7f0000001a00)=[{{&(0x7f00000000c0)={0x2, 0x4e22}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="38000000000000000000000007000000442025000000000000000000000000000000000000000000000000000000000001940400000000001c000000000000000000000008"], 0x58}}, {{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f00000002c0)="c3", 0x1}], 0x1}}], 0x2, 0x8080) sendmmsg$inet(r0, &(0x7f0000000180)=[{{&(0x7f00000000c0), 0x10, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="380000001300b9ee000000004a880000070000e3c413fa3a3b9526ffc130b49cd64bfd202500000000000000000000000000000000000000000000000000000000000104000000000000", @ANYRES32], 0x58}}, {{0x0, 0x0, &(0x7f0000001580), 0x5f}}], 0x2, 0x8080) [ 130.799167] tmpfs: Bad value for 'mpol' 14:33:50 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) 14:33:50 executing program 6: syz_io_uring_setup(0x5591, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), 0x0) syz_io_uring_setup(0x3a3d, &(0x7f0000000140), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000bff000/0x400000)=nil, &(0x7f00000001c0), 0x0) syz_io_uring_setup(0x3e5b, &(0x7f0000000100), &(0x7f0000d09000/0x1000)=nil, &(0x7f0000dc2000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x74a8, &(0x7f00000003c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000eb7000/0x2000)=nil, &(0x7f0000000440), &(0x7f00000000c0)) [ 130.920086] tmpfs: Bad value for 'mpol' 14:33:50 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='mpol=tnterleave=static:15-4', @ANYRESOCT=0x0]) 14:33:50 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmmsg$inet(r0, &(0x7f0000001a00)=[{{&(0x7f00000000c0)={0x2, 0x4e22}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="38000000000000000000000007000000442025000000000000000000000000000000000000000000000000000000000001940400000000001c000000000000000000000008"], 0x58}}, {{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f00000002c0)="c3", 0x1}], 0x1}}], 0x2, 0x8080) sendmmsg$inet(r0, &(0x7f0000000180)=[{{&(0x7f00000000c0), 0x10, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="380000001300b9ee000000004a880000070000e3c413fa3a3b9526ffc130b49cd64bfd202500000000000000000000000000000000000000000000000000000000000104000000000000", @ANYRES32], 0x58}}, {{0x0, 0x0, &(0x7f0000001580), 0x5f}}], 0x2, 0x8080) 14:33:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3740, &(0x7f0000000700)={0x0, 0x573c}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffff7) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x40000, 0x80) syz_io_uring_setup(0xaaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) 14:33:50 executing program 5: syz_io_uring_setup(0x5591, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), 0x0) syz_io_uring_setup(0x3a3d, &(0x7f0000000140), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000bff000/0x400000)=nil, &(0x7f00000001c0), 0x0) syz_io_uring_setup(0x3e5b, &(0x7f0000000100), &(0x7f0000d09000/0x1000)=nil, &(0x7f0000dc2000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x74a8, &(0x7f00000003c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000eb7000/0x2000)=nil, &(0x7f0000000440), &(0x7f00000000c0)) 14:33:50 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmmsg$inet(r0, &(0x7f0000001a00)=[{{&(0x7f00000000c0)={0x2, 0x4e22}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="38000000000000000000000007000000442025000000000000000000000000000000000000000000000000000000000001940400000000001c000000000000000000000008"], 0x58}}, {{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f00000002c0)="c3", 0x1}], 0x1}}], 0x2, 0x8080) sendmmsg$inet(r0, &(0x7f0000000180)=[{{&(0x7f00000000c0), 0x10, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="380000001300b9ee000000004a880000070000e3c413fa3a3b9526ffc130b49cd64bfd202500000000000000000000000000000000000000000000000000000000000104000000000000", @ANYRES32], 0x58}}, {{0x0, 0x0, &(0x7f0000001580), 0x5f}}], 0x2, 0x8080) 14:33:50 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmmsg$inet(r0, &(0x7f0000001a00)=[{{&(0x7f00000000c0)={0x2, 0x4e22}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="38000000000000000000000007000000442025000000000000000000000000000000000000000000000000000000000001940400000000001c000000000000000000000008"], 0x58}}, {{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f00000002c0)="c3", 0x1}], 0x1}}], 0x2, 0x8080) sendmmsg$inet(r0, &(0x7f0000000180)=[{{&(0x7f00000000c0), 0x10, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="380000001300b9ee000000004a880000070000e3c413fa3a3b9526ffc130b49cd64bfd202500000000000000000000000000000000000000000000000000000000000104000000000000", @ANYRES32], 0x58}}, {{0x0, 0x0, &(0x7f0000001580), 0x5f}}], 0x2, 0x8080) 14:33:50 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3740, &(0x7f0000000700)={0x0, 0x573c}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffff7) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x40000, 0x80) syz_io_uring_setup(0xaaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) 14:33:51 executing program 6: syz_io_uring_setup(0x5591, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), 0x0) syz_io_uring_setup(0x3a3d, &(0x7f0000000140), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000bff000/0x400000)=nil, &(0x7f00000001c0), 0x0) syz_io_uring_setup(0x3e5b, &(0x7f0000000100), &(0x7f0000d09000/0x1000)=nil, &(0x7f0000dc2000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x74a8, &(0x7f00000003c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000eb7000/0x2000)=nil, &(0x7f0000000440), &(0x7f00000000c0)) 14:33:51 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmmsg$inet(r0, &(0x7f0000001a00)=[{{&(0x7f00000000c0)={0x2, 0x4e22}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="38000000000000000000000007000000442025000000000000000000000000000000000000000000000000000000000001940400000000001c000000000000000000000008"], 0x58}}, {{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f00000002c0)="c3", 0x1}], 0x1}}], 0x2, 0x8080) sendmmsg$inet(r0, &(0x7f0000000180)=[{{&(0x7f00000000c0), 0x10, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="380000001300b9ee000000004a880000070000e3c413fa3a3b9526ffc130b49cd64bfd202500000000000000000000000000000000000000000000000000000000000104000000000000", @ANYRES32], 0x58}}, {{0x0, 0x0, &(0x7f0000001580), 0x5f}}], 0x2, 0x8080) 14:33:51 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3740, &(0x7f0000000700)={0x0, 0x573c}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffff7) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x40000, 0x80) syz_io_uring_setup(0xaaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) 14:33:51 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3740, &(0x7f0000000700)={0x0, 0x573c}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffff7) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x40000, 0x80) syz_io_uring_setup(0xaaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) 14:33:51 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3740, &(0x7f0000000700)={0x0, 0x573c}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffff7) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x40000, 0x80) syz_io_uring_setup(0xaaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) 14:33:51 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3740, &(0x7f0000000700)={0x0, 0x573c}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffff7) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x40000, 0x80) syz_io_uring_setup(0xaaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) 14:33:51 executing program 4: time(&(0x7f0000001940)) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x3f, 0x2, 0xb7, 0x20, 0x0, 0xaa8, 0x10000, 0xc, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40008000, 0x0, @perf_config_ext={0x401, 0x35}, 0x25, 0x5, 0x7, 0x9, 0xc5d, 0x3, 0x0, 0x0, 0x5, 0x0, 0x28a}, 0xffffffffffffffff, 0x5, r0, 0x1a) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000023c0)={0x28, 0x12, 0x0, 0x101, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x1c, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}]}, 0x28}}, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000, 0xffffffffffff0000}, 0x0, 0x0, 0x3, 0x0, 0x0, 0xff, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) dup2(r5, r4) io_submit(r2, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f00000001c0)=')', 0x1}]) syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') ioctl$HIDIOCGVERSION(r3, 0x80044801, &(0x7f0000000180)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) 14:33:51 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/raw\x00') read$hidraw(r0, &(0x7f0000000400)=""/4096, 0x1000) 14:33:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000002c0)={0x4, {{0x2, 0x0, @multicast1}}, 0x1, 0x2, [{{0x2, 0x0, @private}}, {{0x2, 0x0, @remote}}]}, 0x190) 14:33:51 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3740, &(0x7f0000000700)={0x0, 0x573c}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffff7) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x40000, 0x80) syz_io_uring_setup(0xaaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) 14:33:51 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3740, &(0x7f0000000700)={0x0, 0x573c}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffff7) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x40000, 0x80) syz_io_uring_setup(0xaaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) 14:33:51 executing program 6: syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) 14:33:51 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/raw\x00') read$hidraw(r0, &(0x7f0000000400)=""/4096, 0x1000) [ 131.290096] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 131.291029] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 131.291614] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 131.292142] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 131.292724] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 4 prio class 2 [ 131.295142] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.295642] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 131.296316] Buffer I/O error on dev sr0, logical block 0, async page read [ 131.297172] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.297595] I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 131.298425] Buffer I/O error on dev sr0, logical block 1, async page read [ 131.299188] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.299631] I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 131.300324] Buffer I/O error on dev sr0, logical block 2, async page read [ 131.301052] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.301485] I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 131.302104] Buffer I/O error on dev sr0, logical block 3, async page read 14:33:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000002c0)={0x4, {{0x2, 0x0, @multicast1}}, 0x1, 0x2, [{{0x2, 0x0, @private}}, {{0x2, 0x0, @remote}}]}, 0x190) [ 131.303918] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.304381] I/O error, dev sr0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 131.305047] Buffer I/O error on dev sr0, logical block 4, async page read [ 131.305776] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.306191] I/O error, dev sr0, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 131.306821] Buffer I/O error on dev sr0, logical block 5, async page read [ 131.307578] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.307999] I/O error, dev sr0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 131.308669] Buffer I/O error on dev sr0, logical block 6, async page read [ 131.309895] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.310364] I/O error, dev sr0, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 131.310966] Buffer I/O error on dev sr0, logical block 7, async page read 14:33:51 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3740, &(0x7f0000000700)={0x0, 0x573c}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffff7) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x40000, 0x80) syz_io_uring_setup(0xaaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) [ 131.406704] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 131.407896] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 131.408430] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 131.408923] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 131.409495] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 3 prio class 2 [ 131.410646] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.411087] Buffer I/O error on dev sr0, logical block 0, async page read [ 131.411681] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.412068] Buffer I/O error on dev sr0, logical block 1, async page read [ 131.412616] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.413097] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.413567] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.413995] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.414492] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.414921] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 14:33:51 executing program 6: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:33:51 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3740, &(0x7f0000000700)={0x0, 0x573c}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffff7) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x40000, 0x80) syz_io_uring_setup(0xaaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) 14:33:51 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/raw\x00') read$hidraw(r0, &(0x7f0000000400)=""/4096, 0x1000) [ 131.466244] loop6: detected capacity change from 0 to 5 [ 131.472962] ======================================================= [ 131.472962] WARNING: The mand mount option has been deprecated and [ 131.472962] and is ignored by this kernel. Remove the mand [ 131.472962] option from the mount to silence this warning. [ 131.472962] ======================================================= [ 131.540162] loop6: detected capacity change from 0 to 5 14:33:51 executing program 4: time(&(0x7f0000001940)) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x3f, 0x2, 0xb7, 0x20, 0x0, 0xaa8, 0x10000, 0xc, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40008000, 0x0, @perf_config_ext={0x401, 0x35}, 0x25, 0x5, 0x7, 0x9, 0xc5d, 0x3, 0x0, 0x0, 0x5, 0x0, 0x28a}, 0xffffffffffffffff, 0x5, r0, 0x1a) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000023c0)={0x28, 0x12, 0x0, 0x101, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x1c, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}]}, 0x28}}, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000, 0xffffffffffff0000}, 0x0, 0x0, 0x3, 0x0, 0x0, 0xff, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) dup2(r5, r4) io_submit(r2, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f00000001c0)=')', 0x1}]) syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') ioctl$HIDIOCGVERSION(r3, 0x80044801, &(0x7f0000000180)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) 14:33:51 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3740, &(0x7f0000000700)={0x0, 0x573c}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffff7) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x40000, 0x80) syz_io_uring_setup(0xaaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) 14:33:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000002c0)={0x4, {{0x2, 0x0, @multicast1}}, 0x1, 0x2, [{{0x2, 0x0, @private}}, {{0x2, 0x0, @remote}}]}, 0x190) 14:33:51 executing program 2: time(&(0x7f0000001940)) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x3f, 0x2, 0xb7, 0x20, 0x0, 0xaa8, 0x10000, 0xc, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40008000, 0x0, @perf_config_ext={0x401, 0x35}, 0x25, 0x5, 0x7, 0x9, 0xc5d, 0x3, 0x0, 0x0, 0x5, 0x0, 0x28a}, 0xffffffffffffffff, 0x5, r0, 0x1a) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000023c0)={0x28, 0x12, 0x0, 0x101, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x1c, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}]}, 0x28}}, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000, 0xffffffffffff0000}, 0x0, 0x0, 0x3, 0x0, 0x0, 0xff, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) dup2(r5, r4) io_submit(r2, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f00000001c0)=')', 0x1}]) syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') ioctl$HIDIOCGVERSION(r3, 0x80044801, &(0x7f0000000180)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) 14:33:51 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/raw\x00') read$hidraw(r0, &(0x7f0000000400)=""/4096, 0x1000) 14:33:51 executing program 6: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:33:51 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3740, &(0x7f0000000700)={0x0, 0x573c}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffff7) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x40000, 0x80) syz_io_uring_setup(0xaaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) [ 131.625993] loop6: detected capacity change from 0 to 5 14:33:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000002c0)={0x4, {{0x2, 0x0, @multicast1}}, 0x1, 0x2, [{{0x2, 0x0, @private}}, {{0x2, 0x0, @remote}}]}, 0x190) [ 131.660855] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 131.661647] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 131.662177] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 131.662700] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 131.664082] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.664733] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.666488] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.667086] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.667784] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.668431] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.669045] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.669707] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.672158] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.672880] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.673703] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.674342] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.674947] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.675578] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.676567] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.677148] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 14:33:51 executing program 3: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:33:51 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 131.709014] loop3: detected capacity change from 0 to 5 [ 131.712184] loop1: detected capacity change from 0 to 5 14:33:51 executing program 4: time(&(0x7f0000001940)) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x3f, 0x2, 0xb7, 0x20, 0x0, 0xaa8, 0x10000, 0xc, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40008000, 0x0, @perf_config_ext={0x401, 0x35}, 0x25, 0x5, 0x7, 0x9, 0xc5d, 0x3, 0x0, 0x0, 0x5, 0x0, 0x28a}, 0xffffffffffffffff, 0x5, r0, 0x1a) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000023c0)={0x28, 0x12, 0x0, 0x101, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x1c, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}]}, 0x28}}, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000, 0xffffffffffff0000}, 0x0, 0x0, 0x3, 0x0, 0x0, 0xff, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) dup2(r5, r4) io_submit(r2, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f00000001c0)=')', 0x1}]) syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') ioctl$HIDIOCGVERSION(r3, 0x80044801, &(0x7f0000000180)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) [ 131.764191] loop5: detected capacity change from 0 to 5 14:33:51 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:33:51 executing program 2: time(&(0x7f0000001940)) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x3f, 0x2, 0xb7, 0x20, 0x0, 0xaa8, 0x10000, 0xc, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40008000, 0x0, @perf_config_ext={0x401, 0x35}, 0x25, 0x5, 0x7, 0x9, 0xc5d, 0x3, 0x0, 0x0, 0x5, 0x0, 0x28a}, 0xffffffffffffffff, 0x5, r0, 0x1a) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000023c0)={0x28, 0x12, 0x0, 0x101, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x1c, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}]}, 0x28}}, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000, 0xffffffffffff0000}, 0x0, 0x0, 0x3, 0x0, 0x0, 0xff, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) dup2(r5, r4) io_submit(r2, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f00000001c0)=')', 0x1}]) syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') ioctl$HIDIOCGVERSION(r3, 0x80044801, &(0x7f0000000180)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) 14:33:51 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 131.797083] loop1: detected capacity change from 0 to 5 14:33:51 executing program 3: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 131.819217] loop3: detected capacity change from 0 to 5 14:33:51 executing program 6: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 131.843826] loop7: detected capacity change from 0 to 5 [ 131.845801] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 131.846622] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 131.847131] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 131.847650] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 131.848889] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.849537] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.850052] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 14:33:51 executing program 0: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:33:51 executing program 7: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 131.850788] loop0: detected capacity change from 0 to 5 [ 131.851488] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.852025] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.853744] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.854319] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.854875] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.855918] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.856524] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.857119] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.857927] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.858493] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.859077] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.859686] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.861727] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.893334] loop6: detected capacity change from 0 to 5 14:33:51 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 131.989110] loop3: detected capacity change from 0 to 5 [ 131.989133] loop5: detected capacity change from 0 to 5 14:33:51 executing program 4: time(&(0x7f0000001940)) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x3f, 0x2, 0xb7, 0x20, 0x0, 0xaa8, 0x10000, 0xc, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40008000, 0x0, @perf_config_ext={0x401, 0x35}, 0x25, 0x5, 0x7, 0x9, 0xc5d, 0x3, 0x0, 0x0, 0x5, 0x0, 0x28a}, 0xffffffffffffffff, 0x5, r0, 0x1a) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000023c0)={0x28, 0x12, 0x0, 0x101, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x1c, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}]}, 0x28}}, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000, 0xffffffffffff0000}, 0x0, 0x0, 0x3, 0x0, 0x0, 0xff, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) dup2(r5, r4) io_submit(r2, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f00000001c0)=')', 0x1}]) syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') ioctl$HIDIOCGVERSION(r3, 0x80044801, &(0x7f0000000180)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) 14:33:51 executing program 3: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:33:51 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:33:51 executing program 0: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 132.002964] loop1: detected capacity change from 0 to 5 [ 132.005691] loop6: detected capacity change from 0 to 5 [ 132.006854] loop7: detected capacity change from 0 to 5 14:33:51 executing program 7: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:33:51 executing program 6: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:33:52 executing program 2: time(&(0x7f0000001940)) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x3f, 0x2, 0xb7, 0x20, 0x0, 0xaa8, 0x10000, 0xc, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40008000, 0x0, @perf_config_ext={0x401, 0x35}, 0x25, 0x5, 0x7, 0x9, 0xc5d, 0x3, 0x0, 0x0, 0x5, 0x0, 0x28a}, 0xffffffffffffffff, 0x5, r0, 0x1a) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000023c0)={0x28, 0x12, 0x0, 0x101, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x1c, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}]}, 0x28}}, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000, 0xffffffffffff0000}, 0x0, 0x0, 0x3, 0x0, 0x0, 0xff, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) dup2(r5, r4) io_submit(r2, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f00000001c0)=')', 0x1}]) syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') ioctl$HIDIOCGVERSION(r3, 0x80044801, &(0x7f0000000180)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) [ 132.028206] loop0: detected capacity change from 0 to 5 [ 132.071757] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 132.072462] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 132.072957] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 132.073636] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 132.074878] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.075566] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.076109] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.076683] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.077219] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.077804] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.078972] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.079568] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.080135] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.080735] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.081298] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.084418] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.084997] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.085606] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.086159] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.087344] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 14:33:52 executing program 0: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:33:52 executing program 7: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 132.147220] loop5: detected capacity change from 0 to 5 [ 132.152348] loop0: detected capacity change from 0 to 5 14:33:52 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 132.158032] loop7: detected capacity change from 0 to 5 14:33:52 executing program 3: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 132.174984] loop3: detected capacity change from 0 to 5 14:33:52 executing program 3: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:33:52 executing program 6: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:33:52 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) [ 132.248253] loop1: detected capacity change from 0 to 5 [ 132.248824] loop6: detected capacity change from 0 to 5 [ 132.267007] loop3: detected capacity change from 0 to 5 14:33:52 executing program 2: time(&(0x7f0000001940)) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x3f, 0x2, 0xb7, 0x20, 0x0, 0xaa8, 0x10000, 0xc, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40008000, 0x0, @perf_config_ext={0x401, 0x35}, 0x25, 0x5, 0x7, 0x9, 0xc5d, 0x3, 0x0, 0x0, 0x5, 0x0, 0x28a}, 0xffffffffffffffff, 0x5, r0, 0x1a) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000023c0)={0x28, 0x12, 0x0, 0x101, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x1c, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}]}, 0x28}}, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000, 0xffffffffffff0000}, 0x0, 0x0, 0x3, 0x0, 0x0, 0xff, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) dup2(r5, r4) io_submit(r2, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f00000001c0)=')', 0x1}]) syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') ioctl$HIDIOCGVERSION(r3, 0x80044801, &(0x7f0000000180)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) 14:33:52 executing program 4: time(&(0x7f0000001940)) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x3f, 0x2, 0xb7, 0x20, 0x0, 0xaa8, 0x10000, 0xc, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40008000, 0x0, @perf_config_ext={0x401, 0x35}, 0x25, 0x5, 0x7, 0x9, 0xc5d, 0x3, 0x0, 0x0, 0x5, 0x0, 0x28a}, 0xffffffffffffffff, 0x5, r0, 0x1a) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000023c0)={0x28, 0x12, 0x0, 0x101, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x1c, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}]}, 0x28}}, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000, 0xffffffffffff0000}, 0x0, 0x0, 0x3, 0x0, 0x0, 0xff, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) dup2(r5, r4) io_submit(r2, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f00000001c0)=')', 0x1}]) syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') ioctl$HIDIOCGVERSION(r3, 0x80044801, &(0x7f0000000180)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) 14:33:52 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]}) openat(r0, 0x0, 0x0, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f00000001c0)='./file0\x00') renameat(r2, &(0x7f0000000140)='./file0/file0\x00', r2, &(0x7f0000000180)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r2, 0x2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(r4, r3) 14:33:52 executing program 5: time(&(0x7f0000001940)) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x3f, 0x2, 0xb7, 0x20, 0x0, 0xaa8, 0x10000, 0xc, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40008000, 0x0, @perf_config_ext={0x401, 0x35}, 0x25, 0x5, 0x7, 0x9, 0xc5d, 0x3, 0x0, 0x0, 0x5, 0x0, 0x28a}, 0xffffffffffffffff, 0x5, r0, 0x1a) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000023c0)={0x28, 0x12, 0x0, 0x101, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x1c, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}]}, 0x28}}, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000, 0xffffffffffff0000}, 0x0, 0x0, 0x3, 0x0, 0x0, 0xff, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) dup2(r5, r4) io_submit(r2, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f00000001c0)=')', 0x1}]) syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') ioctl$HIDIOCGVERSION(r3, 0x80044801, &(0x7f0000000180)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) 14:33:52 executing program 7: time(&(0x7f0000001940)) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x3f, 0x2, 0xb7, 0x20, 0x0, 0xaa8, 0x10000, 0xc, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40008000, 0x0, @perf_config_ext={0x401, 0x35}, 0x25, 0x5, 0x7, 0x9, 0xc5d, 0x3, 0x0, 0x0, 0x5, 0x0, 0x28a}, 0xffffffffffffffff, 0x5, r0, 0x1a) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000023c0)={0x28, 0x12, 0x0, 0x101, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x1c, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}]}, 0x28}}, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000, 0xffffffffffff0000}, 0x0, 0x0, 0x3, 0x0, 0x0, 0xff, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) dup2(r5, r4) io_submit(r2, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f00000001c0)=')', 0x1}]) syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') ioctl$HIDIOCGVERSION(r3, 0x80044801, &(0x7f0000000180)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) 14:33:52 executing program 0: time(&(0x7f0000001940)) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x3f, 0x2, 0xb7, 0x20, 0x0, 0xaa8, 0x10000, 0xc, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40008000, 0x0, @perf_config_ext={0x401, 0x35}, 0x25, 0x5, 0x7, 0x9, 0xc5d, 0x3, 0x0, 0x0, 0x5, 0x0, 0x28a}, 0xffffffffffffffff, 0x5, r0, 0x1a) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000023c0)={0x28, 0x12, 0x0, 0x101, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x1c, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}]}, 0x28}}, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000, 0xffffffffffff0000}, 0x0, 0x0, 0x3, 0x0, 0x0, 0xff, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) dup2(r5, r4) io_submit(r2, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f00000001c0)=')', 0x1}]) syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') ioctl$HIDIOCGVERSION(r3, 0x80044801, &(0x7f0000000180)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) 14:33:52 executing program 6: r0 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400 VM DIAGNOSIS: 14:33:50 Registers: info registers vcpu 0 RAX=0000000000000001 RBX=000000000000c350 RCX=ffffffff81370ead RDX=ffff888019eb8000 RSI=0000000000000000 RDI=0000000000000001 RBP=1ffff110040f6fad RSP=ffff8880207b7d58 R8 =0000000000000001 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=00000000000f4240 R13=0000000000000001 R14=0000000000000000 R15=ffff8880207b7d98 RIP=ffffffff81370eb1 RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555556a2c400 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2da24000 CR3=000000000d61c000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000061 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b2e71 RDI=ffffffff87641ba0 RBP=ffffffff87641b60 RSP=ffff8880409ff698 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000061 R11=0000000000000001 R12=0000000000000061 R13=ffffffff87641b60 R14=0000000000000010 R15=ffffffff822b2e60 RIP=ffffffff822b2ec9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f5df96fc700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f0485a2955c CR3=000000004031a000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f5dfc26d7c0 00007f5dfc26d7c8 YMM02=0000000000000000 0000000000000000 00007f5dfc26d7e0 00007f5dfc26d7c0 YMM03=0000000000000000 0000000000000000 00007f5dfc26d7c8 00007f5dfc26d7c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000