Warning: Permanently added '[localhost]:50748' (ECDSA) to the list of known hosts. 2022/09/20 13:04:25 fuzzer started 2022/09/20 13:04:25 dialing manager at localhost:34957 syzkaller login: [ 44.204832] cgroup: Unknown subsys name 'net' [ 44.302605] cgroup: Unknown subsys name 'rlimit' 2022/09/20 13:04:38 syscalls: 2215 2022/09/20 13:04:38 code coverage: enabled 2022/09/20 13:04:38 comparison tracing: enabled 2022/09/20 13:04:38 extra coverage: enabled 2022/09/20 13:04:38 setuid sandbox: enabled 2022/09/20 13:04:38 namespace sandbox: enabled 2022/09/20 13:04:38 Android sandbox: enabled 2022/09/20 13:04:38 fault injection: enabled 2022/09/20 13:04:38 leak checking: enabled 2022/09/20 13:04:38 net packet injection: enabled 2022/09/20 13:04:38 net device setup: enabled 2022/09/20 13:04:38 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/20 13:04:38 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/20 13:04:38 USB emulation: enabled 2022/09/20 13:04:38 hci packet injection: enabled 2022/09/20 13:04:38 wifi device emulation: failed to parse kernel version (6.0.0-rc6-next-20220920) 2022/09/20 13:04:38 802.15.4 emulation: enabled 2022/09/20 13:04:38 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/20 13:04:38 fetching corpus: 50, signal 20756/24368 (executing program) 2022/09/20 13:04:39 fetching corpus: 100, signal 35820/40829 (executing program) 2022/09/20 13:04:39 fetching corpus: 150, signal 47980/54256 (executing program) 2022/09/20 13:04:39 fetching corpus: 200, signal 57985/65329 (executing program) 2022/09/20 13:04:39 fetching corpus: 250, signal 66429/74774 (executing program) 2022/09/20 13:04:39 fetching corpus: 300, signal 72222/81602 (executing program) 2022/09/20 13:04:39 fetching corpus: 350, signal 73628/84230 (executing program) 2022/09/20 13:04:39 fetching corpus: 400, signal 78287/89843 (executing program) 2022/09/20 13:04:39 fetching corpus: 450, signal 82350/94806 (executing program) 2022/09/20 13:04:40 fetching corpus: 500, signal 87621/100800 (executing program) 2022/09/20 13:04:40 fetching corpus: 550, signal 91782/105738 (executing program) 2022/09/20 13:04:40 fetching corpus: 600, signal 94000/108880 (executing program) 2022/09/20 13:04:40 fetching corpus: 650, signal 97760/113308 (executing program) 2022/09/20 13:04:40 fetching corpus: 700, signal 100014/116378 (executing program) 2022/09/20 13:04:40 fetching corpus: 750, signal 102046/119223 (executing program) 2022/09/20 13:04:40 fetching corpus: 800, signal 104124/122011 (executing program) 2022/09/20 13:04:41 fetching corpus: 850, signal 107881/126269 (executing program) 2022/09/20 13:04:41 fetching corpus: 900, signal 111291/130218 (executing program) 2022/09/20 13:04:41 fetching corpus: 950, signal 112993/132608 (executing program) 2022/09/20 13:04:41 fetching corpus: 1000, signal 116451/136403 (executing program) 2022/09/20 13:04:41 fetching corpus: 1050, signal 118599/139091 (executing program) 2022/09/20 13:04:41 fetching corpus: 1100, signal 121046/141957 (executing program) 2022/09/20 13:04:41 fetching corpus: 1150, signal 122677/144165 (executing program) 2022/09/20 13:04:42 fetching corpus: 1200, signal 123811/145962 (executing program) 2022/09/20 13:04:42 fetching corpus: 1250, signal 126317/148800 (executing program) 2022/09/20 13:04:42 fetching corpus: 1300, signal 128130/151054 (executing program) 2022/09/20 13:04:42 fetching corpus: 1350, signal 130067/153388 (executing program) 2022/09/20 13:04:42 fetching corpus: 1400, signal 133183/156513 (executing program) 2022/09/20 13:04:42 fetching corpus: 1450, signal 134032/157951 (executing program) 2022/09/20 13:04:42 fetching corpus: 1500, signal 134932/159394 (executing program) 2022/09/20 13:04:42 fetching corpus: 1550, signal 136071/160985 (executing program) 2022/09/20 13:04:43 fetching corpus: 1600, signal 137761/162921 (executing program) 2022/09/20 13:04:43 fetching corpus: 1650, signal 139181/164654 (executing program) 2022/09/20 13:04:43 fetching corpus: 1700, signal 141067/166711 (executing program) 2022/09/20 13:04:43 fetching corpus: 1750, signal 142868/168600 (executing program) 2022/09/20 13:04:43 fetching corpus: 1800, signal 144827/170623 (executing program) 2022/09/20 13:04:43 fetching corpus: 1850, signal 146629/172496 (executing program) 2022/09/20 13:04:43 fetching corpus: 1900, signal 148189/174171 (executing program) 2022/09/20 13:04:44 fetching corpus: 1950, signal 150147/176035 (executing program) 2022/09/20 13:04:44 fetching corpus: 2000, signal 152230/177977 (executing program) 2022/09/20 13:04:44 fetching corpus: 2050, signal 154017/179730 (executing program) 2022/09/20 13:04:44 fetching corpus: 2100, signal 155369/181184 (executing program) 2022/09/20 13:04:44 fetching corpus: 2150, signal 158561/183744 (executing program) 2022/09/20 13:04:44 fetching corpus: 2200, signal 160248/185308 (executing program) 2022/09/20 13:04:44 fetching corpus: 2250, signal 161636/186680 (executing program) 2022/09/20 13:04:45 fetching corpus: 2300, signal 164244/188752 (executing program) 2022/09/20 13:04:45 fetching corpus: 2350, signal 165936/190224 (executing program) 2022/09/20 13:04:45 fetching corpus: 2400, signal 166975/191339 (executing program) 2022/09/20 13:04:45 fetching corpus: 2450, signal 167916/192366 (executing program) 2022/09/20 13:04:45 fetching corpus: 2500, signal 168983/193396 (executing program) 2022/09/20 13:04:45 fetching corpus: 2549, signal 170192/194562 (executing program) 2022/09/20 13:04:45 fetching corpus: 2598, signal 171202/195567 (executing program) 2022/09/20 13:04:46 fetching corpus: 2647, signal 172176/196521 (executing program) 2022/09/20 13:04:46 fetching corpus: 2697, signal 173084/197417 (executing program) 2022/09/20 13:04:46 fetching corpus: 2747, signal 173743/198184 (executing program) 2022/09/20 13:04:46 fetching corpus: 2797, signal 174665/199064 (executing program) 2022/09/20 13:04:46 fetching corpus: 2847, signal 175973/200097 (executing program) 2022/09/20 13:04:46 fetching corpus: 2897, signal 176705/200836 (executing program) 2022/09/20 13:04:46 fetching corpus: 2947, signal 177581/201606 (executing program) 2022/09/20 13:04:46 fetching corpus: 2995, signal 178183/202254 (executing program) 2022/09/20 13:04:47 fetching corpus: 3045, signal 179139/203080 (executing program) 2022/09/20 13:04:47 fetching corpus: 3095, signal 180025/203856 (executing program) 2022/09/20 13:04:47 fetching corpus: 3145, signal 180769/204601 (executing program) 2022/09/20 13:04:47 fetching corpus: 3194, signal 182283/205642 (executing program) 2022/09/20 13:04:47 fetching corpus: 3244, signal 183259/206429 (executing program) 2022/09/20 13:04:47 fetching corpus: 3294, signal 183910/207044 (executing program) 2022/09/20 13:04:47 fetching corpus: 3344, signal 184548/207674 (executing program) 2022/09/20 13:04:47 fetching corpus: 3393, signal 185323/208355 (executing program) 2022/09/20 13:04:48 fetching corpus: 3443, signal 186331/209019 (executing program) 2022/09/20 13:04:48 fetching corpus: 3493, signal 187791/209856 (executing program) 2022/09/20 13:04:48 fetching corpus: 3543, signal 188509/210462 (executing program) 2022/09/20 13:04:48 fetching corpus: 3593, signal 189094/210969 (executing program) 2022/09/20 13:04:48 fetching corpus: 3643, signal 189690/211489 (executing program) 2022/09/20 13:04:48 fetching corpus: 3693, signal 190596/212088 (executing program) 2022/09/20 13:04:48 fetching corpus: 3743, signal 191076/212519 (executing program) 2022/09/20 13:04:48 fetching corpus: 3793, signal 191789/213047 (executing program) 2022/09/20 13:04:49 fetching corpus: 3842, signal 192512/213543 (executing program) 2022/09/20 13:04:49 fetching corpus: 3892, signal 193633/214139 (executing program) 2022/09/20 13:04:49 fetching corpus: 3942, signal 194346/214597 (executing program) 2022/09/20 13:04:49 fetching corpus: 3991, signal 195235/215074 (executing program) 2022/09/20 13:04:49 fetching corpus: 4041, signal 195912/215463 (executing program) 2022/09/20 13:04:49 fetching corpus: 4091, signal 196909/215931 (executing program) 2022/09/20 13:04:49 fetching corpus: 4141, signal 197891/216404 (executing program) 2022/09/20 13:04:49 fetching corpus: 4191, signal 198658/216774 (executing program) 2022/09/20 13:04:50 fetching corpus: 4241, signal 199639/217201 (executing program) 2022/09/20 13:04:50 fetching corpus: 4291, signal 200276/217533 (executing program) 2022/09/20 13:04:50 fetching corpus: 4341, signal 201004/217878 (executing program) 2022/09/20 13:04:50 fetching corpus: 4390, signal 201826/218267 (executing program) 2022/09/20 13:04:50 fetching corpus: 4439, signal 202419/218544 (executing program) 2022/09/20 13:04:50 fetching corpus: 4489, signal 202977/218824 (executing program) 2022/09/20 13:04:50 fetching corpus: 4539, signal 203579/219123 (executing program) 2022/09/20 13:04:51 fetching corpus: 4588, signal 204425/219440 (executing program) 2022/09/20 13:04:51 fetching corpus: 4637, signal 204938/219696 (executing program) 2022/09/20 13:04:51 fetching corpus: 4687, signal 206013/220010 (executing program) 2022/09/20 13:04:51 fetching corpus: 4737, signal 207001/220344 (executing program) 2022/09/20 13:04:51 fetching corpus: 4787, signal 207875/220593 (executing program) 2022/09/20 13:04:51 fetching corpus: 4837, signal 208419/220795 (executing program) 2022/09/20 13:04:51 fetching corpus: 4886, signal 209288/220999 (executing program) 2022/09/20 13:04:52 fetching corpus: 4935, signal 209832/221175 (executing program) 2022/09/20 13:04:52 fetching corpus: 4983, signal 210535/221336 (executing program) 2022/09/20 13:04:52 fetching corpus: 5033, signal 211536/221525 (executing program) 2022/09/20 13:04:52 fetching corpus: 5080, signal 212398/221937 (executing program) 2022/09/20 13:04:52 fetching corpus: 5130, signal 213212/222149 (executing program) 2022/09/20 13:04:52 fetching corpus: 5179, signal 213770/222271 (executing program) 2022/09/20 13:04:52 fetching corpus: 5229, signal 214440/222378 (executing program) 2022/09/20 13:04:52 fetching corpus: 5279, signal 214890/222452 (executing program) 2022/09/20 13:04:53 fetching corpus: 5329, signal 215674/222520 (executing program) 2022/09/20 13:04:53 fetching corpus: 5379, signal 216578/222591 (executing program) 2022/09/20 13:04:53 fetching corpus: 5427, signal 216820/222643 (executing program) 2022/09/20 13:04:53 fetching corpus: 5427, signal 216824/222643 (executing program) 2022/09/20 13:04:53 fetching corpus: 5427, signal 216824/222643 (executing program) 2022/09/20 13:04:56 starting 8 fuzzer processes 13:04:56 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}], 0x1, 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue1\x00'}) close_range(r0, 0xffffffffffffffff, 0x0) 13:04:56 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) close_range(r0, 0xffffffffffffffff, 0x0) 13:04:56 executing program 4: syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f00000000c0)="e060", 0x2, 0x1}, {0x0}], 0x0, 0x0) 13:04:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f00000003c0)) 13:04:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in=@broadcast, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x8, 0x0, 0x0, 0x2}, {{@in6=@empty}, 0x0, @in6=@local}}, 0xe8) [ 74.683183] audit: type=1400 audit(1663679096.251:6): avc: denied { execmem } for pid=287 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 13:04:56 executing program 6: syz_emit_ethernet(0x66, &(0x7f00000001c0)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ddc20", 0x30, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "f2e2a6", 0x0, 0x3c, 0x0, @private2, @remote}}}}}}}, 0x0) 13:04:56 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @out_args}, './file0\x00'}) 13:04:56 executing program 7: r0 = msgget(0x0, 0x220) msgctl$IPC_RMID(r0, 0x0) [ 75.857961] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 75.860841] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 75.862360] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 75.865391] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 75.867914] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 75.869249] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 75.874989] Bluetooth: hci0: HCI_REQ-0x0c1a [ 75.960421] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 75.971269] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 76.016904] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 76.018204] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 76.022122] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 76.047854] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 76.048835] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 76.050700] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 76.052350] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 76.053627] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 76.055622] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 76.056682] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 76.057860] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 76.060561] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 76.061617] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 76.063106] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 76.065987] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 76.067291] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 76.068741] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 76.073680] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 76.074281] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 76.076188] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 76.076331] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 76.079950] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 76.082459] Bluetooth: hci1: HCI_REQ-0x0c1a [ 76.102125] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 76.103292] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 76.104901] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 76.124279] Bluetooth: hci4: HCI_REQ-0x0c1a [ 76.125540] Bluetooth: hci3: HCI_REQ-0x0c1a [ 76.187454] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 76.188830] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 76.191260] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 76.192741] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 76.198353] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 76.199348] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 76.203261] Bluetooth: hci6: HCI_REQ-0x0c1a [ 76.212472] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 76.215533] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 76.218728] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 76.221935] Bluetooth: hci5: HCI_REQ-0x0c1a [ 76.256005] Bluetooth: hci7: HCI_REQ-0x0c1a [ 77.939929] Bluetooth: hci0: command 0x0409 tx timeout [ 78.002829] Bluetooth: hci2: Opcode 0x c03 failed: -110 [ 78.130758] Bluetooth: hci3: command 0x0409 tx timeout [ 78.130888] Bluetooth: hci1: command 0x0409 tx timeout [ 78.194846] Bluetooth: hci4: command 0x0409 tx timeout [ 78.259763] Bluetooth: hci5: command 0x0409 tx timeout [ 78.259822] Bluetooth: hci6: command 0x0409 tx timeout [ 78.322793] Bluetooth: hci7: command 0x0409 tx timeout [ 79.986703] Bluetooth: hci0: command 0x041b tx timeout [ 80.178774] Bluetooth: hci1: command 0x041b tx timeout [ 80.178795] Bluetooth: hci3: command 0x041b tx timeout [ 80.243731] Bluetooth: hci4: command 0x041b tx timeout [ 80.306713] Bluetooth: hci5: command 0x041b tx timeout [ 80.307821] Bluetooth: hci6: command 0x041b tx timeout [ 80.370695] Bluetooth: hci7: command 0x041b tx timeout [ 80.885044] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 80.887408] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 80.894857] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 80.901476] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 80.902547] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 80.904239] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 80.909470] Bluetooth: hci2: HCI_REQ-0x0c1a [ 82.034689] Bluetooth: hci0: command 0x040f tx timeout [ 82.226750] Bluetooth: hci3: command 0x040f tx timeout [ 82.227201] Bluetooth: hci1: command 0x040f tx timeout [ 82.290715] Bluetooth: hci4: command 0x040f tx timeout [ 82.354714] Bluetooth: hci6: command 0x040f tx timeout [ 82.355147] Bluetooth: hci5: command 0x040f tx timeout [ 82.418717] Bluetooth: hci7: command 0x040f tx timeout [ 82.930749] Bluetooth: hci2: command 0x0409 tx timeout [ 84.082726] Bluetooth: hci0: command 0x0419 tx timeout [ 84.274731] Bluetooth: hci1: command 0x0419 tx timeout [ 84.275199] Bluetooth: hci3: command 0x0419 tx timeout [ 84.338686] Bluetooth: hci4: command 0x0419 tx timeout [ 84.402737] Bluetooth: hci5: command 0x0419 tx timeout [ 84.403148] Bluetooth: hci6: command 0x0419 tx timeout [ 84.466690] Bluetooth: hci7: command 0x0419 tx timeout [ 84.978806] Bluetooth: hci2: command 0x041b tx timeout [ 87.026694] Bluetooth: hci2: command 0x040f tx timeout [ 89.074698] Bluetooth: hci2: command 0x0419 tx timeout [ 130.101162] audit: type=1400 audit(1663679151.669:7): avc: denied { open } for pid=3846 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 130.102964] audit: type=1400 audit(1663679151.669:8): avc: denied { kernel } for pid=3846 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 130.119242] ------------[ cut here ]------------ [ 130.119266] [ 130.119270] ====================================================== [ 130.119274] WARNING: possible circular locking dependency detected [ 130.119278] 6.0.0-rc6-next-20220920 #1 Not tainted [ 130.119285] ------------------------------------------------------ [ 130.119289] syz-executor.2/3849 is trying to acquire lock: [ 130.119295] ffffffff853faab8 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 130.119336] [ 130.119336] but task is already holding lock: [ 130.119339] ffff8880087fbc20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 130.119367] [ 130.119367] which lock already depends on the new lock. [ 130.119367] [ 130.119370] [ 130.119370] the existing dependency chain (in reverse order) is: [ 130.119374] [ 130.119374] -> #3 (&ctx->lock){....}-{2:2}: [ 130.119388] _raw_spin_lock+0x2a/0x40 [ 130.119408] __perf_event_task_sched_out+0x53b/0x18d0 [ 130.119420] __schedule+0xedd/0x2470 [ 130.119433] schedule+0xda/0x1b0 [ 130.119445] futex_wait_queue+0xf5/0x1e0 [ 130.119457] futex_wait+0x28e/0x690 [ 130.119467] do_futex+0x2ff/0x380 [ 130.119477] __x64_sys_futex+0x1c6/0x4d0 [ 130.119487] do_syscall_64+0x3b/0x90 [ 130.119503] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 130.119522] [ 130.119522] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 130.119535] _raw_spin_lock_nested+0x30/0x40 [ 130.119552] raw_spin_rq_lock_nested+0x1e/0x30 [ 130.119565] task_fork_fair+0x63/0x4d0 [ 130.119582] sched_cgroup_fork+0x3d0/0x540 [ 130.119596] copy_process+0x4183/0x6e20 [ 130.119606] kernel_clone+0xe7/0x890 [ 130.119616] user_mode_thread+0xad/0xf0 [ 130.119626] rest_init+0x24/0x250 [ 130.119640] arch_call_rest_init+0xf/0x14 [ 130.119655] start_kernel+0x4c1/0x4e6 [ 130.119667] secondary_startup_64_no_verify+0xe0/0xeb [ 130.119682] [ 130.119682] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 130.119695] _raw_spin_lock_irqsave+0x39/0x60 [ 130.119712] try_to_wake_up+0xab/0x1930 [ 130.119725] up+0x75/0xb0 [ 130.119737] __up_console_sem+0x6e/0x80 [ 130.119753] console_unlock+0x46a/0x590 [ 130.119768] vt_ioctl+0x2822/0x2ca0 [ 130.119781] tty_ioctl+0x7c4/0x1700 [ 130.119793] __x64_sys_ioctl+0x19a/0x210 [ 130.119808] do_syscall_64+0x3b/0x90 [ 130.119824] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 130.119842] [ 130.119842] -> #0 ((console_sem).lock){....}-{2:2}: [ 130.119856] __lock_acquire+0x2a02/0x5e70 [ 130.119886] lock_acquire+0x1a2/0x530 [ 130.119902] _raw_spin_lock_irqsave+0x39/0x60 [ 130.119919] down_trylock+0xe/0x70 [ 130.119931] __down_trylock_console_sem+0x3b/0xd0 [ 130.119947] vprintk_emit+0x16b/0x560 [ 130.119963] vprintk+0x84/0xa0 [ 130.119979] _printk+0xba/0xf1 [ 130.119989] report_bug.cold+0x72/0xab [ 130.120005] handle_bug+0x3c/0x70 [ 130.120019] exc_invalid_op+0x14/0x50 [ 130.120035] asm_exc_invalid_op+0x16/0x20 [ 130.120045] group_sched_out.part.0+0x2c7/0x460 [ 130.120056] ctx_sched_out+0x8f1/0xc10 [ 130.120066] __perf_event_task_sched_out+0x6d0/0x18d0 [ 130.120078] __schedule+0xedd/0x2470 [ 130.120090] schedule+0xda/0x1b0 [ 130.120102] futex_wait_queue+0xf5/0x1e0 [ 130.120112] futex_wait+0x28e/0x690 [ 130.120122] do_futex+0x2ff/0x380 [ 130.120131] __x64_sys_futex+0x1c6/0x4d0 [ 130.120141] do_syscall_64+0x3b/0x90 [ 130.120156] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 130.120175] [ 130.120175] other info that might help us debug this: [ 130.120175] [ 130.120178] Chain exists of: [ 130.120178] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 130.120178] [ 130.120192] Possible unsafe locking scenario: [ 130.120192] [ 130.120195] CPU0 CPU1 [ 130.120197] ---- ---- [ 130.120200] lock(&ctx->lock); [ 130.120205] lock(&rq->__lock); [ 130.120212] lock(&ctx->lock); [ 130.120218] lock((console_sem).lock); [ 130.120224] [ 130.120224] *** DEADLOCK *** [ 130.120224] [ 130.120226] 2 locks held by syz-executor.2/3849: [ 130.120232] #0: ffff88806ce37d18 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 130.120260] #1: ffff8880087fbc20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 130.120287] [ 130.120287] stack backtrace: [ 130.120290] CPU: 0 PID: 3849 Comm: syz-executor.2 Not tainted 6.0.0-rc6-next-20220920 #1 [ 130.120303] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 130.120311] Call Trace: [ 130.120314] [ 130.120319] dump_stack_lvl+0x8b/0xb3 [ 130.120336] check_noncircular+0x263/0x2e0 [ 130.120352] ? format_decode+0x26c/0xb50 [ 130.120369] ? print_circular_bug+0x450/0x450 [ 130.120386] ? enable_ptr_key_workfn+0x20/0x20 [ 130.120401] ? format_decode+0x26c/0xb50 [ 130.120417] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 130.120435] __lock_acquire+0x2a02/0x5e70 [ 130.120456] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 130.120479] lock_acquire+0x1a2/0x530 [ 130.120495] ? down_trylock+0xe/0x70 [ 130.120510] ? lock_release+0x750/0x750 [ 130.120530] ? vprintk+0x84/0xa0 [ 130.120548] _raw_spin_lock_irqsave+0x39/0x60 [ 130.120565] ? down_trylock+0xe/0x70 [ 130.120579] down_trylock+0xe/0x70 [ 130.120592] ? vprintk+0x84/0xa0 [ 130.120609] __down_trylock_console_sem+0x3b/0xd0 [ 130.120626] vprintk_emit+0x16b/0x560 [ 130.120645] vprintk+0x84/0xa0 [ 130.120662] _printk+0xba/0xf1 [ 130.120672] ? record_print_text.cold+0x16/0x16 [ 130.120687] ? report_bug.cold+0x66/0xab [ 130.120703] ? group_sched_out.part.0+0x2c7/0x460 [ 130.120715] report_bug.cold+0x72/0xab [ 130.120732] handle_bug+0x3c/0x70 [ 130.120748] exc_invalid_op+0x14/0x50 [ 130.120764] asm_exc_invalid_op+0x16/0x20 [ 130.120775] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 130.120790] Code: 5e 41 5f e9 9b b9 ef ff e8 96 b9 ef ff 65 8b 1d 0b 13 ac 7e 31 ff 89 de e8 36 b6 ef ff 85 db 0f 84 8a 00 00 00 e8 79 b9 ef ff <0f> 0b e9 a5 fe ff ff e8 6d b9 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 130.120801] RSP: 0018:ffff8880207ef8f8 EFLAGS: 00010006 [ 130.120810] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 130.120818] RDX: ffff88802059d040 RSI: ffffffff815662c7 RDI: 0000000000000005 [ 130.120826] RBP: ffff888008668000 R08: 0000000000000005 R09: 0000000000000001 [ 130.120833] R10: 0000000000000000 R11: ffffffff865ae01b R12: ffff8880087fbc00 [ 130.120841] R13: ffff88806ce3d140 R14: ffffffff8547cec0 R15: 0000000000000002 [ 130.120852] ? group_sched_out.part.0+0x2c7/0x460 [ 130.120866] ? group_sched_out.part.0+0x2c7/0x460 [ 130.120879] ctx_sched_out+0x8f1/0xc10 [ 130.120892] __perf_event_task_sched_out+0x6d0/0x18d0 [ 130.120907] ? lock_is_held_type+0xd7/0x130 [ 130.120920] ? __perf_cgroup_move+0x160/0x160 [ 130.120932] ? set_next_entity+0x304/0x550 [ 130.120951] ? lock_is_held_type+0xd7/0x130 [ 130.120964] __schedule+0xedd/0x2470 [ 130.120979] ? io_schedule_timeout+0x150/0x150 [ 130.120993] ? futex_wait_setup+0x166/0x230 [ 130.121007] schedule+0xda/0x1b0 [ 130.121021] futex_wait_queue+0xf5/0x1e0 [ 130.121033] futex_wait+0x28e/0x690 [ 130.121045] ? futex_wait_setup+0x230/0x230 [ 130.121058] ? wake_up_q+0x8b/0xf0 [ 130.121071] ? do_raw_spin_unlock+0x4f/0x220 [ 130.121090] ? futex_wake+0x158/0x490 [ 130.121107] ? fd_install+0x1f9/0x640 [ 130.121123] do_futex+0x2ff/0x380 [ 130.121134] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0 [ 130.121150] __x64_sys_futex+0x1c6/0x4d0 [ 130.121163] ? __x64_sys_futex_time32+0x480/0x480 [ 130.121176] ? syscall_enter_from_user_mode+0x1d/0x50 [ 130.121188] ? syscall_enter_from_user_mode+0x1d/0x50 [ 130.121202] do_syscall_64+0x3b/0x90 [ 130.121218] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 130.121238] RIP: 0033:0x7f3f13987b19 [ 130.121246] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 130.121257] RSP: 002b:00007f3f10efd218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 130.121268] RAX: ffffffffffffffda RBX: 00007f3f13a9af68 RCX: 00007f3f13987b19 [ 130.121276] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f3f13a9af68 [ 130.121283] RBP: 00007f3f13a9af60 R08: 0000000000000000 R09: 0000000000000000 [ 130.121290] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3f13a9af6c [ 130.121298] R13: 00007ffd211e407f R14: 00007f3f10efd300 R15: 0000000000022000 [ 130.121311] [ 130.180037] WARNING: CPU: 0 PID: 3849 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 130.180716] Modules linked in: [ 130.180953] CPU: 0 PID: 3849 Comm: syz-executor.2 Not tainted 6.0.0-rc6-next-20220920 #1 [ 130.181524] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 130.182306] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 130.182712] Code: 5e 41 5f e9 9b b9 ef ff e8 96 b9 ef ff 65 8b 1d 0b 13 ac 7e 31 ff 89 de e8 36 b6 ef ff 85 db 0f 84 8a 00 00 00 e8 79 b9 ef ff <0f> 0b e9 a5 fe ff ff e8 6d b9 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 130.184050] RSP: 0018:ffff8880207ef8f8 EFLAGS: 00010006 [ 130.184431] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 130.184953] RDX: ffff88802059d040 RSI: ffffffff815662c7 RDI: 0000000000000005 [ 130.185477] RBP: ffff888008668000 R08: 0000000000000005 R09: 0000000000000001 [ 130.186003] R10: 0000000000000000 R11: ffffffff865ae01b R12: ffff8880087fbc00 [ 130.186534] R13: ffff88806ce3d140 R14: ffffffff8547cec0 R15: 0000000000000002 [ 130.187057] FS: 00007f3f10efd700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 130.187639] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 130.188070] CR2: 00007fec89bd9028 CR3: 0000000015f44000 CR4: 0000000000350ef0 [ 130.188596] Call Trace: [ 130.188796] [ 130.188977] ctx_sched_out+0x8f1/0xc10 [ 130.189274] __perf_event_task_sched_out+0x6d0/0x18d0 [ 130.189664] ? lock_is_held_type+0xd7/0x130 [ 130.189982] ? __perf_cgroup_move+0x160/0x160 [ 130.190316] ? set_next_entity+0x304/0x550 [ 130.190641] ? lock_is_held_type+0xd7/0x130 [ 130.190962] __schedule+0xedd/0x2470 [ 130.191254] ? io_schedule_timeout+0x150/0x150 [ 130.191602] ? futex_wait_setup+0x166/0x230 [ 130.191946] schedule+0xda/0x1b0 [ 130.192210] futex_wait_queue+0xf5/0x1e0 [ 130.192511] futex_wait+0x28e/0x690 [ 130.192790] ? futex_wait_setup+0x230/0x230 [ 130.193103] ? wake_up_q+0x8b/0xf0 [ 130.193374] ? do_raw_spin_unlock+0x4f/0x220 [ 130.193713] ? futex_wake+0x158/0x490 [ 130.194007] ? fd_install+0x1f9/0x640 [ 130.194290] do_futex+0x2ff/0x380 [ 130.194548] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0 [ 130.194963] __x64_sys_futex+0x1c6/0x4d0 [ 130.195254] ? __x64_sys_futex_time32+0x480/0x480 [ 130.195603] ? syscall_enter_from_user_mode+0x1d/0x50 [ 130.195984] ? syscall_enter_from_user_mode+0x1d/0x50 [ 130.196355] do_syscall_64+0x3b/0x90 [ 130.196634] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 130.197007] RIP: 0033:0x7f3f13987b19 [ 130.197275] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 130.198573] RSP: 002b:00007f3f10efd218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 130.199128] RAX: ffffffffffffffda RBX: 00007f3f13a9af68 RCX: 00007f3f13987b19 [ 130.199644] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f3f13a9af68 [ 130.200187] RBP: 00007f3f13a9af60 R08: 0000000000000000 R09: 0000000000000000 [ 130.200711] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3f13a9af6c [ 130.201235] R13: 00007ffd211e407f R14: 00007f3f10efd300 R15: 0000000000022000 [ 130.201749] [ 130.201920] irq event stamp: 856 [ 130.202165] hardirqs last enabled at (855): [] syscall_enter_from_user_mode+0x1d/0x50 [ 130.202831] hardirqs last disabled at (856): [] __schedule+0x1225/0x2470 [ 130.203438] softirqs last enabled at (574): [] __irq_exit_rcu+0x11b/0x180 [ 130.204049] softirqs last disabled at (527): [] __irq_exit_rcu+0x11b/0x180 [ 130.204670] ---[ end trace 0000000000000000 ]--- 13:05:53 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}], 0x1, 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue1\x00'}) close_range(r0, 0xffffffffffffffff, 0x0) 13:05:53 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x0, 0xffffffffffffffff, {0x200008}}, './cgroup/cgroup.procs\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) 13:05:53 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sysvipc/shm\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) syz_open_dev$vcsa(0x0, 0x9e5d, 0x0) 13:05:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) close_range(r0, 0xffffffffffffffff, 0x0) 13:05:53 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) close_range(r0, 0xffffffffffffffff, 0x0) 13:05:53 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) close_range(r0, 0xffffffffffffffff, 0x0) 13:05:53 executing program 7: r0 = msgget(0x0, 0x220) msgctl$IPC_RMID(r0, 0x0) 13:05:53 executing program 4: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000580)) clock_adjtime(0x0, &(0x7f0000000100)={0x8003}) 13:05:53 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) close_range(r0, 0xffffffffffffffff, 0x0) 13:05:53 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}], 0x1, 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue1\x00'}) close_range(r0, 0xffffffffffffffff, 0x0) [ 132.344657] hrtimer: interrupt took 17142 ns 13:05:53 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x0, 0xffffffffffffffff, {0x200008}}, './cgroup/cgroup.procs\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) 13:05:54 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) close_range(r0, 0xffffffffffffffff, 0x0) 13:05:54 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x0, 0xffffffffffffffff, {0x200008}}, './cgroup/cgroup.procs\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) 13:05:54 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}], 0x1, 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue1\x00'}) close_range(r0, 0xffffffffffffffff, 0x0) 13:05:54 executing program 7: r0 = msgget(0x0, 0x220) msgctl$IPC_RMID(r0, 0x0) 13:05:54 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}], 0x1, 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue1\x00'}) close_range(r0, 0xffffffffffffffff, 0x0) 13:05:54 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x0, 0xffffffffffffffff, {0x200008}}, './cgroup/cgroup.procs\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) 13:05:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) close_range(r0, 0xffffffffffffffff, 0x0) 13:05:54 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) close_range(r0, 0xffffffffffffffff, 0x0) 13:05:54 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x0, 0xffffffffffffffff, {0x200008}}, './cgroup/cgroup.procs\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) 13:05:54 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}], 0x1, 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue1\x00'}) close_range(r0, 0xffffffffffffffff, 0x0) 13:05:54 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x0, 0xffffffffffffffff, {0x200008}}, './cgroup/cgroup.procs\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) 13:05:54 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@multicast, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @source_quench={0x4, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @local}}}}}}, 0x0) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 13:05:54 executing program 7: r0 = msgget(0x0, 0x220) msgctl$IPC_RMID(r0, 0x0) 13:05:54 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@multicast, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @source_quench={0x4, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @local}}}}}}, 0x0) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 13:05:54 executing program 0: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) write$tcp_mem(r0, &(0x7f0000001d40), 0x48) 13:05:54 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x0, 0xffffffffffffffff, {0x200008}}, './cgroup/cgroup.procs\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) 13:05:54 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}], 0x1, 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue1\x00'}) close_range(r0, 0xffffffffffffffff, 0x0) 13:05:54 executing program 5: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001040), 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000001080)) 13:05:54 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) close_range(r0, 0xffffffffffffffff, 0x0) 13:05:54 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getpeername(r0, 0x0, 0x0) 13:05:54 executing program 0: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 13:05:54 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000540)=[{0x0}], 0x0, 0x0) [ 132.842052] loop0: detected capacity change from 0 to 256 [ 132.865907] loop0: detected capacity change from 0 to 256 13:05:54 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@multicast, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @source_quench={0x4, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @local}}}}}}, 0x0) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 13:05:54 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getpeername(r0, 0x0, 0x0) 13:05:54 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 13:05:54 executing program 0: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 13:05:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) close_range(r0, 0xffffffffffffffff, 0x0) 13:05:54 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) 13:05:54 executing program 1: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f0000000080)='#', 0x1}, {&(0x7f00000000c0)="a4", 0x1, 0x100000000}, {&(0x7f0000000100)="a9", 0x1}], 0x0, &(0x7f0000000300)={[], [{@measure}]}) 13:05:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x1f, 0x4) [ 132.932035] loop1: detected capacity change from 0 to 264192 [ 132.952734] FAT-fs (loop1): Unrecognized mount option "measure" or missing value [ 132.964983] loop1: detected capacity change from 0 to 264192 [ 132.972305] FAT-fs (loop1): Unrecognized mount option "measure" or missing value [ 133.001493] loop0: detected capacity change from 0 to 256 13:05:54 executing program 3: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 13:05:54 executing program 0: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 13:05:54 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getpeername(r0, 0x0, 0x0) 13:05:54 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@multicast, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @source_quench={0x4, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @local}}}}}}, 0x0) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 13:05:54 executing program 1: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 13:05:54 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) 13:05:54 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) [ 133.110531] loop3: detected capacity change from 0 to 256 13:05:54 executing program 2: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) [ 133.123678] loop2: detected capacity change from 0 to 256 [ 133.129367] loop1: detected capacity change from 0 to 256 [ 133.134596] loop0: detected capacity change from 0 to 256 13:05:54 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getpeername(r0, 0x0, 0x0) 13:05:54 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) 13:05:54 executing program 2: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 13:05:54 executing program 3: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 13:05:54 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 13:05:54 executing program 1: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 13:05:54 executing program 0: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) [ 133.233064] loop3: detected capacity change from 0 to 256 [ 133.235819] loop2: detected capacity change from 0 to 256 13:05:54 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) [ 133.294372] loop0: detected capacity change from 0 to 256 13:05:54 executing program 3: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 13:05:54 executing program 2: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 13:05:54 executing program 6: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) [ 133.317847] loop6: detected capacity change from 0 to 256 13:05:54 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x38, 0x0, &(0x7f00000000c0)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000080)={0x0, 0x7, 0x4}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xffff, {{0xa, 0x4e23, 0x1, @private2, 0x6}}}, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb1}, 0x1c) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x37, 0x35, 0x32, 0x30, 0x62, 0x30], 0x2d, [0x32, 0x34, 0x0, 0x62], 0x2d, [0x37, 0x65, 0x38, 0x34], 0x2d, [0x39, 0x63, 0x65, 0x33], 0x2d, [0x0, 0x33, 0x36, 0x63, 0x65, 0x37, 0x32]}}}]}}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000003dc0)="683a17e6f34f467ab0e7b7e5f3722b463c316877eb04c1e8b52ab9e255ae4229128ce01879b890ed735bef83998fccc72b48f783e0fe5b2e59b96213caeeab9b670683fb5657d4e6fe868ac403e38bb493e7594e617fa4e775acce244cab61040f0233c5978bf5cec873707a51fd823715d491a9b948de39ce71164f8afc95ce1837ce6314118afcce869eb8eb6ca2d71fb60b9c8034983b3412d24709a62ec0002e7eaaf6507218", 0xa8, 0xc010, &(0x7f0000003ec0)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) [ 133.327621] loop1: detected capacity change from 0 to 256 [ 133.329721] loop2: detected capacity change from 0 to 256 [ 133.336163] loop3: detected capacity change from 0 to 256 13:05:54 executing program 6: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 13:05:54 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, r2, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000140)={0x5, 0xffffffbd, 0x81, 0x80, 0x2, 0xca, 0x0, 0x0, 0x201, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x9}, 0x4000, 0x20000000000002, 0x20829c, 0x2, 0x8000cf4b, 0xaa6, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 13:05:54 executing program 0: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000002600)='numa_maps\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='/dev/l\xd4\xd2j\x97\xd0ME\x12w\xaf\xf2T\xe8#rol\x00', 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r3 = openat2(r1, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r2, 0x40089413, &(0x7f0000000180)=0x1) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) ioctl$SNAPSHOT_FREE(r5, 0x3305) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) 13:05:54 executing program 1: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) [ 133.447701] loop6: detected capacity change from 0 to 256 [ 133.453610] random: crng reseeded on system resumption 13:05:55 executing program 6: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) [ 133.477570] loop1: detected capacity change from 0 to 256 [ 133.477676] random: crng reseeded on system resumption [ 133.520848] loop6: detected capacity change from 0 to 256 13:05:55 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, r2, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000140)={0x5, 0xffffffbd, 0x81, 0x80, 0x2, 0xca, 0x0, 0x0, 0x201, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x9}, 0x4000, 0x20000000000002, 0x20829c, 0x2, 0x8000cf4b, 0xaa6, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 133.544851] random: crng reseeded on system resumption [ 133.548154] Restarting kernel threads ... done. 13:05:55 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, r2, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000140)={0x5, 0xffffffbd, 0x81, 0x80, 0x2, 0xca, 0x0, 0x0, 0x201, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x9}, 0x4000, 0x20000000000002, 0x20829c, 0x2, 0x8000cf4b, 0xaa6, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 13:05:55 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, r2, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000140)={0x5, 0xffffffbd, 0x81, 0x80, 0x2, 0xca, 0x0, 0x0, 0x201, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x9}, 0x4000, 0x20000000000002, 0x20829c, 0x2, 0x8000cf4b, 0xaa6, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 13:05:55 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, r2, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000140)={0x5, 0xffffffbd, 0x81, 0x80, 0x2, 0xca, 0x0, 0x0, 0x201, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x9}, 0x4000, 0x20000000000002, 0x20829c, 0x2, 0x8000cf4b, 0xaa6, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 13:05:55 executing program 6: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, r2, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000140)={0x5, 0xffffffbd, 0x81, 0x80, 0x2, 0xca, 0x0, 0x0, 0x201, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x9}, 0x4000, 0x20000000000002, 0x20829c, 0x2, 0x8000cf4b, 0xaa6, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 13:05:55 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x19, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32323330373039383000"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040000c00000000000000daf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000004300000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000daf4655fdaf4655fdaf4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011500)="ed41000000080000daf4655fdbf4655fdbf4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x2100}, {&(0x7f0000011600)="20000000641e8ebf641e8ebf00000000daf4655f00"/32, 0x20, 0x2180}, {&(0x7f0000011700)="8081000000601020daf4655fdaf4655fdaf4655f00000000000001004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000daf4655f00"/160, 0xa0, 0x2600}, {&(0x7f0000011800)="c041000000380000daf4655fdaf4655fdaf4655f00000000000002004000000000000800000000000af301000400000000000000000000000700000020000000", 0x40, 0x2a00}, {&(0x7f0000011900)="20000000000000000000000000000000daf4655f000000000000000000000000000002ea00"/64, 0x40, 0x2a80}, {&(0x7f0000011a00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c6531000000000000000000000000000000000000000000000000000000904a5ec200000000000000000000000000000000000000000000000020000000641e8ebf641e8ebf641e8ebfdbf4655f641e8ebf0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x2b00}, {&(0x7f0000011b00)="ed8100001a040000dbf4655fdbf4655fdbf4655f00000000000001004000000000000800010000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000046b58a6000000000000000000000000000000000000000000000000020000000641e8ebf641e8ebf641e8ebfdbf4655f641e8ebf0000000000000000", 0xa0, 0x2c00}, {&(0x7f0000011c00)="ffa1000026000000dbf4655fdbf4655fdbf4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3232333037303938302f66696c65302f66696c65300000000000000000000000000000000000000000000029d1c2e100000000000000000000000000000000000000000000000020000000641e8ebf641e8ebf641e8ebfdbf4655f641e8ebf0000000000000000", 0xa0, 0x2d00}, {&(0x7f0000011d00)="ed8100000a000000dbf4655fdbf4655fdbf4655f000000000000010000000000000000100100000073797a6b616c6c6572730000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bae0739c00000000000000000000000000000000000000000000000020000000641e8ebf641e8ebf641e8ebfdbf4655f641e8ebf0000000000000000000002ea040700000000000000000000000000006461746106015400000000000600000000000000786174747231000006014c000000000006000000000000007861747472320000000000000000000078617474723200007861747472310000ed81000028230000dbf4655fdbf4655fdbf4655f00000000000002004000000000000800010000000af3010004000000000000000000000005000000600000000000000000000000000000000000000000000000000000000000000000000000000000005162155f00000000000000000000000000000000000000000000000020000000641e8ebf641e8ebf641e8ebfdbf4655f641e8ebf0000000000000000", 0x1a0, 0x2e00}, {&(0x7f0000011f00)="ed81000064000000dbf4655fdbf4655fdbf4655f000000000000010000000000000000100100000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616cb822423400000000000000000000000000000000000000000000000020000000641e8ebf641e8ebf641e8ebfdbf4655f641e8ebf0000000000000000000002ea040734000000000028000000000000006461746100000000000000000000000000000000000000000000000000000000000000006c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273", 0x100, 0x3000}, {&(0x7f0000012000)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x8000}, {&(0x7f0000012100)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8070000", 0x20, 0x10000}, {&(0x7f0000012200)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x10800}, {&(0x7f0000012300)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x11000}, {&(0x7f0000012400)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x11800}, {&(0x7f0000012500)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x12000}, {&(0x7f0000012600)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x12800}, {&(0x7f0000012700)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x13000}, {&(0x7f0000012800)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033320075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/128, 0x80, 0x20000}, {&(0x7f0000012900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x28000}], 0x0, &(0x7f0000012e00)) 13:05:55 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000780)='sit0\x00', 0x10) [ 133.653244] loop7: detected capacity change from 0 to 2048 13:05:55 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, r2, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000140)={0x5, 0xffffffbd, 0x81, 0x80, 0x2, 0xca, 0x0, 0x0, 0x201, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x9}, 0x4000, 0x20000000000002, 0x20829c, 0x2, 0x8000cf4b, 0xaa6, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 133.705244] EXT4-fs (loop7): mounted filesystem without journal. Quota mode: none. [ 133.763388] EXT4-fs (loop7): unmounting filesystem. [ 133.816708] random: crng reseeded on system resumption 13:05:55 executing program 1: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000002600)='numa_maps\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='/dev/l\xd4\xd2j\x97\xd0ME\x12w\xaf\xf2T\xe8#rol\x00', 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r3 = openat2(r1, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r2, 0x40089413, &(0x7f0000000180)=0x1) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) ioctl$SNAPSHOT_FREE(r5, 0x3305) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) 13:05:55 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsopen(0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x4e20, @local}, {0x2, 0x4e23, @local={0xac, 0x3}}, {0x2, 0x4e20, @broadcast}, 0x186, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}) 13:05:55 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, r2, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000140)={0x5, 0xffffffbd, 0x81, 0x80, 0x2, 0xca, 0x0, 0x0, 0x201, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x9}, 0x4000, 0x20000000000002, 0x20829c, 0x2, 0x8000cf4b, 0xaa6, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 13:05:55 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, r2, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000140)={0x5, 0xffffffbd, 0x81, 0x80, 0x2, 0xca, 0x0, 0x0, 0x201, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x9}, 0x4000, 0x20000000000002, 0x20829c, 0x2, 0x8000cf4b, 0xaa6, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 13:05:55 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, r2, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000140)={0x5, 0xffffffbd, 0x81, 0x80, 0x2, 0xca, 0x0, 0x0, 0x201, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x9}, 0x4000, 0x20000000000002, 0x20829c, 0x2, 0x8000cf4b, 0xaa6, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 13:05:55 executing program 0: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000002600)='numa_maps\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='/dev/l\xd4\xd2j\x97\xd0ME\x12w\xaf\xf2T\xe8#rol\x00', 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r3 = openat2(r1, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r2, 0x40089413, &(0x7f0000000180)=0x1) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) ioctl$SNAPSHOT_FREE(r5, 0x3305) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) 13:05:55 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, r2, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000140)={0x5, 0xffffffbd, 0x81, 0x80, 0x2, 0xca, 0x0, 0x0, 0x201, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x9}, 0x4000, 0x20000000000002, 0x20829c, 0x2, 0x8000cf4b, 0xaa6, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 13:05:55 executing program 6: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, r2, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000140)={0x5, 0xffffffbd, 0x81, 0x80, 0x2, 0xca, 0x0, 0x0, 0x201, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x9}, 0x4000, 0x20000000000002, 0x20829c, 0x2, 0x8000cf4b, 0xaa6, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 13:05:55 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsopen(0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x4e20, @local}, {0x2, 0x4e23, @local={0xac, 0x3}}, {0x2, 0x4e20, @broadcast}, 0x186, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}) [ 133.973408] random: crng reseeded on system resumption [ 133.981339] Restarting kernel threads ... done. 13:05:55 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsopen(0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x4e20, @local}, {0x2, 0x4e23, @local={0xac, 0x3}}, {0x2, 0x4e20, @broadcast}, 0x186, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}) 13:05:55 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, r2, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000140)={0x5, 0xffffffbd, 0x81, 0x80, 0x2, 0xca, 0x0, 0x0, 0x201, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x9}, 0x4000, 0x20000000000002, 0x20829c, 0x2, 0x8000cf4b, 0xaa6, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 13:05:55 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, r2, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000140)={0x5, 0xffffffbd, 0x81, 0x80, 0x2, 0xca, 0x0, 0x0, 0x201, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x9}, 0x4000, 0x20000000000002, 0x20829c, 0x2, 0x8000cf4b, 0xaa6, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 13:05:55 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsopen(0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x4e20, @local}, {0x2, 0x4e23, @local={0xac, 0x3}}, {0x2, 0x4e20, @broadcast}, 0x186, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}) 13:05:55 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsopen(0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x4e20, @local}, {0x2, 0x4e23, @local={0xac, 0x3}}, {0x2, 0x4e20, @broadcast}, 0x186, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}) [ 134.156510] random: crng reseeded on system resumption 13:05:55 executing program 1: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000002600)='numa_maps\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='/dev/l\xd4\xd2j\x97\xd0ME\x12w\xaf\xf2T\xe8#rol\x00', 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r3 = openat2(r1, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r2, 0x40089413, &(0x7f0000000180)=0x1) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4 VM DIAGNOSIS: 13:05:52 Registers: info registers vcpu 0 RAX=0000000000000064 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b1551 RDI=ffffffff87643ba0 RBP=ffffffff87643b60 RSP=ffff8880207ef348 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000064 R11=0000000000000001 R12=0000000000000064 R13=ffffffff87643b60 R14=0000000000000010 R15=ffffffff822b1540 RIP=ffffffff822b15a9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f3f10efd700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fec89bd9028 CR3=0000000015f44000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f3f13a6e7c0 00007f3f13a6e7c8 YMM02=0000000000000000 0000000000000000 00007f3f13a6e7e0 00007f3f13a6e7c0 YMM03=0000000000000000 0000000000000000 00007f3f13a6e7c8 00007f3f13a6e7c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=ffff88806ce3eee0 RCX=0000000000000000 RDX=ffff888040a29ac0 RSI=ffffffff813bcd57 RDI=0000000000000005 RBP=0000000000000003 RSP=ffff888017eff948 R8 =0000000000000005 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=ffffed100d9c7ddd R13=0000000000000001 R14=ffff88806ce3eee8 R15=dffffc0000000000 RIP=ffffffff813bcd59 RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 00000000 00000000 DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555555a2d400 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f3f13a908dc CR3=0000000015f44000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f3f13a6e7c0 00007f3f13a6e7c8 YMM02=0000000000000000 0000000000000000 00007f3f13a6e7e0 00007f3f13a6e7c0 YMM03=0000000000000000 0000000000000000 00007f3f13a6e7c8 00007f3f13a6e7c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000