Warning: Permanently added '[localhost]:1069' (ECDSA) to the list of known hosts. 2022/09/12 18:06:22 fuzzer started 2022/09/12 18:06:22 dialing manager at localhost:38027 syzkaller login: [ 40.785275] cgroup: Unknown subsys name 'net' [ 40.966761] cgroup: Unknown subsys name 'rlimit' 2022/09/12 18:06:36 syscalls: 2215 2022/09/12 18:06:36 code coverage: enabled 2022/09/12 18:06:36 comparison tracing: enabled 2022/09/12 18:06:36 extra coverage: enabled 2022/09/12 18:06:36 setuid sandbox: enabled 2022/09/12 18:06:36 namespace sandbox: enabled 2022/09/12 18:06:36 Android sandbox: enabled 2022/09/12 18:06:36 fault injection: enabled 2022/09/12 18:06:36 leak checking: enabled 2022/09/12 18:06:36 net packet injection: enabled 2022/09/12 18:06:36 net device setup: enabled 2022/09/12 18:06:36 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/12 18:06:36 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/12 18:06:36 USB emulation: enabled 2022/09/12 18:06:36 hci packet injection: enabled 2022/09/12 18:06:36 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220912) 2022/09/12 18:06:36 802.15.4 emulation: enabled 2022/09/12 18:06:36 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/12 18:06:36 fetching corpus: 45, signal 35982/39445 (executing program) 2022/09/12 18:06:36 fetching corpus: 95, signal 48782/53651 (executing program) 2022/09/12 18:06:37 fetching corpus: 145, signal 52883/59223 (executing program) 2022/09/12 18:06:37 fetching corpus: 195, signal 64362/71904 (executing program) 2022/09/12 18:06:37 fetching corpus: 245, signal 70967/79752 (executing program) 2022/09/12 18:06:37 fetching corpus: 295, signal 77987/87884 (executing program) 2022/09/12 18:06:37 fetching corpus: 345, signal 83715/94739 (executing program) 2022/09/12 18:06:37 fetching corpus: 395, signal 87533/99702 (executing program) 2022/09/12 18:06:37 fetching corpus: 445, signal 92614/105755 (executing program) 2022/09/12 18:06:38 fetching corpus: 494, signal 95418/109637 (executing program) 2022/09/12 18:06:38 fetching corpus: 544, signal 98485/113702 (executing program) 2022/09/12 18:06:38 fetching corpus: 594, signal 102458/118578 (executing program) 2022/09/12 18:06:38 fetching corpus: 644, signal 106365/123316 (executing program) 2022/09/12 18:06:38 fetching corpus: 694, signal 109825/127603 (executing program) 2022/09/12 18:06:38 fetching corpus: 744, signal 113262/131886 (executing program) 2022/09/12 18:06:39 fetching corpus: 794, signal 115143/134717 (executing program) 2022/09/12 18:06:39 fetching corpus: 844, signal 117055/137492 (executing program) 2022/09/12 18:06:39 fetching corpus: 894, signal 118987/140323 (executing program) 2022/09/12 18:06:39 fetching corpus: 944, signal 121414/143480 (executing program) 2022/09/12 18:06:39 fetching corpus: 994, signal 123519/146377 (executing program) 2022/09/12 18:06:39 fetching corpus: 1044, signal 125331/149001 (executing program) 2022/09/12 18:06:39 fetching corpus: 1094, signal 127338/151712 (executing program) 2022/09/12 18:06:39 fetching corpus: 1144, signal 129987/154976 (executing program) 2022/09/12 18:06:40 fetching corpus: 1194, signal 131939/157592 (executing program) 2022/09/12 18:06:40 fetching corpus: 1244, signal 133952/160173 (executing program) 2022/09/12 18:06:40 fetching corpus: 1294, signal 135775/162682 (executing program) 2022/09/12 18:06:40 fetching corpus: 1344, signal 137590/165105 (executing program) 2022/09/12 18:06:40 fetching corpus: 1394, signal 139063/167229 (executing program) 2022/09/12 18:06:40 fetching corpus: 1444, signal 141549/170159 (executing program) 2022/09/12 18:06:40 fetching corpus: 1494, signal 143487/172608 (executing program) 2022/09/12 18:06:40 fetching corpus: 1544, signal 146004/175459 (executing program) 2022/09/12 18:06:41 fetching corpus: 1593, signal 147815/177749 (executing program) 2022/09/12 18:06:41 fetching corpus: 1643, signal 149022/179560 (executing program) 2022/09/12 18:06:41 fetching corpus: 1693, signal 150279/181377 (executing program) 2022/09/12 18:06:41 fetching corpus: 1742, signal 151743/183387 (executing program) 2022/09/12 18:06:41 fetching corpus: 1792, signal 153118/185279 (executing program) 2022/09/12 18:06:41 fetching corpus: 1842, signal 154194/186969 (executing program) 2022/09/12 18:06:41 fetching corpus: 1892, signal 156401/189404 (executing program) 2022/09/12 18:06:42 fetching corpus: 1942, signal 158135/191437 (executing program) 2022/09/12 18:06:42 fetching corpus: 1992, signal 159831/193425 (executing program) 2022/09/12 18:06:42 fetching corpus: 2042, signal 162180/195813 (executing program) 2022/09/12 18:06:42 fetching corpus: 2092, signal 163598/197582 (executing program) 2022/09/12 18:06:42 fetching corpus: 2142, signal 164708/199120 (executing program) 2022/09/12 18:06:42 fetching corpus: 2192, signal 165966/200759 (executing program) 2022/09/12 18:06:42 fetching corpus: 2242, signal 166867/202168 (executing program) 2022/09/12 18:06:43 fetching corpus: 2292, signal 168315/203882 (executing program) 2022/09/12 18:06:43 fetching corpus: 2342, signal 169939/205699 (executing program) 2022/09/12 18:06:43 fetching corpus: 2392, signal 171086/207187 (executing program) 2022/09/12 18:06:43 fetching corpus: 2441, signal 172103/208565 (executing program) 2022/09/12 18:06:43 fetching corpus: 2491, signal 173740/210299 (executing program) 2022/09/12 18:06:43 fetching corpus: 2541, signal 174614/211595 (executing program) 2022/09/12 18:06:44 fetching corpus: 2591, signal 176661/213562 (executing program) 2022/09/12 18:06:44 fetching corpus: 2641, signal 177415/214726 (executing program) 2022/09/12 18:06:44 fetching corpus: 2691, signal 178931/216277 (executing program) 2022/09/12 18:06:44 fetching corpus: 2741, signal 180476/217965 (executing program) 2022/09/12 18:06:44 fetching corpus: 2791, signal 181221/219081 (executing program) 2022/09/12 18:06:44 fetching corpus: 2841, signal 182621/220639 (executing program) 2022/09/12 18:06:44 fetching corpus: 2891, signal 183913/222024 (executing program) 2022/09/12 18:06:44 fetching corpus: 2941, signal 184638/223078 (executing program) 2022/09/12 18:06:44 fetching corpus: 2991, signal 185245/224066 (executing program) 2022/09/12 18:06:45 fetching corpus: 3041, signal 186525/225350 (executing program) 2022/09/12 18:06:45 fetching corpus: 3091, signal 187680/226571 (executing program) 2022/09/12 18:06:45 fetching corpus: 3141, signal 188731/227703 (executing program) 2022/09/12 18:06:45 fetching corpus: 3191, signal 189712/228916 (executing program) 2022/09/12 18:06:45 fetching corpus: 3241, signal 190747/230028 (executing program) 2022/09/12 18:06:45 fetching corpus: 3291, signal 191625/231040 (executing program) 2022/09/12 18:06:45 fetching corpus: 3341, signal 192980/232323 (executing program) 2022/09/12 18:06:45 fetching corpus: 3391, signal 194054/233417 (executing program) 2022/09/12 18:06:46 fetching corpus: 3441, signal 194830/234366 (executing program) 2022/09/12 18:06:46 fetching corpus: 3491, signal 195633/235306 (executing program) 2022/09/12 18:06:46 fetching corpus: 3541, signal 196674/236362 (executing program) 2022/09/12 18:06:46 fetching corpus: 3591, signal 197338/237240 (executing program) 2022/09/12 18:06:46 fetching corpus: 3641, signal 198258/238218 (executing program) 2022/09/12 18:06:46 fetching corpus: 3691, signal 199104/239150 (executing program) 2022/09/12 18:06:46 fetching corpus: 3741, signal 199563/239902 (executing program) 2022/09/12 18:06:47 fetching corpus: 3791, signal 200730/240957 (executing program) 2022/09/12 18:06:47 fetching corpus: 3841, signal 201953/241994 (executing program) 2022/09/12 18:06:47 fetching corpus: 3891, signal 202504/242702 (executing program) 2022/09/12 18:06:47 fetching corpus: 3941, signal 203573/243635 (executing program) 2022/09/12 18:06:47 fetching corpus: 3991, signal 204492/244472 (executing program) 2022/09/12 18:06:47 fetching corpus: 4041, signal 205233/245208 (executing program) 2022/09/12 18:06:47 fetching corpus: 4091, signal 206040/246033 (executing program) 2022/09/12 18:06:48 fetching corpus: 4141, signal 206710/246783 (executing program) 2022/09/12 18:06:48 fetching corpus: 4191, signal 207505/247574 (executing program) 2022/09/12 18:06:48 fetching corpus: 4241, signal 208697/248471 (executing program) 2022/09/12 18:06:48 fetching corpus: 4291, signal 209413/249186 (executing program) 2022/09/12 18:06:48 fetching corpus: 4341, signal 210218/249941 (executing program) 2022/09/12 18:06:48 fetching corpus: 4391, signal 210637/250528 (executing program) 2022/09/12 18:06:48 fetching corpus: 4441, signal 211492/251213 (executing program) 2022/09/12 18:06:49 fetching corpus: 4491, signal 212624/251977 (executing program) 2022/09/12 18:06:49 fetching corpus: 4541, signal 213207/252603 (executing program) 2022/09/12 18:06:49 fetching corpus: 4591, signal 214238/253363 (executing program) 2022/09/12 18:06:49 fetching corpus: 4641, signal 214771/253935 (executing program) 2022/09/12 18:06:49 fetching corpus: 4691, signal 215429/254555 (executing program) 2022/09/12 18:06:49 fetching corpus: 4741, signal 215984/255128 (executing program) 2022/09/12 18:06:49 fetching corpus: 4791, signal 217174/255865 (executing program) 2022/09/12 18:06:50 fetching corpus: 4841, signal 217922/256472 (executing program) 2022/09/12 18:06:50 fetching corpus: 4891, signal 218617/257060 (executing program) 2022/09/12 18:06:50 fetching corpus: 4941, signal 219308/257656 (executing program) 2022/09/12 18:06:50 fetching corpus: 4991, signal 219864/258160 (executing program) 2022/09/12 18:06:50 fetching corpus: 5041, signal 220750/258761 (executing program) 2022/09/12 18:06:50 fetching corpus: 5091, signal 221525/259345 (executing program) 2022/09/12 18:06:50 fetching corpus: 5141, signal 222308/259870 (executing program) 2022/09/12 18:06:50 fetching corpus: 5191, signal 223062/260454 (executing program) 2022/09/12 18:06:51 fetching corpus: 5241, signal 223445/260922 (executing program) 2022/09/12 18:06:51 fetching corpus: 5291, signal 223957/261377 (executing program) 2022/09/12 18:06:51 fetching corpus: 5341, signal 224791/261897 (executing program) 2022/09/12 18:06:51 fetching corpus: 5391, signal 225730/262444 (executing program) 2022/09/12 18:06:51 fetching corpus: 5441, signal 226477/262911 (executing program) 2022/09/12 18:06:51 fetching corpus: 5491, signal 227126/263388 (executing program) 2022/09/12 18:06:51 fetching corpus: 5541, signal 227598/263817 (executing program) 2022/09/12 18:06:52 fetching corpus: 5591, signal 228196/264207 (executing program) 2022/09/12 18:06:52 fetching corpus: 5641, signal 228739/264591 (executing program) 2022/09/12 18:06:52 fetching corpus: 5691, signal 229258/264999 (executing program) 2022/09/12 18:06:52 fetching corpus: 5741, signal 229667/265363 (executing program) 2022/09/12 18:06:52 fetching corpus: 5791, signal 230509/265759 (executing program) 2022/09/12 18:06:52 fetching corpus: 5841, signal 231107/266158 (executing program) 2022/09/12 18:06:52 fetching corpus: 5891, signal 231666/266519 (executing program) 2022/09/12 18:06:53 fetching corpus: 5941, signal 232266/266999 (executing program) 2022/09/12 18:06:53 fetching corpus: 5991, signal 232659/267320 (executing program) 2022/09/12 18:06:53 fetching corpus: 6041, signal 233135/267713 (executing program) 2022/09/12 18:06:53 fetching corpus: 6091, signal 233748/268077 (executing program) 2022/09/12 18:06:53 fetching corpus: 6141, signal 234101/268404 (executing program) 2022/09/12 18:06:53 fetching corpus: 6191, signal 234974/268708 (executing program) 2022/09/12 18:06:53 fetching corpus: 6241, signal 235525/268998 (executing program) 2022/09/12 18:06:53 fetching corpus: 6291, signal 236003/269285 (executing program) 2022/09/12 18:06:54 fetching corpus: 6341, signal 236528/269590 (executing program) 2022/09/12 18:06:54 fetching corpus: 6391, signal 237137/269866 (executing program) 2022/09/12 18:06:54 fetching corpus: 6441, signal 237733/270144 (executing program) 2022/09/12 18:06:54 fetching corpus: 6491, signal 238317/270374 (executing program) 2022/09/12 18:06:54 fetching corpus: 6541, signal 238966/270554 (executing program) 2022/09/12 18:06:54 fetching corpus: 6591, signal 239443/270558 (executing program) 2022/09/12 18:06:54 fetching corpus: 6641, signal 240091/270565 (executing program) 2022/09/12 18:06:55 fetching corpus: 6691, signal 240526/270567 (executing program) 2022/09/12 18:06:55 fetching corpus: 6741, signal 241204/270571 (executing program) 2022/09/12 18:06:55 fetching corpus: 6791, signal 241820/270573 (executing program) 2022/09/12 18:06:55 fetching corpus: 6841, signal 242271/270588 (executing program) 2022/09/12 18:06:55 fetching corpus: 6891, signal 242841/270610 (executing program) 2022/09/12 18:06:55 fetching corpus: 6941, signal 243473/270668 (executing program) 2022/09/12 18:06:55 fetching corpus: 6991, signal 244035/270684 (executing program) 2022/09/12 18:06:56 fetching corpus: 7041, signal 244333/270687 (executing program) 2022/09/12 18:06:56 fetching corpus: 7091, signal 244878/270712 (executing program) 2022/09/12 18:06:56 fetching corpus: 7141, signal 245442/270796 (executing program) 2022/09/12 18:06:56 fetching corpus: 7191, signal 245906/270810 (executing program) 2022/09/12 18:06:56 fetching corpus: 7241, signal 246210/270845 (executing program) 2022/09/12 18:06:56 fetching corpus: 7291, signal 246756/270845 (executing program) 2022/09/12 18:06:56 fetching corpus: 7341, signal 247241/270846 (executing program) 2022/09/12 18:06:57 fetching corpus: 7391, signal 247898/270865 (executing program) 2022/09/12 18:06:57 fetching corpus: 7441, signal 248482/270865 (executing program) 2022/09/12 18:06:57 fetching corpus: 7491, signal 248853/270877 (executing program) 2022/09/12 18:06:57 fetching corpus: 7541, signal 249349/270885 (executing program) 2022/09/12 18:06:57 fetching corpus: 7591, signal 249781/270925 (executing program) 2022/09/12 18:06:57 fetching corpus: 7641, signal 250161/270933 (executing program) 2022/09/12 18:06:57 fetching corpus: 7691, signal 250507/270933 (executing program) 2022/09/12 18:06:57 fetching corpus: 7741, signal 251026/270946 (executing program) 2022/09/12 18:06:58 fetching corpus: 7791, signal 251570/270952 (executing program) 2022/09/12 18:06:58 fetching corpus: 7841, signal 252064/270975 (executing program) 2022/09/12 18:06:58 fetching corpus: 7891, signal 252372/270977 (executing program) 2022/09/12 18:06:58 fetching corpus: 7941, signal 253212/271006 (executing program) 2022/09/12 18:06:58 fetching corpus: 7991, signal 253781/271011 (executing program) 2022/09/12 18:06:59 fetching corpus: 8041, signal 254117/271043 (executing program) 2022/09/12 18:06:59 fetching corpus: 8091, signal 254614/271076 (executing program) 2022/09/12 18:06:59 fetching corpus: 8141, signal 255085/271086 (executing program) 2022/09/12 18:06:59 fetching corpus: 8191, signal 255610/271094 (executing program) 2022/09/12 18:06:59 fetching corpus: 8241, signal 256006/271102 (executing program) 2022/09/12 18:06:59 fetching corpus: 8291, signal 256443/271121 (executing program) 2022/09/12 18:06:59 fetching corpus: 8341, signal 256698/271133 (executing program) 2022/09/12 18:06:59 fetching corpus: 8391, signal 257202/271136 (executing program) 2022/09/12 18:07:00 fetching corpus: 8441, signal 257700/271145 (executing program) 2022/09/12 18:07:00 fetching corpus: 8491, signal 258034/271154 (executing program) 2022/09/12 18:07:00 fetching corpus: 8541, signal 258487/271161 (executing program) 2022/09/12 18:07:00 fetching corpus: 8591, signal 259004/271246 (executing program) 2022/09/12 18:07:00 fetching corpus: 8641, signal 259511/271250 (executing program) 2022/09/12 18:07:00 fetching corpus: 8691, signal 259943/271257 (executing program) 2022/09/12 18:07:00 fetching corpus: 8741, signal 260428/271263 (executing program) 2022/09/12 18:07:01 fetching corpus: 8791, signal 260952/271268 (executing program) 2022/09/12 18:07:01 fetching corpus: 8791, signal 260952/271268 (executing program) 2022/09/12 18:07:03 starting 8 fuzzer processes 18:07:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000002c0)={0x0, 0x8}) 18:07:03 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0505405, &(0x7f00000000c0)={{0x1}}) 18:07:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1030c2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_io_uring_setup(0x0, &(0x7f0000000140)={0x0, 0x3b61, 0x0, 0x2, 0x278}, &(0x7f0000ff3000/0xd000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000300)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="b0cabfc4e6e8db1f6046e8f1816d2210267bfcfa857fbd89192a1d2b2d0ba19e067d9a594886f2e5b09bd54fa57a6e280fd454b178d17b86c4595133ce0c923e"]) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000240)={0xc0000008}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x8) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) getsockname$packet(r3, &(0x7f0000003ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003b00)=0x14) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x430840, 0x2) 18:07:03 executing program 3: r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x6) fcntl$addseals(r0, 0x40a, 0x0) 18:07:03 executing program 4: syz_io_uring_setup(0x5df3, &(0x7f00000000c0), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, 0x0) r0 = io_uring_setup(0x328a, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_FILES(r0, 0x18, &(0x7f0000000100)=[0xffffffffffffffff], 0x1) [ 81.641447] audit: type=1400 audit(1663006023.779:6): avc: denied { execmem } for pid=286 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 18:07:03 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000001340)=0xd) 18:07:03 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_io_uring_setup(0x7969, &(0x7f00000001c0)={0x0, 0xfc32, 0x0, 0x3, 0x109}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000240)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0xea, 0x0, 0x6, 0x2020, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000300), 0xd}, 0x14844, 0xc03, 0x7f, 0x4, 0x4, 0x8, 0x80, 0x0, 0x0, 0x0, 0x8001}, 0xffffffffffffffff, 0xc, r1, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x6df0000000000000}, 0x0, 0xc00000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001200)) r3 = syz_open_procfs(0x0, &(0x7f00000011c0)='mountinfo\x00') preadv(r3, &(0x7f0000001140)=[{0x0}], 0x1, 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000140)=0x8, 0x9) openat(0xffffffffffffffff, &(0x7f0000001180)='./file0\x00', 0x100, 0x8) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x650881, 0x0) 18:07:03 executing program 7: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) write$P9_RWSTAT(r0, 0x0, 0x0) [ 82.913570] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 82.915384] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 82.917603] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 82.920269] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 82.922460] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 82.923747] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 82.929278] Bluetooth: hci0: HCI_REQ-0x0c1a [ 82.984972] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 82.987002] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 82.989351] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 82.990983] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 82.993266] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 82.994311] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 82.995372] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 82.996408] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 82.997753] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 82.998772] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 82.999932] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 83.002147] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 83.006909] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 83.008110] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 83.010174] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 83.015565] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 83.019512] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 83.036488] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 83.037038] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 83.037612] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 83.038141] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 83.039980] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 83.040753] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 83.041530] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 83.045019] Bluetooth: hci3: HCI_REQ-0x0c1a [ 83.046253] Bluetooth: hci1: HCI_REQ-0x0c1a [ 83.048462] Bluetooth: hci2: HCI_REQ-0x0c1a [ 83.053917] Bluetooth: hci4: HCI_REQ-0x0c1a [ 83.106932] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 83.109064] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 83.113555] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 83.118403] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 83.119858] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 83.121120] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 83.150624] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 83.162346] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 83.164382] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 83.165422] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 83.189913] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 83.194304] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 83.195299] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 83.203792] Bluetooth: hci5: HCI_REQ-0x0c1a [ 83.206248] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 83.207217] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 83.248991] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 83.250238] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 83.250906] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 83.251565] Bluetooth: hci7: HCI_REQ-0x0c1a [ 83.343748] Bluetooth: hci6: HCI_REQ-0x0c1a [ 85.001843] Bluetooth: hci0: command 0x0409 tx timeout [ 85.065290] Bluetooth: hci3: command 0x0409 tx timeout [ 85.129354] Bluetooth: hci2: command 0x0409 tx timeout [ 85.130437] Bluetooth: hci4: command 0x0409 tx timeout [ 85.131860] Bluetooth: hci1: command 0x0409 tx timeout [ 85.257351] Bluetooth: hci5: command 0x0409 tx timeout [ 85.321219] Bluetooth: hci7: command 0x0409 tx timeout [ 85.385363] Bluetooth: hci6: command 0x0409 tx timeout [ 87.049244] Bluetooth: hci0: command 0x041b tx timeout [ 87.113303] Bluetooth: hci3: command 0x041b tx timeout [ 87.177393] Bluetooth: hci1: command 0x041b tx timeout [ 87.178702] Bluetooth: hci4: command 0x041b tx timeout [ 87.179597] Bluetooth: hci2: command 0x041b tx timeout [ 87.305263] Bluetooth: hci5: command 0x041b tx timeout [ 87.370233] Bluetooth: hci7: command 0x041b tx timeout [ 87.433337] Bluetooth: hci6: command 0x041b tx timeout [ 89.098342] Bluetooth: hci0: command 0x040f tx timeout [ 89.161235] Bluetooth: hci3: command 0x040f tx timeout [ 89.225271] Bluetooth: hci2: command 0x040f tx timeout [ 89.226221] Bluetooth: hci4: command 0x040f tx timeout [ 89.227015] Bluetooth: hci1: command 0x040f tx timeout [ 89.353322] Bluetooth: hci5: command 0x040f tx timeout [ 89.417230] Bluetooth: hci7: command 0x040f tx timeout [ 89.481234] Bluetooth: hci6: command 0x040f tx timeout [ 91.145270] Bluetooth: hci0: command 0x0419 tx timeout [ 91.209240] Bluetooth: hci3: command 0x0419 tx timeout [ 91.274325] Bluetooth: hci1: command 0x0419 tx timeout [ 91.275704] Bluetooth: hci4: command 0x0419 tx timeout [ 91.276835] Bluetooth: hci2: command 0x0419 tx timeout [ 91.401267] Bluetooth: hci5: command 0x0419 tx timeout [ 91.465353] Bluetooth: hci7: command 0x0419 tx timeout [ 91.529239] Bluetooth: hci6: command 0x0419 tx timeout [ 137.643903] audit: type=1400 audit(1663006079.782:7): avc: denied { open } for pid=3896 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 137.645586] audit: type=1400 audit(1663006079.782:8): avc: denied { kernel } for pid=3896 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 137.664697] ------------[ cut here ]------------ [ 137.664720] [ 137.664724] ====================================================== [ 137.664727] WARNING: possible circular locking dependency detected [ 137.664732] 6.0.0-rc5-next-20220912 #1 Not tainted [ 137.664738] ------------------------------------------------------ [ 137.664742] syz-executor.2/3898 is trying to acquire lock: [ 137.664748] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 137.664788] [ 137.664788] but task is already holding lock: [ 137.664791] ffff88800f396c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 137.664819] [ 137.664819] which lock already depends on the new lock. [ 137.664819] [ 137.664822] [ 137.664822] the existing dependency chain (in reverse order) is: [ 137.664825] [ 137.664825] -> #3 (&ctx->lock){....}-{2:2}: [ 137.664839] _raw_spin_lock+0x2a/0x40 [ 137.664857] __perf_event_task_sched_out+0x53b/0x18d0 [ 137.664869] __schedule+0xedd/0x2470 [ 137.664879] schedule+0xda/0x1b0 [ 137.664888] futex_wait_queue+0xf5/0x1e0 [ 137.664900] futex_wait+0x28e/0x690 [ 137.664910] do_futex+0x2ff/0x380 [ 137.664919] __x64_sys_futex+0x1c6/0x4d0 [ 137.664929] do_syscall_64+0x3b/0x90 [ 137.664943] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 137.664960] [ 137.664960] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 137.664974] _raw_spin_lock_nested+0x30/0x40 [ 137.664989] raw_spin_rq_lock_nested+0x1e/0x30 [ 137.665002] task_fork_fair+0x63/0x4d0 [ 137.665020] sched_cgroup_fork+0x3d0/0x540 [ 137.665034] copy_process+0x3f9e/0x6df0 [ 137.665045] kernel_clone+0xe7/0x890 [ 137.665055] user_mode_thread+0xad/0xf0 [ 137.665065] rest_init+0x24/0x250 [ 137.665081] arch_call_rest_init+0xf/0x14 [ 137.665101] start_kernel+0x4c1/0x4e6 [ 137.665118] secondary_startup_64_no_verify+0xe0/0xeb [ 137.665133] [ 137.665133] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 137.665147] _raw_spin_lock_irqsave+0x39/0x60 [ 137.665164] try_to_wake_up+0xab/0x1920 [ 137.665178] up+0x75/0xb0 [ 137.665189] __up_console_sem+0x6e/0x80 [ 137.665206] console_unlock+0x46a/0x590 [ 137.665222] vprintk_emit+0x1bd/0x560 [ 137.665239] vprintk+0x84/0xa0 [ 137.665255] _printk+0xba/0xf1 [ 137.665276] kauditd_hold_skb.cold+0x3f/0x4e [ 137.665290] kauditd_send_queue+0x233/0x290 [ 137.665305] kauditd_thread+0x5da/0x9a0 [ 137.665319] kthread+0x2ed/0x3a0 [ 137.665335] ret_from_fork+0x22/0x30 [ 137.665347] [ 137.665347] -> #0 ((console_sem).lock){....}-{2:2}: [ 137.665361] __lock_acquire+0x2a02/0x5e70 [ 137.665378] lock_acquire+0x1a2/0x530 [ 137.665394] _raw_spin_lock_irqsave+0x39/0x60 [ 137.665409] down_trylock+0xe/0x70 [ 137.665421] __down_trylock_console_sem+0x3b/0xd0 [ 137.665438] vprintk_emit+0x16b/0x560 [ 137.665454] vprintk+0x84/0xa0 [ 137.665471] _printk+0xba/0xf1 [ 137.665487] report_bug.cold+0x72/0xab [ 137.665499] handle_bug+0x3c/0x70 [ 137.665512] exc_invalid_op+0x14/0x50 [ 137.665525] asm_exc_invalid_op+0x16/0x20 [ 137.665541] group_sched_out.part.0+0x2c7/0x460 [ 137.665552] ctx_sched_out+0x8f1/0xc10 [ 137.665562] __perf_event_task_sched_out+0x6d0/0x18d0 [ 137.665574] __schedule+0xedd/0x2470 [ 137.665583] schedule+0xda/0x1b0 [ 137.665592] futex_wait_queue+0xf5/0x1e0 [ 137.665603] futex_wait+0x28e/0x690 [ 137.665612] do_futex+0x2ff/0x380 [ 137.665621] __x64_sys_futex+0x1c6/0x4d0 [ 137.665631] do_syscall_64+0x3b/0x90 [ 137.665644] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 137.665660] [ 137.665660] other info that might help us debug this: [ 137.665660] [ 137.665663] Chain exists of: [ 137.665663] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 137.665663] [ 137.665678] Possible unsafe locking scenario: [ 137.665678] [ 137.665681] CPU0 CPU1 [ 137.665683] ---- ---- [ 137.665685] lock(&ctx->lock); [ 137.665691] lock(&rq->__lock); [ 137.665697] lock(&ctx->lock); [ 137.665704] lock((console_sem).lock); [ 137.665709] [ 137.665709] *** DEADLOCK *** [ 137.665709] [ 137.665711] 2 locks held by syz-executor.2/3898: [ 137.665718] #0: ffff88806ce37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 137.665743] #1: ffff88800f396c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 137.665771] [ 137.665771] stack backtrace: [ 137.665774] CPU: 0 PID: 3898 Comm: syz-executor.2 Not tainted 6.0.0-rc5-next-20220912 #1 [ 137.665786] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 137.665795] Call Trace: [ 137.665798] [ 137.665803] dump_stack_lvl+0x8b/0xb3 [ 137.665817] check_noncircular+0x263/0x2e0 [ 137.665834] ? format_decode+0x26c/0xb50 [ 137.665849] ? print_circular_bug+0x450/0x450 [ 137.665867] ? enable_ptr_key_workfn+0x20/0x20 [ 137.665882] ? format_decode+0x26c/0xb50 [ 137.665897] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 137.665915] __lock_acquire+0x2a02/0x5e70 [ 137.665937] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 137.665960] lock_acquire+0x1a2/0x530 [ 137.665977] ? down_trylock+0xe/0x70 [ 137.665991] ? rcu_read_unlock+0x40/0x40 [ 137.666013] ? vprintk+0x84/0xa0 [ 137.666031] _raw_spin_lock_irqsave+0x39/0x60 [ 137.666046] ? down_trylock+0xe/0x70 [ 137.666060] down_trylock+0xe/0x70 [ 137.666073] ? vprintk+0x84/0xa0 [ 137.666091] __down_trylock_console_sem+0x3b/0xd0 [ 137.666109] vprintk_emit+0x16b/0x560 [ 137.666128] vprintk+0x84/0xa0 [ 137.666146] _printk+0xba/0xf1 [ 137.666163] ? record_print_text.cold+0x16/0x16 [ 137.666185] ? report_bug.cold+0x66/0xab [ 137.666199] ? group_sched_out.part.0+0x2c7/0x460 [ 137.666211] report_bug.cold+0x72/0xab [ 137.666225] handle_bug+0x3c/0x70 [ 137.666239] exc_invalid_op+0x14/0x50 [ 137.666253] asm_exc_invalid_op+0x16/0x20 [ 137.666270] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 137.666284] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 137.666296] RSP: 0018:ffff888042eaf8f8 EFLAGS: 00010006 [ 137.666305] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 137.666313] RDX: ffff888042548000 RSI: ffffffff81566027 RDI: 0000000000000005 [ 137.666320] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 137.666328] R10: 0000000000000000 R11: ffffffff865aa01b R12: ffff88800f396c00 [ 137.666336] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 137.666347] ? group_sched_out.part.0+0x2c7/0x460 [ 137.666360] ? group_sched_out.part.0+0x2c7/0x460 [ 137.666372] ctx_sched_out+0x8f1/0xc10 [ 137.666385] __perf_event_task_sched_out+0x6d0/0x18d0 [ 137.666400] ? lock_is_held_type+0xd7/0x130 [ 137.666419] ? __perf_cgroup_move+0x160/0x160 [ 137.666431] ? set_next_entity+0x304/0x550 [ 137.666451] ? lock_is_held_type+0xd7/0x130 [ 137.666470] __schedule+0xedd/0x2470 [ 137.666483] ? io_schedule_timeout+0x150/0x150 [ 137.666494] ? futex_wait_setup+0x166/0x230 [ 137.666508] schedule+0xda/0x1b0 [ 137.666519] futex_wait_queue+0xf5/0x1e0 [ 137.666531] futex_wait+0x28e/0x690 [ 137.666543] ? futex_wait_setup+0x230/0x230 [ 137.666556] ? wake_up_q+0x8b/0xf0 [ 137.666569] ? do_raw_spin_unlock+0x4f/0x220 [ 137.666589] ? futex_wake+0x158/0x490 [ 137.666605] ? fd_install+0x1f9/0x640 [ 137.666623] do_futex+0x2ff/0x380 [ 137.666634] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0 [ 137.666650] __x64_sys_futex+0x1c6/0x4d0 [ 137.666663] ? __x64_sys_futex_time32+0x480/0x480 [ 137.666675] ? syscall_enter_from_user_mode+0x1d/0x50 [ 137.666694] ? syscall_enter_from_user_mode+0x1d/0x50 [ 137.666714] do_syscall_64+0x3b/0x90 [ 137.666727] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 137.666745] RIP: 0033:0x7fc8eb3deb19 [ 137.666753] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 137.666764] RSP: 002b:00007fc8e8954218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 137.666775] RAX: ffffffffffffffda RBX: 00007fc8eb4f1f68 RCX: 00007fc8eb3deb19 [ 137.666783] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fc8eb4f1f68 [ 137.666790] RBP: 00007fc8eb4f1f60 R08: 0000000000000000 R09: 0000000000000000 [ 137.666798] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8eb4f1f6c [ 137.666805] R13: 00007ffe19c8fcbf R14: 00007fc8e8954300 R15: 0000000000022000 [ 137.666818] [ 137.726918] WARNING: CPU: 0 PID: 3898 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 137.727593] Modules linked in: [ 137.727836] CPU: 0 PID: 3898 Comm: syz-executor.2 Not tainted 6.0.0-rc5-next-20220912 #1 [ 137.728426] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 137.729255] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 137.729662] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 137.731003] RSP: 0018:ffff888042eaf8f8 EFLAGS: 00010006 [ 137.731417] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 137.731958] RDX: ffff888042548000 RSI: ffffffff81566027 RDI: 0000000000000005 [ 137.732481] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 137.733021] R10: 0000000000000000 R11: ffffffff865aa01b R12: ffff88800f396c00 [ 137.733542] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 137.734062] FS: 00007fc8e8954700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 137.734654] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 137.735087] CR2: 00007f8dcb4db260 CR3: 00000000364ca000 CR4: 0000000000350ef0 [ 137.735612] Call Trace: [ 137.735802] [ 137.735976] ctx_sched_out+0x8f1/0xc10 [ 137.736269] __perf_event_task_sched_out+0x6d0/0x18d0 [ 137.736667] ? lock_is_held_type+0xd7/0x130 [ 137.736992] ? __perf_cgroup_move+0x160/0x160 [ 137.737330] ? set_next_entity+0x304/0x550 [ 137.737655] ? lock_is_held_type+0xd7/0x130 [ 137.737981] __schedule+0xedd/0x2470 [ 137.738261] ? io_schedule_timeout+0x150/0x150 [ 137.738604] ? futex_wait_setup+0x166/0x230 [ 137.738929] schedule+0xda/0x1b0 [ 137.739188] futex_wait_queue+0xf5/0x1e0 [ 137.739495] futex_wait+0x28e/0x690 [ 137.739771] ? futex_wait_setup+0x230/0x230 [ 137.740090] ? wake_up_q+0x8b/0xf0 [ 137.740363] ? do_raw_spin_unlock+0x4f/0x220 [ 137.740712] ? futex_wake+0x158/0x490 [ 137.741003] ? fd_install+0x1f9/0x640 [ 137.741298] do_futex+0x2ff/0x380 [ 137.741564] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0 [ 137.742003] __x64_sys_futex+0x1c6/0x4d0 [ 137.742308] ? __x64_sys_futex_time32+0x480/0x480 [ 137.742667] ? syscall_enter_from_user_mode+0x1d/0x50 [ 137.743057] ? syscall_enter_from_user_mode+0x1d/0x50 [ 137.743438] do_syscall_64+0x3b/0x90 [ 137.743726] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 137.744114] RIP: 0033:0x7fc8eb3deb19 [ 137.744399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 137.745700] RSP: 002b:00007fc8e8954218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 137.746238] RAX: ffffffffffffffda RBX: 00007fc8eb4f1f68 RCX: 00007fc8eb3deb19 [ 137.746750] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fc8eb4f1f68 [ 137.747279] RBP: 00007fc8eb4f1f60 R08: 0000000000000000 R09: 0000000000000000 [ 137.747803] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8eb4f1f6c [ 137.748329] R13: 00007ffe19c8fcbf R14: 00007fc8e8954300 R15: 0000000000022000 [ 137.748867] [ 137.749046] irq event stamp: 1638 [ 137.749300] hardirqs last enabled at (1637): [] syscall_enter_from_user_mode+0x1d/0x50 [ 137.750010] hardirqs last disabled at (1638): [] __schedule+0x1225/0x2470 [ 137.750617] softirqs last enabled at (1494): [] __irq_exit_rcu+0x11b/0x180 [ 137.751260] softirqs last disabled at (1463): [] __irq_exit_rcu+0x11b/0x180 [ 137.751898] ---[ end trace 0000000000000000 ]--- [ 138.132938] audit: type=1400 audit(1663006080.271:9): avc: denied { write } for pid=3928 comm="syz-executor.6" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 18:08:00 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0505405, &(0x7f00000000c0)={{0x1}}) 18:08:00 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010004000100000018000000", @ANYRES32=r0, @ANYBLOB="ffff0000000000002e2f66696c653000"]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000140)="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", 0x3b8}], 0x1) 18:08:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1030c2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_io_uring_setup(0x0, &(0x7f0000000140)={0x0, 0x3b61, 0x0, 0x2, 0x278}, &(0x7f0000ff3000/0xd000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000300)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="b0cabfc4e6e8db1f6046e8f1816d2210267bfcfa857fbd89192a1d2b2d0ba19e067d9a594886f2e5b09bd54fa57a6e280fd454b178d17b86c4595133ce0c923e"]) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000240)={0xc0000008}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x8) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) getsockname$packet(r3, &(0x7f0000003ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003b00)=0x14) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x430840, 0x2) 18:08:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1030c2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_io_uring_setup(0x0, &(0x7f0000000140)={0x0, 0x3b61, 0x0, 0x2, 0x278}, &(0x7f0000ff3000/0xd000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000300)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="b0cabfc4e6e8db1f6046e8f1816d2210267bfcfa857fbd89192a1d2b2d0ba19e067d9a594886f2e5b09bd54fa57a6e280fd454b178d17b86c4595133ce0c923e"]) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000240)={0xc0000008}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x8) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) getsockname$packet(r3, &(0x7f0000003ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003b00)=0x14) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x430840, 0x2) 18:08:00 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_io_uring_setup(0x7969, &(0x7f00000001c0)={0x0, 0xfc32, 0x0, 0x3, 0x109}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000240)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0xea, 0x0, 0x6, 0x2020, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000300), 0xd}, 0x14844, 0xc03, 0x7f, 0x4, 0x4, 0x8, 0x80, 0x0, 0x0, 0x0, 0x8001}, 0xffffffffffffffff, 0xc, r1, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x6df0000000000000}, 0x0, 0xc00000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001200)) r3 = syz_open_procfs(0x0, &(0x7f00000011c0)='mountinfo\x00') preadv(r3, &(0x7f0000001140)=[{0x0}], 0x1, 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000140)=0x8, 0x9) openat(0xffffffffffffffff, &(0x7f0000001180)='./file0\x00', 0x100, 0x8) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x650881, 0x0) 18:08:00 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_io_uring_setup(0x7969, &(0x7f00000001c0)={0x0, 0xfc32, 0x0, 0x3, 0x109}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000240)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0xea, 0x0, 0x6, 0x2020, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000300), 0xd}, 0x14844, 0xc03, 0x7f, 0x4, 0x4, 0x8, 0x80, 0x0, 0x0, 0x0, 0x8001}, 0xffffffffffffffff, 0xc, r1, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x6df0000000000000}, 0x0, 0xc00000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001200)) r3 = syz_open_procfs(0x0, &(0x7f00000011c0)='mountinfo\x00') preadv(r3, &(0x7f0000001140)=[{0x0}], 0x1, 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000140)=0x8, 0x9) openat(0xffffffffffffffff, &(0x7f0000001180)='./file0\x00', 0x100, 0x8) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x650881, 0x0) 18:08:00 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_io_uring_setup(0x7969, &(0x7f00000001c0)={0x0, 0xfc32, 0x0, 0x3, 0x109}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000240)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0xea, 0x0, 0x6, 0x2020, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000300), 0xd}, 0x14844, 0xc03, 0x7f, 0x4, 0x4, 0x8, 0x80, 0x0, 0x0, 0x0, 0x8001}, 0xffffffffffffffff, 0xc, r1, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x6df0000000000000}, 0x0, 0xc00000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001200)) r3 = syz_open_procfs(0x0, &(0x7f00000011c0)='mountinfo\x00') preadv(r3, &(0x7f0000001140)=[{0x0}], 0x1, 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000140)=0x8, 0x9) openat(0xffffffffffffffff, &(0x7f0000001180)='./file0\x00', 0x100, 0x8) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x650881, 0x0) 18:08:00 executing program 5: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_io_uring_setup(0x7969, &(0x7f00000001c0)={0x0, 0xfc32, 0x0, 0x3, 0x109}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000240)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0xea, 0x0, 0x6, 0x2020, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000300), 0xd}, 0x14844, 0xc03, 0x7f, 0x4, 0x4, 0x8, 0x80, 0x0, 0x0, 0x0, 0x8001}, 0xffffffffffffffff, 0xc, r1, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x6df0000000000000}, 0x0, 0xc00000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001200)) r3 = syz_open_procfs(0x0, &(0x7f00000011c0)='mountinfo\x00') preadv(r3, &(0x7f0000001140)=[{0x0}], 0x1, 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000140)=0x8, 0x9) openat(0xffffffffffffffff, &(0x7f0000001180)='./file0\x00', 0x100, 0x8) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x650881, 0x0) 18:08:00 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0505405, &(0x7f00000000c0)={{0x1}}) 18:08:00 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_io_uring_setup(0x7969, &(0x7f00000001c0)={0x0, 0xfc32, 0x0, 0x3, 0x109}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000240)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0xea, 0x0, 0x6, 0x2020, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000300), 0xd}, 0x14844, 0xc03, 0x7f, 0x4, 0x4, 0x8, 0x80, 0x0, 0x0, 0x0, 0x8001}, 0xffffffffffffffff, 0xc, r1, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x6df0000000000000}, 0x0, 0xc00000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001200)) r3 = syz_open_procfs(0x0, &(0x7f00000011c0)='mountinfo\x00') preadv(r3, &(0x7f0000001140)=[{0x0}], 0x1, 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000140)=0x8, 0x9) openat(0xffffffffffffffff, &(0x7f0000001180)='./file0\x00', 0x100, 0x8) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x650881, 0x0) 18:08:00 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_io_uring_setup(0x7969, &(0x7f00000001c0)={0x0, 0xfc32, 0x0, 0x3, 0x109}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000240)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0xea, 0x0, 0x6, 0x2020, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000300), 0xd}, 0x14844, 0xc03, 0x7f, 0x4, 0x4, 0x8, 0x80, 0x0, 0x0, 0x0, 0x8001}, 0xffffffffffffffff, 0xc, r1, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x6df0000000000000}, 0x0, 0xc00000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001200)) r3 = syz_open_procfs(0x0, &(0x7f00000011c0)='mountinfo\x00') preadv(r3, &(0x7f0000001140)=[{0x0}], 0x1, 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000140)=0x8, 0x9) openat(0xffffffffffffffff, &(0x7f0000001180)='./file0\x00', 0x100, 0x8) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x650881, 0x0) 18:08:00 executing program 5: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_io_uring_setup(0x7969, &(0x7f00000001c0)={0x0, 0xfc32, 0x0, 0x3, 0x109}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000240)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0xea, 0x0, 0x6, 0x2020, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000300), 0xd}, 0x14844, 0xc03, 0x7f, 0x4, 0x4, 0x8, 0x80, 0x0, 0x0, 0x0, 0x8001}, 0xffffffffffffffff, 0xc, r1, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x6df0000000000000}, 0x0, 0xc00000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001200)) r3 = syz_open_procfs(0x0, &(0x7f00000011c0)='mountinfo\x00') preadv(r3, &(0x7f0000001140)=[{0x0}], 0x1, 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000140)=0x8, 0x9) openat(0xffffffffffffffff, &(0x7f0000001180)='./file0\x00', 0x100, 0x8) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x650881, 0x0) 18:08:00 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010004000100000018000000", @ANYRES32=r0, @ANYBLOB="ffff0000000000002e2f66696c653000"]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000140)="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", 0x3b8}], 0x1) 18:08:00 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0505405, &(0x7f00000000c0)={{0x1}}) 18:08:00 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_io_uring_setup(0x7969, &(0x7f00000001c0)={0x0, 0xfc32, 0x0, 0x3, 0x109}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000240)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0xea, 0x0, 0x6, 0x2020, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000300), 0xd}, 0x14844, 0xc03, 0x7f, 0x4, 0x4, 0x8, 0x80, 0x0, 0x0, 0x0, 0x8001}, 0xffffffffffffffff, 0xc, r1, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x6df0000000000000}, 0x0, 0xc00000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001200)) r3 = syz_open_procfs(0x0, &(0x7f00000011c0)='mountinfo\x00') preadv(r3, &(0x7f0000001140)=[{0x0}], 0x1, 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000140)=0x8, 0x9) openat(0xffffffffffffffff, &(0x7f0000001180)='./file0\x00', 0x100, 0x8) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x650881, 0x0) 18:08:00 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010004000100000018000000", @ANYRES32=r0, @ANYBLOB="ffff0000000000002e2f66696c653000"]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000140)="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", 0x3b8}], 0x1) 18:08:00 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_io_uring_setup(0x7969, &(0x7f00000001c0)={0x0, 0xfc32, 0x0, 0x3, 0x109}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000240)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0xea, 0x0, 0x6, 0x2020, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000300), 0xd}, 0x14844, 0xc03, 0x7f, 0x4, 0x4, 0x8, 0x80, 0x0, 0x0, 0x0, 0x8001}, 0xffffffffffffffff, 0xc, r1, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x6df0000000000000}, 0x0, 0xc00000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001200)) r3 = syz_open_procfs(0x0, &(0x7f00000011c0)='mountinfo\x00') preadv(r3, &(0x7f0000001140)=[{0x0}], 0x1, 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000140)=0x8, 0x9) openat(0xffffffffffffffff, &(0x7f0000001180)='./file0\x00', 0x100, 0x8) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x650881, 0x0) 18:08:00 executing program 5: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_io_uring_setup(0x7969, &(0x7f00000001c0)={0x0, 0xfc32, 0x0, 0x3, 0x109}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000240)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0xea, 0x0, 0x6, 0x2020, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000300), 0xd}, 0x14844, 0xc03, 0x7f, 0x4, 0x4, 0x8, 0x80, 0x0, 0x0, 0x0, 0x8001}, 0xffffffffffffffff, 0xc, r1, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x6df0000000000000}, 0x0, 0xc00000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001200)) r3 = syz_open_procfs(0x0, &(0x7f00000011c0)='mountinfo\x00') preadv(r3, &(0x7f0000001140)=[{0x0}], 0x1, 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000140)=0x8, 0x9) openat(0xffffffffffffffff, &(0x7f0000001180)='./file0\x00', 0x100, 0x8) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x650881, 0x0) 18:08:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1030c2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_io_uring_setup(0x0, &(0x7f0000000140)={0x0, 0x3b61, 0x0, 0x2, 0x278}, &(0x7f0000ff3000/0xd000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000300)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="b0cabfc4e6e8db1f6046e8f1816d2210267bfcfa857fbd89192a1d2b2d0ba19e067d9a594886f2e5b09bd54fa57a6e280fd454b178d17b86c4595133ce0c923e"]) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000240)={0xc0000008}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x8) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) getsockname$packet(r3, &(0x7f0000003ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003b00)=0x14) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x430840, 0x2) 18:08:00 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_io_uring_setup(0x7969, &(0x7f00000001c0)={0x0, 0xfc32, 0x0, 0x3, 0x109}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000240)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0xea, 0x0, 0x6, 0x2020, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000300), 0xd}, 0x14844, 0xc03, 0x7f, 0x4, 0x4, 0x8, 0x80, 0x0, 0x0, 0x0, 0x8001}, 0xffffffffffffffff, 0xc, r1, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x6df0000000000000}, 0x0, 0xc00000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001200)) r3 = syz_open_procfs(0x0, &(0x7f00000011c0)='mountinfo\x00') preadv(r3, &(0x7f0000001140)=[{0x0}], 0x1, 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000140)=0x8, 0x9) openat(0xffffffffffffffff, &(0x7f0000001180)='./file0\x00', 0x100, 0x8) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x650881, 0x0) 18:08:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1030c2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_io_uring_setup(0x0, &(0x7f0000000140)={0x0, 0x3b61, 0x0, 0x2, 0x278}, &(0x7f0000ff3000/0xd000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000300)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="b0cabfc4e6e8db1f6046e8f1816d2210267bfcfa857fbd89192a1d2b2d0ba19e067d9a594886f2e5b09bd54fa57a6e280fd454b178d17b86c4595133ce0c923e"]) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000240)={0xc0000008}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x8) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) getsockname$packet(r3, &(0x7f0000003ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003b00)=0x14) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x430840, 0x2) 18:08:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1030c2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_io_uring_setup(0x0, &(0x7f0000000140)={0x0, 0x3b61, 0x0, 0x2, 0x278}, &(0x7f0000ff3000/0xd000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000300)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="b0cabfc4e6e8db1f6046e8f1816d2210267bfcfa857fbd89192a1d2b2d0ba19e067d9a594886f2e5b09bd54fa57a6e280fd454b178d17b86c4595133ce0c923e"]) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000240)={0xc0000008}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x8) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) getsockname$packet(r3, &(0x7f0000003ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003b00)=0x14) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x430840, 0x2) 18:08:01 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_io_uring_setup(0x7969, &(0x7f00000001c0)={0x0, 0xfc32, 0x0, 0x3, 0x109}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000240)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0xea, 0x0, 0x6, 0x2020, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000300), 0xd}, 0x14844, 0xc03, 0x7f, 0x4, 0x4, 0x8, 0x80, 0x0, 0x0, 0x0, 0x8001}, 0xffffffffffffffff, 0xc, r1, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x6df0000000000000}, 0x0, 0xc00000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001200)) r3 = syz_open_procfs(0x0, &(0x7f00000011c0)='mountinfo\x00') preadv(r3, &(0x7f0000001140)=[{0x0}], 0x1, 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000140)=0x8, 0x9) openat(0xffffffffffffffff, &(0x7f0000001180)='./file0\x00', 0x100, 0x8) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x650881, 0x0) 18:08:01 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010004000100000018000000", @ANYRES32=r0, @ANYBLOB="ffff0000000000002e2f66696c653000"]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000140)="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", 0x3b8}], 0x1) 18:08:01 executing program 5: write$selinux_attr(0xffffffffffffffff, &(0x7f0000000000)='/usr/sbin/cups-browsed\x00', 0x17) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) 18:08:01 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000340)=0xeed, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x2, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080), 0x4) 18:08:01 executing program 6: socket$inet6_udplite(0xa, 0x2, 0x88) 18:08:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) sendfile(r0, r0, 0x0, 0x100000) 18:08:01 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) openat2(0xffffffffffffffff, &(0x7f0000000040)='./file2\x00', 0x0, 0x0) symlink(&(0x7f00000001c0)='.\x00', &(0x7f0000000200)='./file0\x00') r0 = open_tree(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{}, {0x0, 0x2710}}, 0x0) 18:08:01 executing program 7: r0 = semget(0x0, 0x4, 0x23c) semctl$GETPID(r0, 0x3, 0xb, &(0x7f0000000000)=""/200) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)={{0x4, 0x7}, {0x47, 0x4}, 0x9}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000180)=0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f00000001c0)={{0x2, r1, 0xffffffffffffffff, 0x0, 0xee00, 0x6}, 0x1, 0xff, 0x0, 0x0, 0x0, 0x0, 0x891c}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x1000, 0x6]) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000280)=[0x31, 0x27, 0x8, 0x3f, 0x2ba, 0xf000]) 18:08:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat(0xffffffffffffffff, &(0x7f0000001ac0)='./file0\x00', 0x14300, 0x8) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r2, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r2], 0x220) openat(r1, 0x0, 0x100000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0/file0\x00'}) listxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000300)=""/4096, 0x1000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) fallocate(r3, 0x3, 0x80000, 0x8000000) write$binfmt_aout(r3, &(0x7f0000001300)={{0xcc, 0x0, 0x52, 0x289, 0x295, 0x5, 0x0, 0x9}, "24f14da56a86b2a113f3cc53ca55bafe991660d1b42188439f2c77c871d17bd6ca9e650fc131bd814bc836be2e", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x74d) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='net/arp\x00') openat$vcs(0xffffffffffffff9c, &(0x7f0000000240), 0xabe2fe4d9e090a4d, 0x0) pread64(r4, &(0x7f0000000180)=""/16, 0x20000190, 0x68000000) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r1, r0, 0x0, 0xfffffdef) 18:08:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1030c2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_io_uring_setup(0x0, &(0x7f0000000140)={0x0, 0x3b61, 0x0, 0x2, 0x278}, &(0x7f0000ff3000/0xd000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000300)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="b0cabfc4e6e8db1f6046e8f1816d2210267bfcfa857fbd89192a1d2b2d0ba19e067d9a594886f2e5b09bd54fa57a6e280fd454b178d17b86c4595133ce0c923e"]) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000240)={0xc0000008}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x8) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) getsockname$packet(r3, &(0x7f0000003ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003b00)=0x14) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x430840, 0x2) 18:08:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1030c2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_io_uring_setup(0x0, &(0x7f0000000140)={0x0, 0x3b61, 0x0, 0x2, 0x278}, &(0x7f0000ff3000/0xd000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000300)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="b0cabfc4e6e8db1f6046e8f1816d2210267bfcfa857fbd89192a1d2b2d0ba19e067d9a594886f2e5b09bd54fa57a6e280fd454b178d17b86c4595133ce0c923e"]) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000240)={0xc0000008}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x8) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) getsockname$packet(r3, &(0x7f0000003ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003b00)=0x14) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x430840, 0x2) 18:08:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1030c2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_io_uring_setup(0x0, &(0x7f0000000140)={0x0, 0x3b61, 0x0, 0x2, 0x278}, &(0x7f0000ff3000/0xd000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000300)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="b0cabfc4e6e8db1f6046e8f1816d2210267bfcfa857fbd89192a1d2b2d0ba19e067d9a594886f2e5b09bd54fa57a6e280fd454b178d17b86c4595133ce0c923e"]) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000240)={0xc0000008}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x8) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) getsockname$packet(r3, &(0x7f0000003ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003b00)=0x14) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x430840, 0x2) 18:08:01 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x422621, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)={{0x10b, 0x40, 0x20, 0x29b, 0x397, 0x5, 0x29b, 0x80000001}, "48c6f1e5fac8ff96cb729a8ab65da37d24b0bf092b2f95a82794406897a0046a4b9803e6447614fc21d10ec279250cf6c01d5d3249b728f56f1091393fbdd7af8e9932f48f93c9e61e5241a5dc102a8dab5311", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x773) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_setup(0x454c, &(0x7f0000000240)) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000180)={0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r1, 0x0, 0xfffffdef) 18:08:01 executing program 6: ioprio_get$pid(0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 18:08:01 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@size={'size', 0x3d, [0x25, 0x6b]}}]}) 18:08:01 executing program 7: r0 = semget(0x0, 0x4, 0x23c) semctl$GETPID(r0, 0x3, 0xb, &(0x7f0000000000)=""/200) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)={{0x4, 0x7}, {0x47, 0x4}, 0x9}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000180)=0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f00000001c0)={{0x2, r1, 0xffffffffffffffff, 0x0, 0xee00, 0x6}, 0x1, 0xff, 0x0, 0x0, 0x0, 0x0, 0x891c}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x1000, 0x6]) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000280)=[0x31, 0x27, 0x8, 0x3f, 0x2ba, 0xf000]) [ 139.223624] tmpfs: Bad value for 'size' [ 139.224406] tmpfs: Bad value for 'size' [ 139.243605] loop6: detected capacity change from 0 to 256 18:08:01 executing program 7: r0 = semget(0x0, 0x4, 0x23c) semctl$GETPID(r0, 0x3, 0xb, &(0x7f0000000000)=""/200) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)={{0x4, 0x7}, {0x47, 0x4}, 0x9}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000180)=0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f00000001c0)={{0x2, r1, 0xffffffffffffffff, 0x0, 0xee00, 0x6}, 0x1, 0xff, 0x0, 0x0, 0x0, 0x0, 0x891c}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x1000, 0x6]) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000280)=[0x31, 0x27, 0x8, 0x3f, 0x2ba, 0xf000]) 18:08:01 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@size={'size', 0x3d, [0x25, 0x6b]}}]}) 18:08:01 executing program 7: r0 = semget(0x0, 0x4, 0x23c) semctl$GETPID(r0, 0x3, 0xb, &(0x7f0000000000)=""/200) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)={{0x4, 0x7}, {0x47, 0x4}, 0x9}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000180)=0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f00000001c0)={{0x2, r1, 0xffffffffffffffff, 0x0, 0xee00, 0x6}, 0x1, 0xff, 0x0, 0x0, 0x0, 0x0, 0x891c}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x1000, 0x6]) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000280)=[0x31, 0x27, 0x8, 0x3f, 0x2ba, 0xf000]) [ 139.305735] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 139.334029] tmpfs: Bad value for 'size' [ 140.001399] syz-executor.0 (4025) used greatest stack depth: 24104 bytes left [ 140.063558] syz-executor.3 (4033) used greatest stack depth: 23576 bytes left 18:08:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat(0xffffffffffffffff, &(0x7f0000001ac0)='./file0\x00', 0x14300, 0x8) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r2, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r2], 0x220) openat(r1, 0x0, 0x100000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0/file0\x00'}) listxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000300)=""/4096, 0x1000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) fallocate(r3, 0x3, 0x80000, 0x8000000) write$binfmt_aout(r3, &(0x7f0000001300)={{0xcc, 0x0, 0x52, 0x289, 0x295, 0x5, 0x0, 0x9}, "24f14da56a86b2a113f3cc53ca55bafe991660d1b42188439f2c77c871d17bd6ca9e650fc131bd814bc836be2e", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x74d) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='net/arp\x00') openat$vcs(0xffffffffffffff9c, &(0x7f0000000240), 0xabe2fe4d9e090a4d, 0x0) pread64(r4, &(0x7f0000000180)=""/16, 0x20000190, 0x68000000) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r1, r0, 0x0, 0xfffffdef) 18:08:02 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@size={'size', 0x3d, [0x25, 0x6b]}}]}) 18:08:02 executing program 6: ioprio_get$pid(0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 18:08:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1030c2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_io_uring_setup(0x0, &(0x7f0000000140)={0x0, 0x3b61, 0x0, 0x2, 0x278}, &(0x7f0000ff3000/0xd000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000300)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="b0cabfc4e6e8db1f6046e8f1816d2210267bfcfa857fbd89192a1d2b2d0ba19e067d9a594886f2e5b09bd54fa57a6e280fd454b178d17b86c4595133ce0c923e"]) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000240)={0xc0000008}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x8) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) getsockname$packet(r3, &(0x7f0000003ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003b00)=0x14) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x430840, 0x2) 18:08:02 executing program 4: r0 = semget(0x0, 0x4, 0x23c) semctl$GETPID(r0, 0x3, 0xb, &(0x7f0000000000)=""/200) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)={{0x4, 0x7}, {0x47, 0x4}, 0x9}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000180)=0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f00000001c0)={{0x2, r1, 0xffffffffffffffff, 0x0, 0xee00, 0x6}, 0x1, 0xff, 0x0, 0x0, 0x0, 0x0, 0x891c}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x1000, 0x6]) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000280)=[0x31, 0x27, 0x8, 0x3f, 0x2ba, 0xf000]) 18:08:02 executing program 2: r0 = semget(0x0, 0x4, 0x23c) semctl$GETPID(r0, 0x3, 0xb, &(0x7f0000000000)=""/200) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)={{0x4, 0x7}, {0x47, 0x4}, 0x9}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000180)=0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f00000001c0)={{0x2, r1, 0xffffffffffffffff, 0x0, 0xee00, 0x6}, 0x1, 0xff, 0x0, 0x0, 0x0, 0x0, 0x891c}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x1000, 0x6]) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000280)=[0x31, 0x27, 0x8, 0x3f, 0x2ba, 0xf000]) 18:08:02 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x422621, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)={{0x10b, 0x40, 0x20, 0x29b, 0x397, 0x5, 0x29b, 0x80000001}, "48c6f1e5fac8ff96cb729a8ab65da37d24b0bf092b2f95a82794406897a0046a4b9803e6447614fc21d10ec279250cf6c01d5d3249b728f56f1091393fbdd7af8e9932f48f93c9e61e5241a5dc102a8dab5311", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x773) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_setup(0x454c, &(0x7f0000000240)) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000180)={0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r1, 0x0, 0xfffffdef) 18:08:02 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x26, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c20000120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32393036373937313100"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040000c00000000000000e1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000005d00000000000000", 0x40, 0x540}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000e1f4655fe1f4655fe1f4655f00"/8224, 0x2020, 0x2000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x4400}, {&(0x7f0000012700)="20000000e42a2b4ce42a2b4c00000000e1f4655f00"/32, 0x20, 0x4480}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030000000", 0x40, 0x4800}, {&(0x7f0000012900)="20000000000000000000000000000000e1f4655f00"/32, 0x20, 0x4880}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040000000", 0x40, 0x4c00}, {&(0x7f0000012b00)="20000000000000000000000000000000e1f4655f00"/32, 0x20, 0x4c80}, {&(0x7f0000012c00)="c041000000300000e1f4655fe1f4655fe1f4655f00000000000002008000000000000800000000000af301000400000000000000000000000300000020000000", 0x40, 0x6800}, {&(0x7f0000012d00)="20000000000000000000000000000000e1f4655f000000000000000000000000000002ea00"/64, 0x40, 0x6880}, {&(0x7f0000012e00)="ed4100003c000000e2f4655fe2f4655fe2f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c65310000000000000000000000000000000000000000000000000000004510229000000000000000000000000000000000000000000000000020000000e42a2b4ce42a2b4ce42a2b4ce2f4655fe42a2b4c0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x6c00}, {&(0x7f0000012f00)="ed8100001a040000e2f4655fe2f4655fe2f4655f00000000000001008000000000000800010000000af301000400000000000000000000000100000050000000000000000000000000000000000000000000000000000000000000000000000000000000682546cf00000000000000000000000000000000000000000000000020000000e42a2b4ce42a2b4ce42a2b4ce2f4655fe42a2b4c0000000000000000", 0xa0, 0x7000}, {&(0x7f0000013000)="ffa1000026000000e2f4655fe2f4655fe2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3239303637393731312f66696c65302f66696c653000000000000000000000000000000000000000000000edc75b2500000000000000000000000000000000000000000000000020000000e42a2b4ce42a2b4ce42a2b4ce2f4655fe42a2b4c0000000000000000", 0xa0, 0x7400}, {&(0x7f0000013100)="ed8100000a000000e2f4655fe2f4655fe2f4655f000000000000010000000000000000100100000073797a6b616c6c6572730000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000514905cf00000000000000000000000000000000000000000000000020000000e42a2b4ce42a2b4ce42a2b4ce2f4655fe42a2b4c0000000000000000000002ea040700000000000000000000000000006461746106015403000000000600000000000000786174747231000006014c0300000000060000000000000078617474723200"/256, 0x100, 0x7800}, {&(0x7f0000013200)="0000000000000000000000000000000078617474723200007861747472310000ed81000028230000e2f4655fe2f4655fe2f4655f00000000000002008000000000000800010000000af301000400000000000000000000000300000060000000020000000100000062000000020000000180000062000000000000000000000000000000c183a18a00000000000000000000000000000000000000000000000020000000e42a2b4ce42a2b4ce42a2b4ce2f4655fe42a2b4c0000000000000000", 0xc0, 0x7be0}, {&(0x7f0000013300)="ed81000064000000e2f4655fe2f4655fe2f4655f000000000000010000000000000000100100000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c242da44300000000000000000000000000000000000000000000000020000000e42a2b4ce42a2b4ce42a2b4ce2f4655fe42a2b4c0000000000000000000002ea04073403000000002800000000000000646174610000000000000000", 0xc0, 0x8000}, {&(0x7f0000013400)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00lersyzkallersyzkallersyzkallersyzkallers', 0x40, 0x83c0}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c653300000011000000940f090166696c652e636f6c64000000", 0x80, 0x10000}, {&(0x7f0000013600)="0b0000000c0001022e000000020000000c0002022e2e000000000000e80f0000", 0x20, 0x20000}, {&(0x7f0000013700)="00000000001000"/32, 0x20, 0x21000}, {&(0x7f0000013800)="00000000001000"/32, 0x20, 0x22000}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x30000}, {&(0x7f0000013a00)="0200"/32, 0x20, 0x30400}, {&(0x7f0000013b00)="0300"/32, 0x20, 0x30800}, {&(0x7f0000013c00)="0400"/32, 0x20, 0x30c00}, {&(0x7f0000013d00)="0500"/32, 0x20, 0x31000}, {&(0x7f0000013e00)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000400"/96, 0x60, 0x31400}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x40000}, {&(0x7f0000014000)="0200"/32, 0x20, 0x40400}, {&(0x7f0000014100)="0300"/32, 0x20, 0x40800}, {&(0x7f0000014200)="0400"/32, 0x20, 0x40c00}, {&(0x7f0000014300)="0500"/32, 0x20, 0x41000}, {&(0x7f0000014400)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000400"/96, 0x60, 0x41400}, {&(0x7f0000014500)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x50000}], 0x0, &(0x7f0000014a00)) [ 140.123294] loop7: detected capacity change from 0 to 4096 [ 140.136503] EXT4-fs (loop7): mounted filesystem without journal. Quota mode: writeback. [ 140.144104] loop6: detected capacity change from 0 to 256 [ 140.167010] tmpfs: Bad value for 'size' [ 140.198422] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 140.214173] hrtimer: interrupt took 19627 ns 18:08:02 executing program 4: r0 = semget(0x0, 0x4, 0x23c) semctl$GETPID(r0, 0x3, 0xb, &(0x7f0000000000)=""/200) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)={{0x4, 0x7}, {0x47, 0x4}, 0x9}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000180)=0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f00000001c0)={{0x2, r1, 0xffffffffffffffff, 0x0, 0xee00, 0x6}, 0x1, 0xff, 0x0, 0x0, 0x0, 0x0, 0x891c}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x1000, 0x6]) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000280)=[0x31, 0x27, 0x8, 0x3f, 0x2ba, 0xf000]) 18:08:02 executing program 6: ioprio_get$pid(0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 18:08:02 executing program 2: r0 = semget(0x0, 0x4, 0x23c) semctl$GETPID(r0, 0x3, 0xb, &(0x7f0000000000)=""/200) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)={{0x4, 0x7}, {0x47, 0x4}, 0x9}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000180)=0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f00000001c0)={{0x2, r1, 0xffffffffffffffff, 0x0, 0xee00, 0x6}, 0x1, 0xff, 0x0, 0x0, 0x0, 0x0, 0x891c}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x1000, 0x6]) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000280)=[0x31, 0x27, 0x8, 0x3f, 0x2ba, 0xf000]) 18:08:02 executing program 4: r0 = semget(0x0, 0x4, 0x23c) semctl$GETPID(r0, 0x3, 0xb, &(0x7f0000000000)=""/200) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)={{0x4, 0x7}, {0x47, 0x4}, 0x9}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000180)=0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f00000001c0)={{0x2, r1, 0xffffffffffffffff, 0x0, 0xee00, 0x6}, 0x1, 0xff, 0x0, 0x0, 0x0, 0x0, 0x891c}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x1000, 0x6]) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000280)=[0x31, 0x27, 0x8, 0x3f, 0x2ba, 0xf000]) 18:08:02 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@size={'size', 0x3d, [0x25, 0x6b]}}]}) 18:08:02 executing program 7: r0 = add_key$user(&(0x7f0000001600), &(0x7f0000001640)={'syz', 0x2}, &(0x7f0000001680)="ba", 0x1, 0xfffffffffffffffe) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) keyctl$setperm(0x5, r0, 0x0) [ 140.422063] tmpfs: Bad value for 'size' [ 140.422931] EXT4-fs (loop7): unmounting filesystem. 18:08:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001180)={&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000011c0)=0x3b) 18:08:02 executing program 2: r0 = semget(0x0, 0x4, 0x23c) semctl$GETPID(r0, 0x3, 0xb, &(0x7f0000000000)=""/200) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)={{0x4, 0x7}, {0x47, 0x4}, 0x9}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000180)=0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f00000001c0)={{0x2, r1, 0xffffffffffffffff, 0x0, 0xee00, 0x6}, 0x1, 0xff, 0x0, 0x0, 0x0, 0x0, 0x891c}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x1000, 0x6]) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000280)=[0x31, 0x27, 0x8, 0x3f, 0x2ba, 0xf000]) [ 140.577372] loop6: detected capacity change from 0 to 256 [ 141.232885] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 18:08:03 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x422621, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)={{0x10b, 0x40, 0x20, 0x29b, 0x397, 0x5, 0x29b, 0x80000001}, "48c6f1e5fac8ff96cb729a8ab65da37d24b0bf092b2f95a82794406897a0046a4b9803e6447614fc21d10ec279250cf6c01d5d3249b728f56f1091393fbdd7af8e9932f48f93c9e61e5241a5dc102a8dab5311", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x773) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_setup(0x454c, &(0x7f0000000240)) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000180)={0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r1, 0x0, 0xfffffdef) 18:08:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 18:08:03 executing program 7: r0 = add_key$user(&(0x7f0000001600), &(0x7f0000001640)={'syz', 0x2}, &(0x7f0000001680)="ba", 0x1, 0xfffffffffffffffe) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) keyctl$setperm(0x5, r0, 0x0) 18:08:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat(0xffffffffffffffff, &(0x7f0000001ac0)='./file0\x00', 0x14300, 0x8) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r2, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r2], 0x220) openat(r1, 0x0, 0x100000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0/file0\x00'}) listxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000300)=""/4096, 0x1000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) fallocate(r3, 0x3, 0x80000, 0x8000000) write$binfmt_aout(r3, &(0x7f0000001300)={{0xcc, 0x0, 0x52, 0x289, 0x295, 0x5, 0x0, 0x9}, "24f14da56a86b2a113f3cc53ca55bafe991660d1b42188439f2c77c871d17bd6ca9e650fc131bd814bc836be2e", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x74d) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='net/arp\x00') openat$vcs(0xffffffffffffff9c, &(0x7f0000000240), 0xabe2fe4d9e090a4d, 0x0) pread64(r4, &(0x7f0000000180)=""/16, 0x20000190, 0x68000000) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r1, r0, 0x0, 0xfffffdef) 18:08:03 executing program 6: ioprio_get$pid(0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 18:08:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001180)={&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000011c0)=0x3b) 18:08:03 executing program 5: syz_emit_ethernet(0x22, &(0x7f0000000000)={@broadcast, @local, @val={@void, {0x8100, 0x0, 0x1}}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "70efd97e25b47e49"}}}}, 0x0) 18:08:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$search(0xa, r1, &(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, r3) 18:08:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001180)={&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000011c0)=0x3b) 18:08:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x6e00}}], 0x2, 0x0) 18:08:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$search(0xa, r1, &(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, r3) 18:08:03 executing program 7: r0 = add_key$user(&(0x7f0000001600), &(0x7f0000001640)={'syz', 0x2}, &(0x7f0000001680)="ba", 0x1, 0xfffffffffffffffe) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) keyctl$setperm(0x5, r0, 0x0) 18:08:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 18:08:03 executing program 7: r0 = add_key$user(&(0x7f0000001600), &(0x7f0000001640)={'syz', 0x2}, &(0x7f0000001680)="ba", 0x1, 0xfffffffffffffffe) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) keyctl$setperm(0x5, r0, 0x0) 18:08:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$search(0xa, r1, &(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, r3) 18:08:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x6e00}}], 0x2, 0x0) [ 142.093382] loop6: detected capacity change from 0 to 256 18:08:04 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x6e00}}], 0x2, 0x0) 18:08:04 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$search(0xa, r1, &(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, r3) 18:08:04 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000040)={@multicast, @dev, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}}}}}}, 0x0) 18:08:04 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x422621, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)={{0x10b, 0x40, 0x20, 0x29b, 0x397, 0x5, 0x29b, 0x80000001}, "48c6f1e5fac8ff96cb729a8ab65da37d24b0bf092b2f95a82794406897a0046a4b9803e6447614fc21d10ec279250cf6c01d5d3249b728f56f1091393fbdd7af8e9932f48f93c9e61e5241a5dc102a8dab5311", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x773) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_setup(0x454c, &(0x7f0000000240)) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000180)={0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r1, 0x0, 0xfffffdef) 18:08:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat(0xffffffffffffffff, &(0x7f0000001ac0)='./file0\x00', 0x14300, 0x8) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r2, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r2], 0x220) openat(r1, 0x0, 0x100000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0/file0\x00'}) listxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000300)=""/4096, 0x1000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) fallocate(r3, 0x3, 0x80000, 0x8000000) write$binfmt_aout(r3, &(0x7f0000001300)={{0xcc, 0x0, 0x52, 0x289, 0x295, 0x5, 0x0, 0x9}, "24f14da56a86b2a113f3cc53ca55bafe991660d1b42188439f2c77c871d17bd6ca9e650fc131bd814bc836be2e", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x74d) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='net/arp\x00') openat$vcs(0xffffffffffffff9c, &(0x7f0000000240), 0xabe2fe4d9e090a4d, 0x0) pread64(r4, &(0x7f0000000180)=""/16, 0x20000190, 0x68000000) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r1, r0, 0x0, 0xfffffdef) 18:08:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001180)={&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000011c0)=0x3b) 18:08:04 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 18:08:04 executing program 6: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) bind$bt_hci(r1, &(0x7f0000000140)={0x1f, 0x0, 0x1}, 0x6) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000825bd7000fbdbdf250e00000058000380060004000200000008000100000000001400020076657468305f766c616e0000000000000800010002000000080003000100000008000300020000000800030000000000051908003a000000080005006401010108000500070000"], 0x74}, 0x1, 0x0, 0x0, 0x4000010}, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) truncate(&(0x7f0000000280)='./file1\x00', 0x5) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000200)='x', 0x1, 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x4f) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000000)={0x0, r3}) 18:08:04 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000040)={@multicast, @dev, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}}}}}}, 0x0) 18:08:04 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x6e00}}], 0x2, 0x0) 18:08:04 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000040)=ANY=[@ANYBLOB="000204"], 0x18) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @private1}, 0x1c) sendmmsg$inet(r0, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 18:08:04 executing program 2: ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) 18:08:04 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000040)={@multicast, @dev, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}}}}}}, 0x0) 18:08:04 executing program 5: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="0000047f3803000030010041f68a00ff000000db020000040000000000000000000000100000ab000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a2aca63a64bc83e60000fdffffff00000000000000000000000000000000000000000000000000000000000000000000f0a96c41e93f128827e06816ff6a0bcaf37588a251155605371a9118821fd03562f53271f6c6188331deca8cb22e74c87f0ad869373393eb98103c7dcca49756eee119ee7be9bc762db3f20fc1f2122e6034eaa658ca4f1383beeb21b0"], 0x120) read(r0, &(0x7f0000000140)=""/131, 0x83) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) getdents64(r1, &(0x7f0000000240)=""/226, 0x20000258) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, VM DIAGNOSIS: 18:08:00 Registers: info registers vcpu 0 RAX=000000000000003a RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b1e41 RDI=ffffffff8763fae0 RBP=ffffffff8763faa0 RSP=ffff888042eaf348 R8 =0000000000000001 R9 =000000000000000a R10=000000000000003a R11=0000000000000001 R12=000000000000003a R13=ffffffff8763faa0 R14=0000000000000010 R15=ffffffff822b1e30 RIP=ffffffff822b1e99 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fc8e8954700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f8dcb4db260 CR3=00000000364ca000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007fc8eb4c57c0 00007fc8eb4c57c8 YMM02=0000000000000000 0000000000000000 00007fc8eb4c57e0 00007fc8eb4c57c0 YMM03=0000000000000000 0000000000000000 00007fc8eb4c57c8 00007fc8eb4c57c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000080000000 RBX=0000000000000000 RCX=0000000080000000 RDX=ffff88804254b580 RSI=ffffffff81807618 RDI=0000000000000005 RBP=ffff88800b9bc840 RSP=ffff888042b3faf8 R8 =0000000000000005 R9 =0000000000000000 R10=0000000000000000 R11=0000000000000001 R12=0000000000000081 R13=ffffffff852ec820 R14=ffff888042b3fcd0 R15=ffff88801b671125 RIP=ffffffff8146174d RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffc26925020 CR3=000000004267e000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 00000000000000ff ffff000000000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000