Warning: Permanently added '[localhost]:1451' (ECDSA) to the list of known hosts. 2022/09/21 14:24:29 fuzzer started 2022/09/21 14:24:29 dialing manager at localhost:40289 syzkaller login: [ 45.695756] cgroup: Unknown subsys name 'net' [ 45.786496] cgroup: Unknown subsys name 'rlimit' 2022/09/21 14:24:43 syscalls: 2215 2022/09/21 14:24:43 code coverage: enabled 2022/09/21 14:24:43 comparison tracing: enabled 2022/09/21 14:24:43 extra coverage: enabled 2022/09/21 14:24:43 setuid sandbox: enabled 2022/09/21 14:24:43 namespace sandbox: enabled 2022/09/21 14:24:43 Android sandbox: enabled 2022/09/21 14:24:43 fault injection: enabled 2022/09/21 14:24:43 leak checking: enabled 2022/09/21 14:24:43 net packet injection: enabled 2022/09/21 14:24:43 net device setup: enabled 2022/09/21 14:24:43 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/21 14:24:43 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/21 14:24:43 USB emulation: enabled 2022/09/21 14:24:43 hci packet injection: enabled 2022/09/21 14:24:43 wifi device emulation: failed to parse kernel version (6.0.0-rc6-next-20220921) 2022/09/21 14:24:43 802.15.4 emulation: enabled 2022/09/21 14:24:43 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/21 14:24:44 fetching corpus: 50, signal 22587/26132 (executing program) 2022/09/21 14:24:44 fetching corpus: 100, signal 37036/41974 (executing program) 2022/09/21 14:24:44 fetching corpus: 150, signal 47131/53336 (executing program) 2022/09/21 14:24:44 fetching corpus: 200, signal 56421/63759 (executing program) 2022/09/21 14:24:44 fetching corpus: 250, signal 64295/72640 (executing program) 2022/09/21 14:24:44 fetching corpus: 300, signal 68493/78018 (executing program) 2022/09/21 14:24:44 fetching corpus: 350, signal 73446/83980 (executing program) 2022/09/21 14:24:45 fetching corpus: 400, signal 78660/90050 (executing program) 2022/09/21 14:24:45 fetching corpus: 450, signal 83147/95384 (executing program) 2022/09/21 14:24:45 fetching corpus: 500, signal 86712/99741 (executing program) 2022/09/21 14:24:45 fetching corpus: 550, signal 91203/104999 (executing program) 2022/09/21 14:24:45 fetching corpus: 600, signal 95236/109670 (executing program) 2022/09/21 14:24:45 fetching corpus: 650, signal 99256/114261 (executing program) 2022/09/21 14:24:46 fetching corpus: 700, signal 103797/119189 (executing program) 2022/09/21 14:24:46 fetching corpus: 750, signal 107402/123304 (executing program) 2022/09/21 14:24:46 fetching corpus: 800, signal 109176/125828 (executing program) 2022/09/21 14:24:46 fetching corpus: 850, signal 112248/129359 (executing program) 2022/09/21 14:24:46 fetching corpus: 900, signal 114286/132013 (executing program) 2022/09/21 14:24:46 fetching corpus: 950, signal 116126/134403 (executing program) 2022/09/21 14:24:46 fetching corpus: 1000, signal 118408/137190 (executing program) 2022/09/21 14:24:47 fetching corpus: 1050, signal 120488/139715 (executing program) 2022/09/21 14:24:47 fetching corpus: 1100, signal 122294/141983 (executing program) 2022/09/21 14:24:47 fetching corpus: 1150, signal 123794/143976 (executing program) 2022/09/21 14:24:47 fetching corpus: 1200, signal 125629/146229 (executing program) 2022/09/21 14:24:47 fetching corpus: 1250, signal 127151/148213 (executing program) 2022/09/21 14:24:47 fetching corpus: 1300, signal 129012/150409 (executing program) 2022/09/21 14:24:47 fetching corpus: 1350, signal 131199/152776 (executing program) 2022/09/21 14:24:47 fetching corpus: 1400, signal 132702/154655 (executing program) 2022/09/21 14:24:48 fetching corpus: 1450, signal 134300/156580 (executing program) 2022/09/21 14:24:48 fetching corpus: 1500, signal 135740/158342 (executing program) 2022/09/21 14:24:48 fetching corpus: 1550, signal 137162/160080 (executing program) 2022/09/21 14:24:48 fetching corpus: 1600, signal 138537/161802 (executing program) 2022/09/21 14:24:48 fetching corpus: 1650, signal 139678/163264 (executing program) 2022/09/21 14:24:48 fetching corpus: 1700, signal 141722/165293 (executing program) 2022/09/21 14:24:48 fetching corpus: 1750, signal 143136/166946 (executing program) 2022/09/21 14:24:48 fetching corpus: 1800, signal 145002/168905 (executing program) 2022/09/21 14:24:49 fetching corpus: 1850, signal 146971/170728 (executing program) 2022/09/21 14:24:49 fetching corpus: 1900, signal 148223/172157 (executing program) 2022/09/21 14:24:49 fetching corpus: 1950, signal 149098/173296 (executing program) 2022/09/21 14:24:49 fetching corpus: 2000, signal 150761/174861 (executing program) 2022/09/21 14:24:49 fetching corpus: 2050, signal 152168/176284 (executing program) 2022/09/21 14:24:49 fetching corpus: 2100, signal 153091/177463 (executing program) 2022/09/21 14:24:49 fetching corpus: 2150, signal 154798/179198 (executing program) 2022/09/21 14:24:49 fetching corpus: 2200, signal 155693/180220 (executing program) 2022/09/21 14:24:49 fetching corpus: 2250, signal 157131/181533 (executing program) 2022/09/21 14:24:50 fetching corpus: 2300, signal 158346/182686 (executing program) 2022/09/21 14:24:50 fetching corpus: 2350, signal 159554/183831 (executing program) 2022/09/21 14:24:50 fetching corpus: 2400, signal 160549/184832 (executing program) 2022/09/21 14:24:50 fetching corpus: 2450, signal 161462/185790 (executing program) 2022/09/21 14:24:50 fetching corpus: 2500, signal 162431/186758 (executing program) 2022/09/21 14:24:50 fetching corpus: 2550, signal 164484/188287 (executing program) 2022/09/21 14:24:50 fetching corpus: 2600, signal 165223/189116 (executing program) 2022/09/21 14:24:50 fetching corpus: 2650, signal 166897/190317 (executing program) 2022/09/21 14:24:51 fetching corpus: 2700, signal 168491/191539 (executing program) 2022/09/21 14:24:51 fetching corpus: 2750, signal 170011/192704 (executing program) 2022/09/21 14:24:51 fetching corpus: 2800, signal 170601/193392 (executing program) 2022/09/21 14:24:51 fetching corpus: 2850, signal 171903/194394 (executing program) 2022/09/21 14:24:51 fetching corpus: 2900, signal 173013/195292 (executing program) 2022/09/21 14:24:51 fetching corpus: 2950, signal 173378/195836 (executing program) 2022/09/21 14:24:51 fetching corpus: 3000, signal 174184/196587 (executing program) 2022/09/21 14:24:51 fetching corpus: 3050, signal 175115/197344 (executing program) 2022/09/21 14:24:51 fetching corpus: 3100, signal 175946/198171 (executing program) 2022/09/21 14:24:52 fetching corpus: 3150, signal 176564/198800 (executing program) 2022/09/21 14:24:52 fetching corpus: 3200, signal 177427/199462 (executing program) 2022/09/21 14:24:52 fetching corpus: 3250, signal 178592/200206 (executing program) 2022/09/21 14:24:52 fetching corpus: 3300, signal 179358/200798 (executing program) 2022/09/21 14:24:52 fetching corpus: 3350, signal 180474/201499 (executing program) 2022/09/21 14:24:52 fetching corpus: 3400, signal 181165/202117 (executing program) 2022/09/21 14:24:52 fetching corpus: 3450, signal 182248/202882 (executing program) 2022/09/21 14:24:52 fetching corpus: 3500, signal 182968/203400 (executing program) 2022/09/21 14:24:53 fetching corpus: 3550, signal 183938/204001 (executing program) 2022/09/21 14:24:53 fetching corpus: 3600, signal 184613/204497 (executing program) 2022/09/21 14:24:53 fetching corpus: 3650, signal 185245/204944 (executing program) 2022/09/21 14:24:53 fetching corpus: 3700, signal 186405/205557 (executing program) 2022/09/21 14:24:53 fetching corpus: 3750, signal 187564/206078 (executing program) 2022/09/21 14:24:53 fetching corpus: 3800, signal 188088/206446 (executing program) 2022/09/21 14:24:53 fetching corpus: 3850, signal 189188/206966 (executing program) 2022/09/21 14:24:53 fetching corpus: 3900, signal 189774/207352 (executing program) 2022/09/21 14:24:54 fetching corpus: 3950, signal 190578/207741 (executing program) 2022/09/21 14:24:54 fetching corpus: 4000, signal 191684/208247 (executing program) 2022/09/21 14:24:54 fetching corpus: 4050, signal 192854/208693 (executing program) 2022/09/21 14:24:54 fetching corpus: 4100, signal 193730/209036 (executing program) 2022/09/21 14:24:54 fetching corpus: 4150, signal 194359/209325 (executing program) 2022/09/21 14:24:54 fetching corpus: 4200, signal 195208/209671 (executing program) 2022/09/21 14:24:54 fetching corpus: 4250, signal 196015/209960 (executing program) 2022/09/21 14:24:54 fetching corpus: 4300, signal 196451/210231 (executing program) 2022/09/21 14:24:55 fetching corpus: 4350, signal 197346/210527 (executing program) 2022/09/21 14:24:55 fetching corpus: 4400, signal 198284/210790 (executing program) 2022/09/21 14:24:55 fetching corpus: 4450, signal 198966/211054 (executing program) 2022/09/21 14:24:55 fetching corpus: 4500, signal 199837/211395 (executing program) 2022/09/21 14:24:55 fetching corpus: 4550, signal 200733/211693 (executing program) 2022/09/21 14:24:55 fetching corpus: 4600, signal 201228/211911 (executing program) 2022/09/21 14:24:55 fetching corpus: 4650, signal 201663/212047 (executing program) 2022/09/21 14:24:55 fetching corpus: 4700, signal 202261/212208 (executing program) 2022/09/21 14:24:55 fetching corpus: 4750, signal 202864/212333 (executing program) 2022/09/21 14:24:56 fetching corpus: 4800, signal 203730/212471 (executing program) 2022/09/21 14:24:56 fetching corpus: 4850, signal 204425/212596 (executing program) 2022/09/21 14:24:56 fetching corpus: 4900, signal 205018/212723 (executing program) 2022/09/21 14:24:56 fetching corpus: 4950, signal 205611/212936 (executing program) 2022/09/21 14:24:56 fetching corpus: 5000, signal 206085/213002 (executing program) 2022/09/21 14:24:56 fetching corpus: 5050, signal 206563/213030 (executing program) 2022/09/21 14:24:56 fetching corpus: 5081, signal 207025/213030 (executing program) 2022/09/21 14:24:56 fetching corpus: 5081, signal 207025/213030 (executing program) 2022/09/21 14:24:59 starting 8 fuzzer processes 14:24:59 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x42, 0x3f, 0x5d, 0x0, 0x9, 0x80000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80000009, 0x4, @perf_config_ext={0x3, 0xfc0000000}, 0x12198, 0x1000, 0x0, 0x0, 0x8, 0x2, 0x9, 0x0, 0x9, 0x0, 0x5}, r1, 0x2, 0xffffffffffffffff, 0x3) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300), 0x242880, &(0x7f00000005c0)=ANY=[@ANYBLOB="7472616e7390a15ba47b28803dce31140d294091dc31655df04a2c38b41389c25277c75f06b768", @ANYRESHEX, @ANYBLOB="2c6a62267c2885e717862c6f9e4928", @ANYRESOCT, @ANYBLOB=',cache=fscache,version=9p2000.u,privport,nodevmap,loose,\x00osixacl,access=', @ANYRESDEC, @ANYBLOB=',access=any,cache=none,subj_role=,smackfsroot=,fsname=\\,smackfshat=,(^\\)\a^,hash,smackfsfloor=^#\",func=FIRMWARE_CHECK,\x00']) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x40000, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0xee01, 0xee01) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000340)) 14:24:59 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f00000033c0)=[{{&(0x7f0000000340)=@qipcrtr={0x2a, 0x3}, 0x80, 0x0}}, {{&(0x7f0000000500)=@pppoe={0x18, 0x0, {0x0, @random="31cd28f57c44", 'ip6gre0\x00'}}, 0x80, 0x0}}], 0x2, 0x0) 14:24:59 executing program 1: prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x0) 14:24:59 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x41) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x88842) ppoll(&(0x7f0000000300)=[{r0, 0x4}, {r1}], 0x2, 0x0, 0x0, 0x0) 14:24:59 executing program 3: capset(&(0x7f0000000040)={0x20071026}, &(0x7f0000000580)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x13, &(0x7f0000000100)={@multicast2, @private}, 0xc) 14:24:59 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)=0x2) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb5575adc7a85afd4f3795ca060d900f96d1d928d9a7779668b6dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cbbd8865fbb3bf7a70492561507b3a2239929636d58f540bd0771e3f2dba65ffbff87477a7149dc31664ea79b107bee6c3f9834628be04faee38818df0c425334b92198efa69990e87eaf5f45573c3c53ed721e98de5ae2422fc5b543b10c83fe27a34862fc841b53cf14fe96f4f734c453aa8f9e3ffe2330566bb0bbf2e9db91125c6eda10003e41f32", @ANYRES16, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501e4316a9309942f8f2c244631aa4f47a03ab053020173b855c9707c43bb0feb19", @ANYRES32=r3, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x1}}, './file1\x00'}) syz_io_uring_setup(0x5081, &(0x7f0000000180)={0x0, 0x6594, 0x1, 0x2, 0x2ce, 0x0, r4}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000200), &(0x7f00000006c0)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x34, 0x0, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy2\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x8800) 14:24:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002840), 0x0, &(0x7f0000002700)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4018f50b, &(0x7f0000000000)={0x0, 0xfffffffffffffff8, 0x1}) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001580)={{0x1, 0x1, 0x18, r2, {0x4}}, './file1\x00'}) accept$unix(r1, &(0x7f00000015c0)=@abs, &(0x7f0000001640)=0x6e) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) r6 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r6, 0x29, 0x4b, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r6, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, &(0x7f0000000040)) sendfile(0xffffffffffffffff, r5, 0x0, 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r7, &(0x7f0000001180)=ANY=[], 0x220) close_range(r0, 0xffffffffffffffff, 0x0) [ 75.204688] audit: type=1400 audit(1663770299.218:6): avc: denied { execmem } for pid=287 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 14:24:59 executing program 6: syz_io_uring_setup(0x63c2, &(0x7f0000002e80), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000002f00), &(0x7f0000002f40)) [ 76.416479] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 76.418567] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 76.420173] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 76.423736] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 76.431619] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 76.433452] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 76.438370] Bluetooth: hci0: HCI_REQ-0x0c1a [ 76.487712] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 76.489463] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 76.490866] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 76.492653] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 76.497178] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 76.499351] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 76.500464] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 76.501944] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 76.503661] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 76.505494] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 76.506848] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 76.508563] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 76.514495] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 76.519688] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 76.521933] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 76.529732] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 76.531415] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 76.535765] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 76.536889] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 76.538339] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 76.540105] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 76.540335] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 76.542581] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 76.544964] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 76.548351] Bluetooth: hci3: HCI_REQ-0x0c1a [ 76.548688] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 76.554343] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 76.555196] Bluetooth: hci1: HCI_REQ-0x0c1a [ 76.556282] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 76.563779] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 76.570148] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 76.570179] Bluetooth: hci4: HCI_REQ-0x0c1a [ 76.571539] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 76.574952] Bluetooth: hci7: HCI_REQ-0x0c1a [ 76.579803] Bluetooth: hci2: HCI_REQ-0x0c1a [ 76.614215] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 76.616122] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 76.617551] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 76.625339] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 76.641319] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 76.643265] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 76.645126] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 76.647192] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 76.651771] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 76.654973] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 76.656701] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 76.658191] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 76.659076] Bluetooth: hci5: HCI_REQ-0x0c1a [ 76.677101] Bluetooth: hci6: HCI_REQ-0x0c1a [ 78.502402] Bluetooth: hci0: command 0x0409 tx timeout [ 78.566449] Bluetooth: hci3: command 0x0409 tx timeout [ 78.630129] Bluetooth: hci2: command 0x0409 tx timeout [ 78.630516] Bluetooth: hci4: command 0x0409 tx timeout [ 78.631164] Bluetooth: hci7: command 0x0409 tx timeout [ 78.631725] Bluetooth: hci1: command 0x0409 tx timeout [ 78.694453] Bluetooth: hci5: command 0x0409 tx timeout [ 78.695195] Bluetooth: hci6: command 0x0409 tx timeout [ 80.550080] Bluetooth: hci0: command 0x041b tx timeout [ 80.614478] Bluetooth: hci3: command 0x041b tx timeout [ 80.678113] Bluetooth: hci7: command 0x041b tx timeout [ 80.678548] Bluetooth: hci1: command 0x041b tx timeout [ 80.678965] Bluetooth: hci4: command 0x041b tx timeout [ 80.679719] Bluetooth: hci2: command 0x041b tx timeout [ 80.742296] Bluetooth: hci6: command 0x041b tx timeout [ 80.742323] Bluetooth: hci5: command 0x041b tx timeout [ 82.598049] Bluetooth: hci0: command 0x040f tx timeout [ 82.662044] Bluetooth: hci3: command 0x040f tx timeout [ 82.726083] Bluetooth: hci2: command 0x040f tx timeout [ 82.726530] Bluetooth: hci4: command 0x040f tx timeout [ 82.726945] Bluetooth: hci7: command 0x040f tx timeout [ 82.727830] Bluetooth: hci1: command 0x040f tx timeout [ 82.790112] Bluetooth: hci6: command 0x040f tx timeout [ 82.791421] Bluetooth: hci5: command 0x040f tx timeout [ 84.647051] Bluetooth: hci0: command 0x0419 tx timeout [ 84.710109] Bluetooth: hci3: command 0x0419 tx timeout [ 84.774068] Bluetooth: hci1: command 0x0419 tx timeout [ 84.774553] Bluetooth: hci7: command 0x0419 tx timeout [ 84.774969] Bluetooth: hci4: command 0x0419 tx timeout [ 84.775716] Bluetooth: hci2: command 0x0419 tx timeout [ 84.838112] Bluetooth: hci5: command 0x0419 tx timeout [ 84.838628] Bluetooth: hci6: command 0x0419 tx timeout 14:25:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002840), 0x0, &(0x7f0000002700)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4018f50b, &(0x7f0000000000)={0x0, 0xfffffffffffffff8, 0x1}) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001580)={{0x1, 0x1, 0x18, r2, {0x4}}, './file1\x00'}) accept$unix(r1, &(0x7f00000015c0)=@abs, &(0x7f0000001640)=0x6e) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) r6 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r6, 0x29, 0x4b, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r6, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, &(0x7f0000000040)) sendfile(0xffffffffffffffff, r5, 0x0, 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r7, &(0x7f0000001180)=ANY=[], 0x220) close_range(r0, 0xffffffffffffffff, 0x0) 14:25:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002840), 0x0, &(0x7f0000002700)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4018f50b, &(0x7f0000000000)={0x0, 0xfffffffffffffff8, 0x1}) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001580)={{0x1, 0x1, 0x18, r2, {0x4}}, './file1\x00'}) accept$unix(r1, &(0x7f00000015c0)=@abs, &(0x7f0000001640)=0x6e) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) r6 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r6, 0x29, 0x4b, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r6, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, &(0x7f0000000040)) sendfile(0xffffffffffffffff, r5, 0x0, 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r7, &(0x7f0000001180)=ANY=[], 0x220) close_range(r0, 0xffffffffffffffff, 0x0) 14:25:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002840), 0x0, &(0x7f0000002700)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4018f50b, &(0x7f0000000000)={0x0, 0xfffffffffffffff8, 0x1}) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001580)={{0x1, 0x1, 0x18, r2, {0x4}}, './file1\x00'}) accept$unix(r1, &(0x7f00000015c0)=@abs, &(0x7f0000001640)=0x6e) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) r6 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r6, 0x29, 0x4b, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r6, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, &(0x7f0000000040)) sendfile(0xffffffffffffffff, r5, 0x0, 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r7, &(0x7f0000001180)=ANY=[], 0x220) close_range(r0, 0xffffffffffffffff, 0x0) 14:25:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002840), 0x0, &(0x7f0000002700)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4018f50b, &(0x7f0000000000)={0x0, 0xfffffffffffffff8, 0x1}) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001580)={{0x1, 0x1, 0x18, r2, {0x4}}, './file1\x00'}) accept$unix(r1, &(0x7f00000015c0)=@abs, &(0x7f0000001640)=0x6e) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) r6 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r6, 0x29, 0x4b, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r6, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, &(0x7f0000000040)) sendfile(0xffffffffffffffff, r5, 0x0, 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r7, &(0x7f0000001180)=ANY=[], 0x220) close_range(r0, 0xffffffffffffffff, 0x0) 14:25:53 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x41) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x88842) ppoll(&(0x7f0000000300)=[{r0, 0x4}, {r1}], 0x2, 0x0, 0x0, 0x0) 14:25:53 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x41) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x88842) ppoll(&(0x7f0000000300)=[{r0, 0x4}, {r1}], 0x2, 0x0, 0x0, 0x0) 14:25:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002840), 0x0, &(0x7f0000002700)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4018f50b, &(0x7f0000000000)={0x0, 0xfffffffffffffff8, 0x1}) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001580)={{0x1, 0x1, 0x18, r2, {0x4}}, './file1\x00'}) accept$unix(r1, &(0x7f00000015c0)=@abs, &(0x7f0000001640)=0x6e) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) r6 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r6, 0x29, 0x4b, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r6, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, &(0x7f0000000040)) sendfile(0xffffffffffffffff, r5, 0x0, 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r7, &(0x7f0000001180)=ANY=[], 0x220) close_range(r0, 0xffffffffffffffff, 0x0) 14:25:53 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002840), 0x0, &(0x7f0000002700)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4018f50b, &(0x7f0000000000)={0x0, 0xfffffffffffffff8, 0x1}) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001580)={{0x1, 0x1, 0x18, r2, {0x4}}, './file1\x00'}) accept$unix(r1, &(0x7f00000015c0)=@abs, &(0x7f0000001640)=0x6e) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) r6 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r6, 0x29, 0x4b, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r6, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, &(0x7f0000000040)) sendfile(0xffffffffffffffff, r5, 0x0, 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r7, &(0x7f0000001180)=ANY=[], 0x220) close_range(r0, 0xffffffffffffffff, 0x0) [ 130.318433] audit: type=1400 audit(1663770354.331:7): avc: denied { open } for pid=3967 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 130.319893] audit: type=1400 audit(1663770354.332:8): avc: denied { kernel } for pid=3967 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 130.331607] ------------[ cut here ]------------ [ 130.331628] [ 130.331631] ====================================================== [ 130.331635] WARNING: possible circular locking dependency detected [ 130.331640] 6.0.0-rc6-next-20220921 #1 Not tainted [ 130.331646] ------------------------------------------------------ [ 130.331650] syz-executor.0/3968 is trying to acquire lock: [ 130.331657] ffffffff853faab8 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 130.331699] [ 130.331699] but task is already holding lock: [ 130.331702] ffff88801abb9020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 130.331733] [ 130.331733] which lock already depends on the new lock. [ 130.331733] [ 130.331737] [ 130.331737] the existing dependency chain (in reverse order) is: [ 130.331741] [ 130.331741] -> #3 (&ctx->lock){....}-{2:2}: [ 130.331757] _raw_spin_lock+0x2a/0x40 [ 130.331777] __perf_event_task_sched_out+0x53b/0x18d0 [ 130.331796] __schedule+0xedd/0x2470 [ 130.331810] schedule+0xda/0x1b0 [ 130.331824] exit_to_user_mode_prepare+0x114/0x1a0 [ 130.331836] syscall_exit_to_user_mode+0x19/0x40 [ 130.331849] do_syscall_64+0x48/0x90 [ 130.331867] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 130.331879] [ 130.331879] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 130.331894] _raw_spin_lock_nested+0x30/0x40 [ 130.331914] raw_spin_rq_lock_nested+0x1e/0x30 [ 130.331928] task_fork_fair+0x63/0x4d0 [ 130.331947] sched_cgroup_fork+0x3d0/0x540 [ 130.331962] copy_process+0x4183/0x6e20 [ 130.331974] kernel_clone+0xe7/0x890 [ 130.331986] user_mode_thread+0xad/0xf0 [ 130.331997] rest_init+0x24/0x250 [ 130.332009] arch_call_rest_init+0xf/0x14 [ 130.332027] start_kernel+0x4c1/0x4e6 [ 130.332042] secondary_startup_64_no_verify+0xe0/0xeb [ 130.332057] [ 130.332057] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 130.332072] _raw_spin_lock_irqsave+0x39/0x60 [ 130.332091] try_to_wake_up+0xab/0x1930 [ 130.332106] up+0x75/0xb0 [ 130.332120] __up_console_sem+0x6e/0x80 [ 130.332138] console_unlock+0x46a/0x590 [ 130.332155] vprintk_emit+0x1bd/0x560 [ 130.332174] vprintk+0x84/0xa0 [ 130.332191] _printk+0xba/0xf1 [ 130.332203] kauditd_hold_skb.cold+0x3f/0x4e [ 130.332221] kauditd_send_queue+0x233/0x290 [ 130.332237] kauditd_thread+0x5da/0x9a0 [ 130.332253] kthread+0x2ed/0x3a0 [ 130.332269] ret_from_fork+0x22/0x30 [ 130.332282] [ 130.332282] -> #0 ((console_sem).lock){....}-{2:2}: [ 130.332296] __lock_acquire+0x2a02/0x5e70 [ 130.332316] lock_acquire+0x1a2/0x530 [ 130.332333] _raw_spin_lock_irqsave+0x39/0x60 [ 130.332353] down_trylock+0xe/0x70 [ 130.332368] __down_trylock_console_sem+0x3b/0xd0 [ 130.332386] vprintk_emit+0x16b/0x560 [ 130.332404] vprintk+0x84/0xa0 [ 130.332421] _printk+0xba/0xf1 [ 130.332431] report_bug.cold+0x72/0xab [ 130.332448] handle_bug+0x3c/0x70 [ 130.332465] exc_invalid_op+0x14/0x50 [ 130.332483] asm_exc_invalid_op+0x16/0x20 [ 130.332495] group_sched_out.part.0+0x2c7/0x460 [ 130.332506] ctx_sched_out+0x8f1/0xc10 [ 130.332517] __perf_event_task_sched_out+0x6d0/0x18d0 [ 130.332530] __schedule+0xedd/0x2470 [ 130.332543] schedule+0xda/0x1b0 [ 130.332556] exit_to_user_mode_prepare+0x114/0x1a0 [ 130.332568] syscall_exit_to_user_mode+0x19/0x40 [ 130.332580] do_syscall_64+0x48/0x90 [ 130.332597] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 130.332609] [ 130.332609] other info that might help us debug this: [ 130.332609] [ 130.332612] Chain exists of: [ 130.332612] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 130.332612] [ 130.332628] Possible unsafe locking scenario: [ 130.332628] [ 130.332631] CPU0 CPU1 [ 130.332633] ---- ---- [ 130.332636] lock(&ctx->lock); [ 130.332642] lock(&rq->__lock); [ 130.332649] lock(&ctx->lock); [ 130.332656] lock((console_sem).lock); [ 130.332662] [ 130.332662] *** DEADLOCK *** [ 130.332662] [ 130.332664] 2 locks held by syz-executor.0/3968: [ 130.332672] #0: ffff88806cf37d18 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 130.332702] #1: ffff88801abb9020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 130.332732] [ 130.332732] stack backtrace: [ 130.332735] CPU: 1 PID: 3968 Comm: syz-executor.0 Not tainted 6.0.0-rc6-next-20220921 #1 [ 130.332748] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 130.332757] Call Trace: [ 130.332760] [ 130.332764] dump_stack_lvl+0x8b/0xb3 [ 130.332783] check_noncircular+0x263/0x2e0 [ 130.332801] ? format_decode+0x26c/0xb50 [ 130.332819] ? print_circular_bug+0x450/0x450 [ 130.332837] ? enable_ptr_key_workfn+0x20/0x20 [ 130.332855] ? format_decode+0x26c/0xb50 [ 130.332872] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 130.332891] __lock_acquire+0x2a02/0x5e70 [ 130.332915] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 130.332939] lock_acquire+0x1a2/0x530 [ 130.332957] ? down_trylock+0xe/0x70 [ 130.332975] ? lock_release+0x750/0x750 [ 130.332998] ? vprintk+0x84/0xa0 [ 130.333017] _raw_spin_lock_irqsave+0x39/0x60 [ 130.333038] ? down_trylock+0xe/0x70 [ 130.333054] down_trylock+0xe/0x70 [ 130.333070] ? vprintk+0x84/0xa0 [ 130.333089] __down_trylock_console_sem+0x3b/0xd0 [ 130.333107] vprintk_emit+0x16b/0x560 [ 130.333128] vprintk+0x84/0xa0 [ 130.333147] _printk+0xba/0xf1 [ 130.333159] ? record_print_text.cold+0x16/0x16 [ 130.333174] ? report_bug.cold+0x66/0xab [ 130.333193] ? group_sched_out.part.0+0x2c7/0x460 [ 130.333205] report_bug.cold+0x72/0xab [ 130.333224] handle_bug+0x3c/0x70 [ 130.333242] exc_invalid_op+0x14/0x50 [ 130.333261] asm_exc_invalid_op+0x16/0x20 [ 130.333274] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 130.333288] Code: 5e 41 5f e9 9b b9 ef ff e8 96 b9 ef ff 65 8b 1d 2b 12 ac 7e 31 ff 89 de e8 36 b6 ef ff 85 db 0f 84 8a 00 00 00 e8 79 b9 ef ff <0f> 0b e9 a5 fe ff ff e8 6d b9 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 130.333300] RSP: 0018:ffff88804111fc48 EFLAGS: 00010006 [ 130.333310] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 130.333318] RDX: ffff8880176c1ac0 RSI: ffffffff815663a7 RDI: 0000000000000005 [ 130.333326] RBP: ffff8880411b85c8 R08: 0000000000000005 R09: 0000000000000001 [ 130.333334] R10: 0000000000000000 R11: ffffffff865b005b R12: ffff88801abb9000 [ 130.333342] R13: ffff88806cf3d140 R14: ffffffff8547cf80 R15: 0000000000000002 [ 130.333354] ? group_sched_out.part.0+0x2c7/0x460 [ 130.333367] ? group_sched_out.part.0+0x2c7/0x460 [ 130.333381] ctx_sched_out+0x8f1/0xc10 [ 130.333394] __perf_event_task_sched_out+0x6d0/0x18d0 [ 130.333411] ? lock_is_held_type+0xd7/0x130 [ 130.333424] ? __perf_cgroup_move+0x160/0x160 [ 130.333437] ? set_next_entity+0x304/0x550 [ 130.333456] ? update_curr+0x267/0x740 [ 130.333477] ? lock_is_held_type+0xd7/0x130 [ 130.333490] __schedule+0xedd/0x2470 [ 130.333507] ? io_schedule_timeout+0x150/0x150 [ 130.333524] ? rcu_read_lock_sched_held+0x3e/0x80 [ 130.333546] schedule+0xda/0x1b0 [ 130.333561] exit_to_user_mode_prepare+0x114/0x1a0 [ 130.333574] syscall_exit_to_user_mode+0x19/0x40 [ 130.333587] do_syscall_64+0x48/0x90 [ 130.333605] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 130.333618] RIP: 0033:0x7f1853cd6b19 [ 130.333627] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 130.333638] RSP: 002b:00007f185124c218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 130.333650] RAX: 0000000000000001 RBX: 00007f1853de9f68 RCX: 00007f1853cd6b19 [ 130.333658] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f1853de9f6c [ 130.333665] RBP: 00007f1853de9f60 R08: 000000000000000e R09: 0000000000000000 [ 130.333673] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f1853de9f6c [ 130.333681] R13: 00007ffdacf1be4f R14: 00007f185124c300 R15: 0000000000022000 [ 130.333694] [ 130.387995] WARNING: CPU: 1 PID: 3968 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 130.388673] Modules linked in: [ 130.388915] CPU: 1 PID: 3968 Comm: syz-executor.0 Not tainted 6.0.0-rc6-next-20220921 #1 [ 130.389497] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 130.390314] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 130.390714] Code: 5e 41 5f e9 9b b9 ef ff e8 96 b9 ef ff 65 8b 1d 2b 12 ac 7e 31 ff 89 de e8 36 b6 ef ff 85 db 0f 84 8a 00 00 00 e8 79 b9 ef ff <0f> 0b e9 a5 fe ff ff e8 6d b9 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 130.392041] RSP: 0018:ffff88804111fc48 EFLAGS: 00010006 [ 130.392429] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 130.392940] RDX: ffff8880176c1ac0 RSI: ffffffff815663a7 RDI: 0000000000000005 [ 130.393430] RBP: ffff8880411b85c8 R08: 0000000000000005 R09: 0000000000000001 [ 130.393933] R10: 0000000000000000 R11: ffffffff865b005b R12: ffff88801abb9000 [ 130.394427] R13: ffff88806cf3d140 R14: ffffffff8547cf80 R15: 0000000000000002 [ 130.394927] FS: 00007f185124c700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 130.395487] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 130.395916] CR2: 00007feacfbee000 CR3: 00000000400e0000 CR4: 0000000000350ee0 [ 130.396412] Call Trace: [ 130.396601] [ 130.396767] ctx_sched_out+0x8f1/0xc10 [ 130.397057] __perf_event_task_sched_out+0x6d0/0x18d0 [ 130.397445] ? lock_is_held_type+0xd7/0x130 [ 130.397769] ? __perf_cgroup_move+0x160/0x160 [ 130.398113] ? set_next_entity+0x304/0x550 [ 130.398443] ? update_curr+0x267/0x740 [ 130.398744] ? lock_is_held_type+0xd7/0x130 [ 130.399077] __schedule+0xedd/0x2470 [ 130.399369] ? io_schedule_timeout+0x150/0x150 [ 130.399720] ? rcu_read_lock_sched_held+0x3e/0x80 [ 130.400113] schedule+0xda/0x1b0 [ 130.400380] exit_to_user_mode_prepare+0x114/0x1a0 [ 130.400746] syscall_exit_to_user_mode+0x19/0x40 [ 130.401105] do_syscall_64+0x48/0x90 [ 130.401400] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 130.401781] RIP: 0033:0x7f1853cd6b19 [ 130.402062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 130.403401] RSP: 002b:00007f185124c218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 130.403967] RAX: 0000000000000001 RBX: 00007f1853de9f68 RCX: 00007f1853cd6b19 [ 130.404509] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f1853de9f6c [ 130.405035] RBP: 00007f1853de9f60 R08: 000000000000000e R09: 0000000000000000 [ 130.405573] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f1853de9f6c [ 130.406108] R13: 00007ffdacf1be4f R14: 00007f185124c300 R15: 0000000000022000 [ 130.406634] [ 130.406813] irq event stamp: 754 [ 130.407060] hardirqs last enabled at (753): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 130.407740] hardirqs last disabled at (754): [] __schedule+0x1225/0x2470 [ 130.408353] softirqs last enabled at (500): [] __irq_exit_rcu+0x11b/0x180 [ 130.408972] softirqs last disabled at (491): [] __irq_exit_rcu+0x11b/0x180 [ 130.409596] ---[ end trace 0000000000000000 ]--- [ 130.478004] hrtimer: interrupt took 21651 ns [ 131.127494] capability: warning: `syz-executor.3' uses deprecated v2 capabilities in a way that may be insecure 14:25:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x42, 0x3f, 0x5d, 0x0, 0x9, 0x80000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80000009, 0x4, @perf_config_ext={0x3, 0xfc0000000}, 0x12198, 0x1000, 0x0, 0x0, 0x8, 0x2, 0x9, 0x0, 0x9, 0x0, 0x5}, r1, 0x2, 0xffffffffffffffff, 0x3) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300), 0x242880, &(0x7f00000005c0)=ANY=[@ANYBLOB="7472616e7390a15ba47b28803dce31140d294091dc31655df04a2c38b41389c25277c75f06b768", @ANYRESHEX, @ANYBLOB="2c6a62267c2885e717862c6f9e4928", @ANYRESOCT, @ANYBLOB=',cache=fscache,version=9p2000.u,privport,nodevmap,loose,\x00osixacl,access=', @ANYRESDEC, @ANYBLOB=',access=any,cache=none,subj_role=,smackfsroot=,fsname=\\,smackfshat=,(^\\)\a^,hash,smackfsfloor=^#\",func=FIRMWARE_CHECK,\x00']) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x40000, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0xee01, 0xee01) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000340)) 14:25:55 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x41) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x88842) ppoll(&(0x7f0000000300)=[{r0, 0x4}, {r1}], 0x2, 0x0, 0x0, 0x0) 14:25:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002840), 0x0, &(0x7f0000002700)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4018f50b, &(0x7f0000000000)={0x0, 0xfffffffffffffff8, 0x1}) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001580)={{0x1, 0x1, 0x18, r2, {0x4}}, './file1\x00'}) accept$unix(r1, &(0x7f00000015c0)=@abs, &(0x7f0000001640)=0x6e) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) r6 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r6, 0x29, 0x4b, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r6, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, &(0x7f0000000040)) sendfile(0xffffffffffffffff, r5, 0x0, 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r7, &(0x7f0000001180)=ANY=[], 0x220) close_range(r0, 0xffffffffffffffff, 0x0) 14:25:55 executing program 3: timer_create(0x0, 0x0, &(0x7f0000001140)) timer_settime(0x0, 0x0, &(0x7f0000003cc0)={{}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000003dc0)={{0x77359400}, {0x0, 0x3938700}}, &(0x7f0000003e00)) 14:25:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002840), 0x0, &(0x7f0000002700)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4018f50b, &(0x7f0000000000)={0x0, 0xfffffffffffffff8, 0x1}) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001580)={{0x1, 0x1, 0x18, r2, {0x4}}, './file1\x00'}) accept$unix(r1, &(0x7f00000015c0)=@abs, &(0x7f0000001640)=0x6e) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) r6 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r6, 0x29, 0x4b, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r6, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, &(0x7f0000000040)) sendfile(0xffffffffffffffff, r5, 0x0, 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r7, &(0x7f0000001180)=ANY=[], 0x220) close_range(r0, 0xffffffffffffffff, 0x0) 14:25:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002840), 0x0, &(0x7f0000002700)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4018f50b, &(0x7f0000000000)={0x0, 0xfffffffffffffff8, 0x1}) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001580)={{0x1, 0x1, 0x18, r2, {0x4}}, './file1\x00'}) accept$unix(r1, &(0x7f00000015c0)=@abs, &(0x7f0000001640)=0x6e) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) r6 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r6, 0x29, 0x4b, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r6, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, &(0x7f0000000040)) sendfile(0xffffffffffffffff, r5, 0x0, 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r7, &(0x7f0000001180)=ANY=[], 0x220) close_range(r0, 0xffffffffffffffff, 0x0) 14:25:55 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002840), 0x0, &(0x7f0000002700)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4018f50b, &(0x7f0000000000)={0x0, 0xfffffffffffffff8, 0x1}) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001580)={{0x1, 0x1, 0x18, r2, {0x4}}, './file1\x00'}) accept$unix(r1, &(0x7f00000015c0)=@abs, &(0x7f0000001640)=0x6e) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) r6 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r6, 0x29, 0x4b, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r6, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, &(0x7f0000000040)) sendfile(0xffffffffffffffff, r5, 0x0, 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r7, &(0x7f0000001180)=ANY=[], 0x220) close_range(r0, 0xffffffffffffffff, 0x0) 14:25:55 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f00000033c0)=[{{&(0x7f0000000340)=@qipcrtr={0x2a, 0x3}, 0x80, 0x0}}, {{&(0x7f0000000500)=@pppoe={0x18, 0x0, {0x0, @random="31cd28f57c44", 'ip6gre0\x00'}}, 0x80, 0x0}}], 0x2, 0x0) 14:25:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x42, 0x3f, 0x5d, 0x0, 0x9, 0x80000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80000009, 0x4, @perf_config_ext={0x3, 0xfc0000000}, 0x12198, 0x1000, 0x0, 0x0, 0x8, 0x2, 0x9, 0x0, 0x9, 0x0, 0x5}, r1, 0x2, 0xffffffffffffffff, 0x3) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300), 0x242880, &(0x7f00000005c0)=ANY=[@ANYBLOB="7472616e7390a15ba47b28803dce31140d294091dc31655df04a2c38b41389c25277c75f06b768", @ANYRESHEX, @ANYBLOB="2c6a62267c2885e717862c6f9e4928", @ANYRESOCT, @ANYBLOB=',cache=fscache,version=9p2000.u,privport,nodevmap,loose,\x00osixacl,access=', @ANYRESDEC, @ANYBLOB=',access=any,cache=none,subj_role=,smackfsroot=,fsname=\\,smackfshat=,(^\\)\a^,hash,smackfsfloor=^#\",func=FIRMWARE_CHECK,\x00']) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x40000, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0xee01, 0xee01) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000340)) 14:25:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x42, 0x3f, 0x5d, 0x0, 0x9, 0x80000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80000009, 0x4, @perf_config_ext={0x3, 0xfc0000000}, 0x12198, 0x1000, 0x0, 0x0, 0x8, 0x2, 0x9, 0x0, 0x9, 0x0, 0x5}, r1, 0x2, 0xffffffffffffffff, 0x3) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300), 0x242880, &(0x7f00000005c0)=ANY=[@ANYBLOB="7472616e7390a15ba47b28803dce31140d294091dc31655df04a2c38b41389c25277c75f06b768", @ANYRESHEX, @ANYBLOB="2c6a62267c2885e717862c6f9e4928", @ANYRESOCT, @ANYBLOB=',cache=fscache,version=9p2000.u,privport,nodevmap,loose,\x00osixacl,access=', @ANYRESDEC, @ANYBLOB=',access=any,cache=none,subj_role=,smackfsroot=,fsname=\\,smackfshat=,(^\\)\a^,hash,smackfsfloor=^#\",func=FIRMWARE_CHECK,\x00']) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x40000, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0xee01, 0xee01) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000340)) 14:25:55 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f00000033c0)=[{{&(0x7f0000000340)=@qipcrtr={0x2a, 0x3}, 0x80, 0x0}}, {{&(0x7f0000000500)=@pppoe={0x18, 0x0, {0x0, @random="31cd28f57c44", 'ip6gre0\x00'}}, 0x80, 0x0}}], 0x2, 0x0) 14:25:55 executing program 2: syz_mount_image$nfs4(&(0x7f0000000840), 0x0, 0x0, 0x1, &(0x7f0000000a40)=[{&(0x7f00000008c0)='f', 0x1}], 0x0, &(0x7f0000000a80)) 14:25:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x42, 0x3f, 0x5d, 0x0, 0x9, 0x80000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80000009, 0x4, @perf_config_ext={0x3, 0xfc0000000}, 0x12198, 0x1000, 0x0, 0x0, 0x8, 0x2, 0x9, 0x0, 0x9, 0x0, 0x5}, r1, 0x2, 0xffffffffffffffff, 0x3) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300), 0x242880, &(0x7f00000005c0)=ANY=[@ANYBLOB="7472616e7390a15ba47b28803dce31140d294091dc31655df04a2c38b41389c25277c75f06b768", @ANYRESHEX, @ANYBLOB="2c6a62267c2885e717862c6f9e4928", @ANYRESOCT, @ANYBLOB=',cache=fscache,version=9p2000.u,privport,nodevmap,loose,\x00osixacl,access=', @ANYRESDEC, @ANYBLOB=',access=any,cache=none,subj_role=,smackfsroot=,fsname=\\,smackfshat=,(^\\)\a^,hash,smackfsfloor=^#\",func=FIRMWARE_CHECK,\x00']) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x40000, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0xee01, 0xee01) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000340)) 14:25:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002840), 0x0, &(0x7f0000002700)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4018f50b, &(0x7f0000000000)={0x0, 0xfffffffffffffff8, 0x1}) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001580)={{0x1, 0x1, 0x18, r2, {0x4}}, './file1\x00'}) accept$unix(r1, &(0x7f00000015c0)=@abs, &(0x7f0000001640)=0x6e) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) r6 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r6, 0x29, 0x4b, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r6, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, &(0x7f0000000040)) sendfile(0xffffffffffffffff, r5, 0x0, 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r7, &(0x7f0000001180)=ANY=[], 0x220) close_range(r0, 0xffffffffffffffff, 0x0) 14:25:55 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f00000033c0)=[{{&(0x7f0000000340)=@qipcrtr={0x2a, 0x3}, 0x80, 0x0}}, {{&(0x7f0000000500)=@pppoe={0x18, 0x0, {0x0, @random="31cd28f57c44", 'ip6gre0\x00'}}, 0x80, 0x0}}], 0x2, 0x0) 14:25:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x42, 0x3f, 0x5d, 0x0, 0x9, 0x80000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80000009, 0x4, @perf_config_ext={0x3, 0xfc0000000}, 0x12198, 0x1000, 0x0, 0x0, 0x8, 0x2, 0x9, 0x0, 0x9, 0x0, 0x5}, r1, 0x2, 0xffffffffffffffff, 0x3) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300), 0x242880, &(0x7f00000005c0)=ANY=[@ANYBLOB="7472616e7390a15ba47b28803dce31140d294091dc31655df04a2c38b41389c25277c75f06b768", @ANYRESHEX, @ANYBLOB="2c6a62267c2885e717862c6f9e4928", @ANYRESOCT, @ANYBLOB=',cache=fscache,version=9p2000.u,privport,nodevmap,loose,\x00osixacl,access=', @ANYRESDEC, @ANYBLOB=',access=any,cache=none,subj_role=,smackfsroot=,fsname=\\,smackfshat=,(^\\)\a^,hash,smackfsfloor=^#\",func=FIRMWARE_CHECK,\x00']) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x40000, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0xee01, 0xee01) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000340)) 14:25:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000c80)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x2) 14:25:55 executing program 4: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000580)) open_tree(0xffffffffffffff9c, 0x0, 0x8101) 14:25:55 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002840), 0x0, &(0x7f0000002700)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4018f50b, &(0x7f0000000000)={0x0, 0xfffffffffffffff8, 0x1}) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001580)={{0x1, 0x1, 0x18, r2, {0x4}}, './file1\x00'}) accept$unix(r1, &(0x7f00000015c0)=@abs, &(0x7f0000001640)=0x6e) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) r6 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r6, 0x29, 0x4b, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r6, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, &(0x7f0000000040)) sendfile(0xffffffffffffffff, r5, 0x0, 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r7, &(0x7f0000001180)=ANY=[], 0x220) close_range(r0, 0xffffffffffffffff, 0x0) 14:25:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002840), 0x0, &(0x7f0000002700)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4018f50b, &(0x7f0000000000)={0x0, 0xfffffffffffffff8, 0x1}) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001580)={{0x1, 0x1, 0x18, r2, {0x4}}, './file1\x00'}) accept$unix(r1, &(0x7f00000015c0)=@abs, &(0x7f0000001640)=0x6e) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) r6 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r6, 0x29, 0x4b, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r6, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, &(0x7f0000000040)) sendfile(0xffffffffffffffff, r5, 0x0, 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r7, &(0x7f0000001180)=ANY=[], 0x220) close_range(r0, 0xffffffffffffffff, 0x0) 14:25:55 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x28, r1, 0x87d27e71721737b5, 0x0, 0x0, {{0x32}, {@void, @val={0x8}, @val={0xc, 0x117}}}}, 0x28}}, 0x0) 14:25:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002840), 0x0, &(0x7f0000002700)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4018f50b, &(0x7f0000000000)={0x0, 0xfffffffffffffff8, 0x1}) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001580)={{0x1, 0x1, 0x18, r2, {0x4}}, './file1\x00'}) accept$unix(r1, &(0x7f00000015c0)=@abs, &(0x7f0000001640)=0x6e) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) r6 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r6, 0x29, 0x4b, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r6, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, &(0x7f0000000040)) sendfile(0xffffffffffffffff, r5, 0x0, 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r7, &(0x7f0000001180)=ANY=[], 0x220) close_range(r0, 0xffffffffffffffff, 0x0) 14:25:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x14, r1, 0x1, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 14:25:55 executing program 3: perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2c5bc000000000, 0x200}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:25:55 executing program 4: r0 = add_key$keyring(&(0x7f00000010c0), &(0x7f0000001100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000001140)='trusted\x00', &(0x7f00000013c0)='!})!)-.\\&\x00\xa5`\x9d\xbe$I\xb2\x1d\xebe\xdb\xb7\x90-\xb3\x10\xf4\xacri&\x92?\xaeDs(\x06K\xe3\x97\x8e\x90\x15\xb1\xd1\x1a\xd5Z\x95%\xe4i\xc3}\x9f\x8a\xb3\xc4F,\v\xa7.z\xd0\xa2\x81A\x1e\x10\x1c\x12\xe9uVxF\xf7j\x94\xe6\x8cb\x14\x89\xd51J\x18{\\\xe9h\x8a\x1e\xe4\x05\x7f\x86\x02\xdd\xec:\x88\xe9\x16\xb3\x97\'\x9f/\xc4\x88vSS\\\xcf\x11\xfb\xc7w\x00\xe9\xab;v7\x8a\x83\xf1\x13J\x03\x1f\xab\xbb\x80\xb1\xaalE\xefU\xdf\xbc\xd7Gn\xcd6\xcf\xc88\"t{Q\xc3O&\x906\xb3\xbb\x04\x00\x87\a\x00\x00\x00\xed\xac\xf4\xb9\xc5\xa9n\x1d\x13\x81\xec3\xa94\xff\xf8\xd0\x03\x16u\x9d`\x8d\x95\xbbk\xac\xd8&\xee\xed8\xde\x902\x8eF\xe1\x9f\xc7\x10@\x12->\x80\xb3\x1c\x16\xfaD\xd8a\a\x9e\x1c\x0e\xd2H\xb3\xde\x0e\xa5\xf1d\xc7\xd4\n}\x82\xcd\xa6\xde\x84\xb0\xe3\x87\xb4\x1eV0\xb4c\xf8\x7f*\xedv\xef\xf6\x06\xcf\xa1\x8c\x0fW\xa3\xee3\x951\xba\xd9(\xb5\xf3\xa9Z\xa8\x12\xcf\xf6\xa3 \x14\xa55\xe8\xf7\x0f8\xee\\\x03\xb9,\x1c\x81\xe8~b\xca\x83\xb7~\x9bT\xdbo\x91j\xf8\xc0|WtHF\x8f\xa5\xfc\xf0\x9aW\x9f\x85\x8f^1\xd0\xab\x93\xa0M\x96\x8at\xc4\xa9}\xe1\xa6\x16\x90Y,O6\xa3\xcbwm\x9d|\x86\xa9\x8aN*\x1e\xe7\x9a\x81\x15*\x06\xffu\xe0\x13\xa9\xc9%s\x18\xa3\xcf\xf5\xcf\x87\xe5+\xfb/$\xb8H\xf7\xdb\x12\x1e]I\x94N-\xdd\xecrR\xb8\x8a\x84UW{G\xe2\xf4\x1d\xbd\xd10K\x84\x18/\xc4\xa7<\xd6\xd3z\xac\x8e\b\xa8\x00f\xb5\xefR\xd2\xb9\x04s\x1a\r\x1b\xf0$\x1f|x\x9f\xa4\x87\xc9?\xc3\xa2H\xf6\x9a\x82\x7f\xa5^C\xe8\x1d') 14:25:55 executing program 7: pwritev(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x7fffffe, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = io_uring_setup(0x7258, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="084c8ba4eb485ff80900c3ceafa7925f860259eb0d3a70effba1003dfb49c527b6e5a70000000000"], 0x2c}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x6, &(0x7f0000000480)=[{&(0x7f0000000140), 0x0, 0x6}, {&(0x7f0000000300)="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", 0xfc, 0x5}, {&(0x7f0000000180)="fe29162c3ec0f4dcf91fe84f6a3a3e86ce9cf0cfb83903fe60fa32a9e6e25b4701baca4abdeb5e5baa2214deffaf2ebf2acadd504f712374893d194650545a78783e73bd41d33928700e", 0x4a, 0xd23}, {&(0x7f0000000200)="034704daa3a073dc18813ac6ce7e98e9e8d63ee8110718", 0x17, 0x3ff}, {&(0x7f0000000400), 0x0, 0x1}, {&(0x7f0000000440)="8de9bc7cd65136e3f9b152fe6fccd89f6aae0d46fb040c480e32bfeb0d705225", 0x20, 0x7f}], 0x2204040, &(0x7f0000000540)={[{@utf8}, {@sbsector={'sbsector', 0x3d, 0x2}}, {@check_relaxed}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fowner_lt}, {@dont_appraise}, {@fsmagic={'fsmagic', 0x3d, 0x4d}}, {@subj_role={'subj_role', 0x3d, '&,,\''}}, {@subj_user={'subj_user', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@uid_gt={'uid>', 0xee00}}]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB="5f9382a406c09697fc3af902c3e4895ab83d19c9eb49d8a3838bb14b57ebcd66a4ac7408944d0fc1c96406c9cd29581502174e", @ANYRES16=r4, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="0800c300000000000800c40000000000"], 0x2c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r6, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r7, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) 14:25:55 executing program 3: perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2c5bc000000000, 0x200}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 131.814189] loop7: detected capacity change from 0 to 13 [ 131.837835] ======================================================= [ 131.837835] WARNING: The mand mount option has been deprecated and [ 131.837835] and is ignored by this kernel. Remove the mand [ 131.837835] option from the mount to silence this warning. [ 131.837835] ======================================================= [ 131.912696] loop7: detected capacity change from 0 to 13 14:25:55 executing program 6: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0, 0x1}, 0x0) io_uring_enter(r0, 0x58df, 0x0, 0x0, 0x0, 0x0) 14:25:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000c80)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x2) 14:25:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002840), 0x0, &(0x7f0000002700)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4018f50b, &(0x7f0000000000)={0x0, 0xfffffffffffffff8, 0x1}) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001580)={{0x1, 0x1, 0x18, r2, {0x4}}, './file1\x00'}) accept$unix(r1, &(0x7f00000015c0)=@abs, &(0x7f0000001640)=0x6e) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) r6 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r6, 0x29, 0x4b, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r6, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, &(0x7f0000000040)) sendfile(0xffffffffffffffff, r5, 0x0, 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r7, &(0x7f0000001180)=ANY=[], 0x220) close_range(r0, 0xffffffffffffffff, 0x0) 14:25:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x42, 0x3f, 0x5d, 0x0, 0x9, 0x80000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80000009, 0x4, @perf_config_ext={0x3, 0xfc0000000}, 0x12198, 0x1000, 0x0, 0x0, 0x8, 0x2, 0x9, 0x0, 0x9, 0x0, 0x5}, r1, 0x2, 0xffffffffffffffff, 0x3) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300), 0x242880, &(0x7f00000005c0)=ANY=[@ANYBLOB="7472616e7390a15ba47b28803dce31140d294091dc31655df04a2c38b41389c25277c75f06b768", @ANYRESHEX, @ANYBLOB="2c6a62267c2885e717862c6f9e4928", @ANYRESOCT, @ANYBLOB=',cache=fscache,version=9p2000.u,privport,nodevmap,loose,\x00osixacl,access=', @ANYRESDEC, @ANYBLOB=',access=any,cache=none,subj_role=,smackfsroot=,fsname=\\,smackfshat=,(^\\)\a^,hash,smackfsfloor=^#\",func=FIRMWARE_CHECK,\x00']) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x40000, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0xee01, 0xee01) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000340)) 14:25:55 executing program 3: perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2c5bc000000000, 0x200}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:25:56 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:25:56 executing program 4: r0 = add_key$keyring(&(0x7f00000010c0), &(0x7f0000001100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000001140)='trusted\x00', &(0x7f00000013c0)='!})!)-.\\&\x00\xa5`\x9d\xbe$I\xb2\x1d\xebe\xdb\xb7\x90-\xb3\x10\xf4\xacri&\x92?\xaeDs(\x06K\xe3\x97\x8e\x90\x15\xb1\xd1\x1a\xd5Z\x95%\xe4i\xc3}\x9f\x8a\xb3\xc4F,\v\xa7.z\xd0\xa2\x81A\x1e\x10\x1c\x12\xe9uVxF\xf7j\x94\xe6\x8cb\x14\x89\xd51J\x18{\\\xe9h\x8a\x1e\xe4\x05\x7f\x86\x02\xdd\xec:\x88\xe9\x16\xb3\x97\'\x9f/\xc4\x88vSS\\\xcf\x11\xfb\xc7w\x00\xe9\xab;v7\x8a\x83\xf1\x13J\x03\x1f\xab\xbb\x80\xb1\xaalE\xefU\xdf\xbc\xd7Gn\xcd6\xcf\xc88\"t{Q\xc3O&\x906\xb3\xbb\x04\x00\x87\a\x00\x00\x00\xed\xac\xf4\xb9\xc5\xa9n\x1d\x13\x81\xec3\xa94\xff\xf8\xd0\x03\x16u\x9d`\x8d\x95\xbbk\xac\xd8&\xee\xed8\xde\x902\x8eF\xe1\x9f\xc7\x10@\x12->\x80\xb3\x1c\x16\xfaD\xd8a\a\x9e\x1c\x0e\xd2H\xb3\xde\x0e\xa5\xf1d\xc7\xd4\n}\x82\xcd\xa6\xde\x84\xb0\xe3\x87\xb4\x1eV0\xb4c\xf8\x7f*\xedv\xef\xf6\x06\xcf\xa1\x8c\x0fW\xa3\xee3\x951\xba\xd9(\xb5\xf3\xa9Z\xa8\x12\xcf\xf6\xa3 \x14\xa55\xe8\xf7\x0f8\xee\\\x03\xb9,\x1c\x81\xe8~b\xca\x83\xb7~\x9bT\xdbo\x91j\xf8\xc0|WtHF\x8f\xa5\xfc\xf0\x9aW\x9f\x85\x8f^1\xd0\xab\x93\xa0M\x96\x8at\xc4\xa9}\xe1\xa6\x16\x90Y,O6\xa3\xcbwm\x9d|\x86\xa9\x8aN*\x1e\xe7\x9a\x81\x15*\x06\xffu\xe0\x13\xa9\xc9%s\x18\xa3\xcf\xf5\xcf\x87\xe5+\xfb/$\xb8H\xf7\xdb\x12\x1e]I\x94N-\xdd\xecrR\xb8\x8a\x84UW{G\xe2\xf4\x1d\xbd\xd10K\x84\x18/\xc4\xa7<\xd6\xd3z\xac\x8e\b\xa8\x00f\xb5\xefR\xd2\xb9\x04s\x1a\r\x1b\xf0$\x1f|x\x9f\xa4\x87\xc9?\xc3\xa2H\xf6\x9a\x82\x7f\xa5^C\xe8\x1d') 14:25:56 executing program 7: pwritev(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x7fffffe, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = io_uring_setup(0x7258, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="084c8ba4eb485ff80900c3ceafa7925f860259eb0d3a70effba1003dfb49c527b6e5a70000000000"], 0x2c}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x6, &(0x7f0000000480)=[{&(0x7f0000000140), 0x0, 0x6}, {&(0x7f0000000300)="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", 0xfc, 0x5}, {&(0x7f0000000180)="fe29162c3ec0f4dcf91fe84f6a3a3e86ce9cf0cfb83903fe60fa32a9e6e25b4701baca4abdeb5e5baa2214deffaf2ebf2acadd504f712374893d194650545a78783e73bd41d33928700e", 0x4a, 0xd23}, {&(0x7f0000000200)="034704daa3a073dc18813ac6ce7e98e9e8d63ee8110718", 0x17, 0x3ff}, {&(0x7f0000000400), 0x0, 0x1}, {&(0x7f0000000440)="8de9bc7cd65136e3f9b152fe6fccd89f6aae0d46fb040c480e32bfeb0d705225", 0x20, 0x7f}], 0x2204040, &(0x7f0000000540)={[{@utf8}, {@sbsector={'sbsector', 0x3d, 0x2}}, {@check_relaxed}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fowner_lt}, {@dont_appraise}, {@fsmagic={'fsmagic', 0x3d, 0x4d}}, {@subj_role={'subj_role', 0x3d, '&,,\''}}, {@subj_user={'subj_user', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@uid_gt={'uid>', 0xee00}}]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB="5f9382a406c09697fc3af902c3e4895ab83d19c9eb49d8a3838bb14b57ebcd66a4ac7408944d0fc1c96406c9cd29581502174e", @ANYRES16=r4, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="0800c300000000000800c40000000000"], 0x2c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r6, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r7, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) [ 132.071344] loop7: detected capacity change from 0 to 13 14:25:56 executing program 3: perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2c5bc000000000, 0x200}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:25:56 executing program 4: r0 = add_key$keyring(&(0x7f00000010c0), &(0x7f0000001100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000001140)='trusted\x00', &(0x7f00000013c0)='!})!)-.\\&\x00\xa5`\x9d\xbe$I\xb2\x1d\xebe\xdb\xb7\x90-\xb3\x10\xf4\xacri&\x92?\xaeDs(\x06K\xe3\x97\x8e\x90\x15\xb1\xd1\x1a\xd5Z\x95%\xe4i\xc3}\x9f\x8a\xb3\xc4F,\v\xa7.z\xd0\xa2\x81A\x1e\x10\x1c\x12\xe9uVxF\xf7j\x94\xe6\x8cb\x14\x89\xd51J\x18{\\\xe9h\x8a\x1e\xe4\x05\x7f\x86\x02\xdd\xec:\x88\xe9\x16\xb3\x97\'\x9f/\xc4\x88vSS\\\xcf\x11\xfb\xc7w\x00\xe9\xab;v7\x8a\x83\xf1\x13J\x03\x1f\xab\xbb\x80\xb1\xaalE\xefU\xdf\xbc\xd7Gn\xcd6\xcf\xc88\"t{Q\xc3O&\x906\xb3\xbb\x04\x00\x87\a\x00\x00\x00\xed\xac\xf4\xb9\xc5\xa9n\x1d\x13\x81\xec3\xa94\xff\xf8\xd0\x03\x16u\x9d`\x8d\x95\xbbk\xac\xd8&\xee\xed8\xde\x902\x8eF\xe1\x9f\xc7\x10@\x12->\x80\xb3\x1c\x16\xfaD\xd8a\a\x9e\x1c\x0e\xd2H\xb3\xde\x0e\xa5\xf1d\xc7\xd4\n}\x82\xcd\xa6\xde\x84\xb0\xe3\x87\xb4\x1eV0\xb4c\xf8\x7f*\xedv\xef\xf6\x06\xcf\xa1\x8c\x0fW\xa3\xee3\x951\xba\xd9(\xb5\xf3\xa9Z\xa8\x12\xcf\xf6\xa3 \x14\xa55\xe8\xf7\x0f8\xee\\\x03\xb9,\x1c\x81\xe8~b\xca\x83\xb7~\x9bT\xdbo\x91j\xf8\xc0|WtHF\x8f\xa5\xfc\xf0\x9aW\x9f\x85\x8f^1\xd0\xab\x93\xa0M\x96\x8at\xc4\xa9}\xe1\xa6\x16\x90Y,O6\xa3\xcbwm\x9d|\x86\xa9\x8aN*\x1e\xe7\x9a\x81\x15*\x06\xffu\xe0\x13\xa9\xc9%s\x18\xa3\xcf\xf5\xcf\x87\xe5+\xfb/$\xb8H\xf7\xdb\x12\x1e]I\x94N-\xdd\xecrR\xb8\x8a\x84UW{G\xe2\xf4\x1d\xbd\xd10K\x84\x18/\xc4\xa7<\xd6\xd3z\xac\x8e\b\xa8\x00f\xb5\xefR\xd2\xb9\x04s\x1a\r\x1b\xf0$\x1f|x\x9f\xa4\x87\xc9?\xc3\xa2H\xf6\x9a\x82\x7f\xa5^C\xe8\x1d') 14:25:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000c80)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x2) 14:25:56 executing program 6: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0, 0x1}, 0x0) io_uring_enter(r0, 0x58df, 0x0, 0x0, 0x0, 0x0) 14:25:56 executing program 1: pwritev(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x7fffffe, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = io_uring_setup(0x7258, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="084c8ba4eb485ff80900c3ceafa7925f860259eb0d3a70effba1003dfb49c527b6e5a70000000000"], 0x2c}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x6, &(0x7f0000000480)=[{&(0x7f0000000140), 0x0, 0x6}, {&(0x7f0000000300)="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", 0xfc, 0x5}, {&(0x7f0000000180)="fe29162c3ec0f4dcf91fe84f6a3a3e86ce9cf0cfb83903fe60fa32a9e6e25b4701baca4abdeb5e5baa2214deffaf2ebf2acadd504f712374893d194650545a78783e73bd41d33928700e", 0x4a, 0xd23}, {&(0x7f0000000200)="034704daa3a073dc18813ac6ce7e98e9e8d63ee8110718", 0x17, 0x3ff}, {&(0x7f0000000400), 0x0, 0x1}, {&(0x7f0000000440)="8de9bc7cd65136e3f9b152fe6fccd89f6aae0d46fb040c480e32bfeb0d705225", 0x20, 0x7f}], 0x2204040, &(0x7f0000000540)={[{@utf8}, {@sbsector={'sbsector', 0x3d, 0x2}}, {@check_relaxed}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fowner_lt}, {@dont_appraise}, {@fsmagic={'fsmagic', 0x3d, 0x4d}}, {@subj_role={'subj_role', 0x3d, '&,,\''}}, {@subj_user={'subj_user', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@uid_gt={'uid>', 0xee00}}]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB="5f9382a406c09697fc3af902c3e4895ab83d19c9eb49d8a3838bb14b57ebcd66a4ac7408944d0fc1c96406c9cd29581502174e", @ANYRES16=r4, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="0800c300000000000800c40000000000"], 0x2c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r6, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r7, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) 14:25:56 executing program 7: pwritev(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x7fffffe, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = io_uring_setup(0x7258, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="084c8ba4eb485ff80900c3ceafa7925f860259eb0d3a70effba1003dfb49c527b6e5a70000000000"], 0x2c}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x6, &(0x7f0000000480)=[{&(0x7f0000000140), 0x0, 0x6}, {&(0x7f0000000300)="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", 0xfc, 0x5}, {&(0x7f0000000180)="fe29162c3ec0f4dcf91fe84f6a3a3e86ce9cf0cfb83903fe60fa32a9e6e25b4701baca4abdeb5e5baa2214deffaf2ebf2acadd504f712374893d194650545a78783e73bd41d33928700e", 0x4a, 0xd23}, {&(0x7f0000000200)="034704daa3a073dc18813ac6ce7e98e9e8d63ee8110718", 0x17, 0x3ff}, {&(0x7f0000000400), 0x0, 0x1}, {&(0x7f0000000440)="8de9bc7cd65136e3f9b152fe6fccd89f6aae0d46fb040c480e32bfeb0d705225", 0x20, 0x7f}], 0x2204040, &(0x7f0000000540)={[{@utf8}, {@sbsector={'sbsector', 0x3d, 0x2}}, {@check_relaxed}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fowner_lt}, {@dont_appraise}, {@fsmagic={'fsmagic', 0x3d, 0x4d}}, {@subj_role={'subj_role', 0x3d, '&,,\''}}, {@subj_user={'subj_user', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@uid_gt={'uid>', 0xee00}}]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB="5f9382a406c09697fc3af902c3e4895ab83d19c9eb49d8a3838bb14b57ebcd66a4ac7408944d0fc1c96406c9cd29581502174e", @ANYRES16=r4, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="0800c300000000000800c40000000000"], 0x2c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r6, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r7, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) 14:25:56 executing program 0: pwritev(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x7fffffe, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = io_uring_setup(0x7258, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="084c8ba4eb485ff80900c3ceafa7925f860259eb0d3a70effba1003dfb49c527b6e5a70000000000"], 0x2c}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x6, &(0x7f0000000480)=[{&(0x7f0000000140), 0x0, 0x6}, {&(0x7f0000000300)="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", 0xfc, 0x5}, {&(0x7f0000000180)="fe29162c3ec0f4dcf91fe84f6a3a3e86ce9cf0cfb83903fe60fa32a9e6e25b4701baca4abdeb5e5baa2214deffaf2ebf2acadd504f712374893d194650545a78783e73bd41d33928700e", 0x4a, 0xd23}, {&(0x7f0000000200)="034704daa3a073dc18813ac6ce7e98e9e8d63ee8110718", 0x17, 0x3ff}, {&(0x7f0000000400), 0x0, 0x1}, {&(0x7f0000000440)="8de9bc7cd65136e3f9b152fe6fccd89f6aae0d46fb040c480e32bfeb0d705225", 0x20, 0x7f}], 0x2204040, &(0x7f0000000540)={[{@utf8}, {@sbsector={'sbsector', 0x3d, 0x2}}, {@check_relaxed}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fowner_lt}, {@dont_appraise}, {@fsmagic={'fsmagic', 0x3d, 0x4d}}, {@subj_role={'subj_role', 0x3d, '&,,\''}}, {@subj_user={'subj_user', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@uid_gt={'uid>', 0xee00}}]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB="5f9382a406c09697fc3af902c3e4895ab83d19c9eb49d8a3838bb14b57ebcd66a4ac7408944d0fc1c96406c9cd29581502174e", @ANYRES16=r4, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="0800c300000000000800c40000000000"], 0x2c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r6, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r7, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) 14:25:56 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:25:56 executing program 4: r0 = add_key$keyring(&(0x7f00000010c0), &(0x7f0000001100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000001140)='trusted\x00', &(0x7f00000013c0)='!})!)-.\\&\x00\xa5`\x9d\xbe$I\xb2\x1d\xebe\xdb\xb7\x90-\xb3\x10\xf4\xacri&\x92?\xaeDs(\x06K\xe3\x97\x8e\x90\x15\xb1\xd1\x1a\xd5Z\x95%\xe4i\xc3}\x9f\x8a\xb3\xc4F,\v\xa7.z\xd0\xa2\x81A\x1e\x10\x1c\x12\xe9uVxF\xf7j\x94\xe6\x8cb\x14\x89\xd51J\x18{\\\xe9h\x8a\x1e\xe4\x05\x7f\x86\x02\xdd\xec:\x88\xe9\x16\xb3\x97\'\x9f/\xc4\x88vSS\\\xcf\x11\xfb\xc7w\x00\xe9\xab;v7\x8a\x83\xf1\x13J\x03\x1f\xab\xbb\x80\xb1\xaalE\xefU\xdf\xbc\xd7Gn\xcd6\xcf\xc88\"t{Q\xc3O&\x906\xb3\xbb\x04\x00\x87\a\x00\x00\x00\xed\xac\xf4\xb9\xc5\xa9n\x1d\x13\x81\xec3\xa94\xff\xf8\xd0\x03\x16u\x9d`\x8d\x95\xbbk\xac\xd8&\xee\xed8\xde\x902\x8eF\xe1\x9f\xc7\x10@\x12->\x80\xb3\x1c\x16\xfaD\xd8a\a\x9e\x1c\x0e\xd2H\xb3\xde\x0e\xa5\xf1d\xc7\xd4\n}\x82\xcd\xa6\xde\x84\xb0\xe3\x87\xb4\x1eV0\xb4c\xf8\x7f*\xedv\xef\xf6\x06\xcf\xa1\x8c\x0fW\xa3\xee3\x951\xba\xd9(\xb5\xf3\xa9Z\xa8\x12\xcf\xf6\xa3 \x14\xa55\xe8\xf7\x0f8\xee\\\x03\xb9,\x1c\x81\xe8~b\xca\x83\xb7~\x9bT\xdbo\x91j\xf8\xc0|WtHF\x8f\xa5\xfc\xf0\x9aW\x9f\x85\x8f^1\xd0\xab\x93\xa0M\x96\x8at\xc4\xa9}\xe1\xa6\x16\x90Y,O6\xa3\xcbwm\x9d|\x86\xa9\x8aN*\x1e\xe7\x9a\x81\x15*\x06\xffu\xe0\x13\xa9\xc9%s\x18\xa3\xcf\xf5\xcf\x87\xe5+\xfb/$\xb8H\xf7\xdb\x12\x1e]I\x94N-\xdd\xecrR\xb8\x8a\x84UW{G\xe2\xf4\x1d\xbd\xd10K\x84\x18/\xc4\xa7<\xd6\xd3z\xac\x8e\b\xa8\x00f\xb5\xefR\xd2\xb9\x04s\x1a\r\x1b\xf0$\x1f|x\x9f\xa4\x87\xc9?\xc3\xa2H\xf6\x9a\x82\x7f\xa5^C\xe8\x1d') 14:25:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000c80)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x2) 14:25:56 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) [ 132.669910] loop0: detected capacity change from 0 to 13 14:25:56 executing program 6: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0, 0x1}, 0x0) io_uring_enter(r0, 0x58df, 0x0, 0x0, 0x0, 0x0) 14:25:56 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x7fffffe, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = io_uring_setup(0x7258, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="084c8ba4eb485ff80900c3ceafa7925f860259eb0d3a70effba1003dfb49c527b6e5a70000000000"], 0x2c}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x6, &(0x7f0000000480)=[{&(0x7f0000000140), 0x0, 0x6}, {&(0x7f0000000300)="17035cd57f28b4a747a40e82283df5aaceaa6d7250b426656bb948459e344ce42b10df7314a4c38930322341ec279adb65f2abf711f51f7717c88be0d86ea28a9c1de97916de13ac053ae8a665ede9230b345903dd1d3aadca9d0cccfd466488b31f44cc35b6e1c440f320fbe7d9c64adac017c08ccc8c7658f491516ae379d023057bbbbceb0823722c7fb55d4b5845c1a92d45021866e5f18e1876bf54b9774aef8f4bec5d7db4151279f3c229366c78c0cb7b165da2f4295d04ca58d8d0695537bffaa9425aa217a252771463f8c8d103ac5837f3bada25d094fb7d9bd8c0a4a0d68262369c34aeb946180bdad473111fc95b1ba51b0c402b3239", 0xfc, 0x5}, {&(0x7f0000000180)="fe29162c3ec0f4dcf91fe84f6a3a3e86ce9cf0cfb83903fe60fa32a9e6e25b4701baca4abdeb5e5baa2214deffaf2ebf2acadd504f712374893d194650545a78783e73bd41d33928700e", 0x4a, 0xd23}, {&(0x7f0000000200)="034704daa3a073dc18813ac6ce7e98e9e8d63ee8110718", 0x17, 0x3ff}, {&(0x7f0000000400), 0x0, 0x1}, {&(0x7f0000000440)="8de9bc7cd65136e3f9b152fe6fccd89f6aae0d46fb040c480e32bfeb0d705225", 0x20, 0x7f}], 0x2204040, &(0x7f0000000540)={[{@utf8}, {@sbsector={'sbsector', 0x3d, 0x2}}, {@check_relaxed}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fowner_lt}, {@dont_appraise}, {@fsmagic={'fsmagic', 0x3d, 0x4d}}, {@subj_role={'subj_role', 0x3d, '&,,\''}}, {@subj_user={'subj_user', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@uid_gt={'uid>', 0xee00}}]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB="5f9382a406c09697fc3af902c3e4895ab83d19c9eb49d8a3838bb14b57ebcd66a4ac7408944d0fc1c96406c9cd29581502174e", @ANYRES16=r4, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="0800c300000000000800c40000000000"], 0x2c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r6, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r7, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) 14:25:56 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x7fffffe, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = io_uring_setup(0x7258, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="084c8ba4eb485ff80900c3ceafa7925f860259eb0d3a70effba1003dfb49c527b6e5a70000000000"], 0x2c}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x6, &(0x7f0000000480)=[{&(0x7f0000000140), 0x0, 0x6}, {&(0x7f0000000300)="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", 0xfc, 0x5}, {&(0x7f0000000180)="fe29162c3ec0f4dcf91fe84f6a3a3e86ce9cf0cfb83903fe60fa32a9e6e25b4701baca4abdeb5e5baa2214deffaf2ebf2acadd504f712374893d194650545a78783e73bd41d33928700e", 0x4a, 0xd23}, {&(0x7f0000000200)="034704daa3a073dc18813ac6ce7e98e9e8d63ee8110718", 0x17, 0x3ff}, {&(0x7f0000000400), 0x0, 0x1}, {&(0x7f0000000440)="8de9bc7cd65136e3f9b152fe6fccd89f6aae0d46fb040c480e32bfeb0d705225", 0x20, 0x7f}], 0x2204040, &(0x7f0000000540)={[{@utf8}, {@sbsector={'sbsector', 0x3d, 0x2}}, {@check_relaxed}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fowner_lt}, {@dont_appraise}, {@fsmagic={'fsmagic', 0x3d, 0x4d}}, {@subj_role={'subj_role', 0x3d, '&,,\''}}, {@subj_user={'subj_user', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@uid_gt={'uid>', 0xee00}}]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB="5f9382a406c09697fc3af902c3e4895ab83d19c9eb49d8a3838bb14b57ebcd66a4ac7408944d0fc1c96406c9cd29581502174e", @ANYRES16=r4, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="0800c300000000000800c40000000000"], 0x2c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r6, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r7, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) 14:25:56 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) [ 132.736887] loop2: detected capacity change from 0 to 13 [ 132.748895] loop4: detected capacity change from 0 to 13 14:25:56 executing program 0: pwritev(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x7fffffe, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = io_uring_setup(0x7258, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="084c8ba4eb485ff80900c3ceafa7925f860259eb0d3a70effba1003dfb49c527b6e5a70000000000"], 0x2c}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x6, &(0x7f0000000480)=[{&(0x7f0000000140), 0x0, 0x6}, {&(0x7f0000000300)="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", 0xfc, 0x5}, {&(0x7f0000000180)="fe29162c3ec0f4dcf91fe84f6a3a3e86ce9cf0cfb83903fe60fa32a9e6e25b4701baca4abdeb5e5baa2214deffaf2ebf2acadd504f712374893d194650545a78783e73bd41d33928700e", 0x4a, 0xd23}, {&(0x7f0000000200)="034704daa3a073dc18813ac6ce7e98e9e8d63ee8110718", 0x17, 0x3ff}, {&(0x7f0000000400), 0x0, 0x1}, {&(0x7f0000000440)="8de9bc7cd65136e3f9b152fe6fccd89f6aae0d46fb040c480e32bfeb0d705225", 0x20, 0x7f}], 0x2204040, &(0x7f0000000540)={[{@utf8}, {@sbsector={'sbsector', 0x3d, 0x2}}, {@check_relaxed}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fowner_lt}, {@dont_appraise}, {@fsmagic={'fsmagic', 0x3d, 0x4d}}, {@subj_role={'subj_role', 0x3d, '&,,\''}}, {@subj_user={'subj_user', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@uid_gt={'uid>', 0xee00}}]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB="5f9382a406c09697fc3af902c3e4895ab83d19c9eb49d8a3838bb14b57ebcd66a4ac7408944d0fc1c96406c9cd29581502174e", @ANYRES16=r4, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="0800c300000000000800c40000000000"], 0x2c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r6, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r7, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) [ 132.778122] loop1: detected capacity change from 0 to 13 14:25:56 executing program 6: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0, 0x1}, 0x0) io_uring_enter(r0, 0x58df, 0x0, 0x0, 0x0, 0x0) 14:25:56 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:25:56 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x7fffffe, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = io_uring_setup(0x7258, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="084c8ba4eb485ff80900c3ceafa7925f860259eb0d3a70effba1003dfb49c527b6e5a70000000000"], 0x2c}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x6, &(0x7f0000000480)=[{&(0x7f0000000140), 0x0, 0x6}, {&(0x7f0000000300)="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", 0xfc, 0x5}, {&(0x7f0000000180)="fe29162c3ec0f4dcf91fe84f6a3a3e86ce9cf0cfb83903fe60fa32a9e6e25b4701baca4abdeb5e5baa2214deffaf2ebf2acadd504f712374893d194650545a78783e73bd41d33928700e", 0x4a, 0xd23}, {&(0x7f0000000200)="034704daa3a073dc18813ac6ce7e98e9e8d63ee8110718", 0x17, 0x3ff}, {&(0x7f0000000400), 0x0, 0x1}, {&(0x7f0000000440)="8de9bc7cd65136e3f9b152fe6fccd89f6aae0d46fb040c480e32bfeb0d705225", 0x20, 0x7f}], 0x2204040, &(0x7f0000000540)={[{@utf8}, {@sbsector={'sbsector', 0x3d, 0x2}}, {@check_relaxed}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fowner_lt}, {@dont_appraise}, {@fsmagic={'fsmagic', 0x3d, 0x4d}}, {@subj_role={'subj_role', 0x3d, '&,,\''}}, {@subj_user={'subj_user', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@uid_gt={'uid>', 0xee00}}]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB="5f9382a406c09697fc3af902c3e4895ab83d19c9eb49d8a3838bb14b57ebcd66a4ac7408944d0fc1c96406c9cd29581502174e", @ANYRES16=r4, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="0800c300000000000800c40000000000"], 0x2c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r6, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r7, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) [ 132.922397] loop0: detected capacity change from 0 to 13 14:25:56 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) [ 132.990898] loop2: detected capacity change from 0 to 13 [ 133.002467] loop7: detected capacity change from 0 to 13 14:25:57 executing program 1: pwritev(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x7fffffe, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = io_uring_setup(0x7258, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="084c8ba4eb485ff80900c3ceafa7925f860259eb0d3a70effba1003dfb49c527b6e5a70000000000"], 0x2c}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x6, &(0x7f0000000480)=[{&(0x7f0000000140), 0x0, 0x6}, {&(0x7f0000000300)="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", 0xfc, 0x5}, {&(0x7f0000000180)="fe29162c3ec0f4dcf91fe84f6a3a3e86ce9cf0cfb83903fe60fa32a9e6e25b4701baca4abdeb5e5baa2214deffaf2ebf2acadd504f712374893d194650545a78783e73bd41d33928700e", 0x4a, 0xd23}, {&(0x7f0000000200)="034704daa3a073dc18813ac6ce7e98e9e8d63ee8110718", 0x17, 0x3ff}, {&(0x7f0000000400), 0x0, 0x1}, {&(0x7f0000000440)="8de9bc7cd65136e3f9b152fe6fccd89f6aae0d46fb040c480e32bfeb0d705225", 0x20, 0x7f}], 0x2204040, &(0x7f0000000540)={[{@utf8}, {@sbsector={'sbsector', 0x3d, 0x2}}, {@check_relaxed}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fowner_lt}, {@dont_appraise}, {@fsmagic={'fsmagic', 0x3d, 0x4d}}, {@subj_role={'subj_role', 0x3d, '&,,\''}}, {@subj_user={'subj_user', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@uid_gt={'uid>', 0xee00}}]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB="5f9382a406c09697fc3af902c3e4895ab83d19c9eb49d8a3838bb14b57ebcd66a4ac7408944d0fc1c96406c9cd29581502174e", @ANYRES16=r4, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="0800c300000000000800c40000000000"], 0x2c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r6, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r7, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) [ 133.119250] loop1: detected capacity change from 0 to 13 14:25:57 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x7fffffe, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = io_uring_setup(0x7258, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="084c8ba4eb485ff80900c3ceafa7925f860259eb0d3a70effba1003dfb49c527b6e5a70000000000"], 0x2c}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x6, &(0x7f0000000480)=[{&(0x7f0000000140), 0x0, 0x6}, {&(0x7f0000000300)="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", 0xfc, 0x5}, {&(0x7f0000000180)="fe29162c3ec0f4dcf91fe84f6a3a3e86ce9cf0cfb83903fe60fa32a9e6e25b4701baca4abdeb5e5baa2214deffaf2ebf2acadd504f712374893d194650545a78783e73bd41d33928700e", 0x4a, 0xd23}, {&(0x7f0000000200)="034704daa3a073dc18813ac6ce7e98e9e8d63ee8110718", 0x17, 0x3ff}, {&(0x7f0000000400), 0x0, 0x1}, {&(0x7f0000000440)="8de9bc7cd65136e3f9b152fe6fccd89f6aae0d46fb040c480e32bfeb0d705225", 0x20, 0x7f}], 0x2204040, &(0x7f0000000540)={[{@utf8}, {@sbsector={'sbsector', 0x3d, 0x2}}, {@check_relaxed}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fowner_lt}, {@dont_appraise}, {@fsmagic={'fsmagic', 0x3d, 0x4d}}, {@subj_role={'subj_role', 0x3d, '&,,\''}}, {@subj_user={'subj_user', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@uid_gt={'uid>', 0xee00}}]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB="5f9382a406c09697fc3af902c3e4895ab83d19c9eb49d8a3838bb14b57ebcd66a4ac7408944d0fc1c96406c9cd29581502174e", @ANYRES16=r4, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="0800c300000000000800c40000000000"], 0x2c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r6, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r7, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) 14:25:57 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) vmsplice(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x33f) r2 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r3 = open_tree(r2, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 14:25:57 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x7fffffe, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = io_uring_setup(0x7258, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="084c8ba4eb485ff80900c3ceafa7925f860259eb0d3a70effba1003dfb49c527b6e5a70000000000"], 0x2c}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x6, &(0x7f0000000480)=[{&(0x7f0000000140), 0x0, 0x6}, {&(0x7f0000000300)="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", 0xfc, 0x5}, {&(0x7f0000000180)="fe29162c3ec0f4dcf91fe84f6a3a3e86ce9cf0cfb83903fe60fa32a9e6e25b4701baca4abdeb5e5baa2214deffaf2ebf2acadd504f712374893d194650545a78783e73bd41d33928700e", 0x4a, 0xd23}, {&(0x7f0000000200)="034704daa3a073dc18813ac6ce7e98e9e8d63ee8110718", 0x17, 0x3ff}, {&(0x7f0000000400), 0x0, 0x1}, {&(0x7f0000000440)="8de9bc7cd65136e3f9b152fe6fccd89f6aae0d46fb040c480e32bfeb0d705225", 0x20, 0x7f}], 0x2204040, &(0x7f0000000540)={[{@utf8}, {@sbsector={'sbsector', 0x3d, 0x2}}, {@check_relaxed}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fowner_lt}, {@dont_appraise}, {@fsmagic={'fsmagic', 0x3d, 0x4d}}, {@subj_role={'subj_role', 0x3d, '&,,\''}}, {@subj_user={'subj_user', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@uid_gt={'uid>', 0xee00}}]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB="5f9382a406c09697fc3af902c3e4895ab83d19c9eb49d8a3838bb14b57ebcd66a4ac7408944d0fc1c96406c9cd29581502174e", @ANYRES16=r4, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="0800c300000000000800c40000000000"], 0x2c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r6, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r7, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) 14:25:57 executing program 7: pwritev(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x7fffffe, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = io_uring_setup(0x7258, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="084c8ba4eb485ff80900c3ceafa7925f860259eb0d3a70effba1003dfb49c527b6e5a70000000000"], 0x2c}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x6, &(0x7f0000000480)=[{&(0x7f0000000140), 0x0, 0x6}, {&(0x7f0000000300)="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", 0xfc, 0x5}, {&(0x7f0000000180)="fe29162c3ec0f4dcf91fe84f6a3a3e86ce9cf0cfb83903fe60fa32a9e6e25b4701baca4abdeb5e5baa2214deffaf2ebf2acadd504f712374893d194650545a78783e73bd41d33928700e", 0x4a, 0xd23}, {&(0x7f0000000200)="034704daa3a073dc18813ac6ce7e98e9e8d63ee8110718", 0x17, 0x3ff}, {&(0x7f0000000400), 0x0, 0x1}, {&(0x7f0000000440)="8de9bc7cd65136e3f9b152fe6fccd89f6aae0d46fb040c480e32bfeb0d705225", 0x20, 0x7f}], 0x2204040, &(0x7f0000000540)={[{@utf8}, {@sbsector={'sbsector', 0x3d, 0x2}}, {@check_relaxed}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fowner_lt}, {@dont_appraise}, {@fsmagic={'fsmagic', 0x3d, 0x4d}}, {@subj_role={'subj_role', 0x3d, '&,,\''}}, {@subj_user={'subj_user', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@uid_gt={'uid>', 0xee00}}]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB="5f9382a406c09697fc3af902c3e4895ab83d19c9eb49d8a3838bb14b57ebcd66a4ac7408944d0fc1c96406c9cd29581502174e", @ANYRES16=r4, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="0800c300000000000800c40000000000"], 0x2c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r6, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r7, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) 14:25:57 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x7fffffe, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = io_uring_setup(0x7258, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="084c8ba4eb485ff80900c3ceafa7925f860259eb0d3a70effba1003dfb49c527b6e5a70000000000"], 0x2c}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x6, &(0x7f0000000480)=[{&(0x7f0000000140), 0x0, 0x6}, {&(0x7f0000000300)="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", 0xfc, 0x5}, {&(0x7f0000000180)="fe29162c3ec0f4dcf91fe84f6a3a3e86ce9cf0cfb83903fe60fa32a9e6e25b4701baca4abdeb5e5baa2214deffaf2ebf2acadd504f712374893d194650545a78783e73bd41d33928700e", 0x4a, 0xd23}, {&(0x7f0000000200)="034704daa3a073dc18813ac6ce7e98e9e8d63ee8110718", 0x17, 0x3ff}, {&(0x7f0000000400), 0x0, 0x1}, {&(0x7f0000000440)="8de9bc7cd65136e3f9b152fe6fccd89f6aae0d46fb040c480e32bfeb0d705225", 0x20, 0x7f}], 0x2204040, &(0x7f0000000540)={[{@utf8}, {@sbsector={'sbsector', 0x3d, 0x2}}, {@check_relaxed}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fowner_lt}, {@dont_appraise}, {@fsmagic={'fsmagic', 0x3d, 0x4d}}, {@subj_role={'subj_role', 0x3d, '&,,\''}}, {@subj_user={'subj_user', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@uid_gt={'uid>', 0xee00}}]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB="5f9382a406c09697fc3af902c3e4895ab83d19c9eb49d8a3838bb14b57ebcd66a4ac7408944d0fc1c96406c9cd29581502174e", @ANYRES16=r4, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="0800c300000000000800c40000000000"], 0x2c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r6, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r7, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) 14:25:57 executing program 1: pwritev(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x7fffffe, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = io_uring_setup(0x7258, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="084c8ba4eb485ff80900c3ceafa7925f860259eb0d3a70effba1003dfb49c527b6e5a70000000000"], 0x2c}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x6, &(0x7f0000000480)=[{&(0x7f0000000140), 0x0, 0x6}, {&(0x7f0000000300)="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", 0xfc, 0x5}, {&(0x7f0000000180)="fe29162c3ec0f4dcf91fe84f6a3a3e86ce9cf0cfb83903fe60fa32a9e6e25b4701baca4abdeb5e5baa2214deffaf2ebf2acadd504f712374893d194650545a78783e73bd41d33928700e", 0x4a, 0xd23}, {&(0x7f0000000200)="034704daa3a073dc18813ac6ce7e98e9e8d63ee8110718", 0x17, 0x3ff}, {&(0x7f0000000400), 0x0, 0x1}, {&(0x7f0000000440)="8de9bc7cd65136e3f9b152fe6fccd89f6aae0d46fb040c480e32bfeb0d705225", 0x20, 0x7f}], 0x2204040, &(0x7f0000000540)={[{@utf8}, {@sbsector={'sbsector', 0x3d, 0x2}}, {@check_relaxed}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fowner_lt}, {@dont_appraise}, {@fsmagic={'fsmagic', 0x3d, 0x4d}}, {@subj_role={'subj_role', 0x3d, '&,,\''}}, {@subj_user={'subj_user', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@uid_gt={'uid>', 0xee00}}]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB="5f9382a406c09697fc3af902c3e4895ab83d19c9eb49d8a3838bb14b57ebcd66a4ac7408944d0fc1c96406c9cd29581502174e", @ANYRES16=r4, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="0800c300000000000800c40000000000"], 0x2c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r6, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r7, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) 14:25:57 executing program 6: pwritev(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x7fffffe, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = io_uring_setup(0x7258, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="084c8ba4eb485ff80900c3ceafa7925f860259eb0d3a70effba1003dfb49c527b6e5a70000000000"], 0x2c}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x6, &(0x7f0000000480)=[{&(0x7f0000000140), 0x0, 0x6}, {&(0x7f0000000300)="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", 0xfc, 0x5}, {&(0x7f0000000180)="fe29162c3ec0f4dcf91fe84f6a3a3e86ce9cf0cfb83903fe60fa32a9e6e25b4701baca4abdeb5e5baa2214deffaf2ebf2acadd504f712374893d194650545a78783e73bd41d33928700e", 0x4a, 0xd23}, {&(0x7f0000000200)="034704daa3a073dc18813ac6ce7e98e9e8d63ee8110718", 0x17, 0x3ff}, {&(0x7f0000000400), 0x0, 0x1}, {&(0x7f0000000440)="8de9bc7cd65136e3f9b152fe6fccd89f6aae0d46fb040c480e32bfeb0d705225", 0x20, 0x7f}], 0x2204040, &(0x7f0000000540)={[{@utf8}, {@sbsector={'sbsector', 0x3d, 0x2}}, {@check_relaxed}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fowner_lt}, {@dont_appraise}, {@fsmagic={'fsmagic', 0x3d, 0x4d}}, {@subj_role={'subj_role', 0x3d, '&,,\''}}, {@subj_user={'subj_user', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@uid_gt={'uid>', 0xee00}}]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB="5f9382a406c09697fc3af902c3e4895ab83d19c9eb49d8a3838bb14b57ebcd66a4ac7408944d0fc1c96406c9cd29581502174e", @ANYRES16=r4, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="0800c300000000000800c40000000000"], 0x2c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r6, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r7, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) 14:25:57 executing program 0: pwritev(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x7fffffe, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = io_uring_setup(0x7258, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="084c8ba4eb485ff80900c3ceafa7925f860259eb0d3a70effba1003dfb49c527b6e5a70000000000"], 0x2c}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x6, &(0x7f0000000480)=[{&(0x7f0000000140), 0x0, 0x6}, {&(0x7f0000000300)="17035cd57f28b4a747a40e82283df5aaceaa6d7250b426656bb948459e344ce42b10df7314a4c38930322341ec279adb65f2abf711f51f7717c88be0d86ea28a9c1de97916de13ac053ae8a665ede9230b345903dd1d3aadca9d0cccfd466488b31f44cc35b6e1c440f320fbe7d9c64adac017c08ccc8c7658f491516ae379d023057bbbbceb0823722c7fb55d4b5845c1a92d45021866e5f18e1876bf54b9774aef8f4bec5d7db4151279f3c229366c78c0cb7b165da2f4295d04ca58d8d0695537bffaa9425aa217a252771463f8c8d103ac5837f3bada25d094fb7d9bd8c0a4a0d68262369c34aeb946180bdad473111fc95b1ba51b0c402b3239", 0xfc, 0x5}, {&(0x7f0000000180)="fe29162c3ec0f4dcf91fe84f6a3a3e86ce9cf0cfb83903fe60fa32a9e6e25b4701baca4abdeb5e5baa2214deffaf2ebf2acadd504f712374893d194650545a78783e73bd41d33928700e", 0x4a, 0xd23}, {&(0x7f0000000200)="034704daa3a073dc18813ac6ce7e98e9e8d63ee8110718", 0x17, 0x3ff}, {&(0x7f0000000400), 0x0, 0x1}, {&(0x7f0000000440)="8de9bc7cd65136e3f9b152fe6fccd89f6aae0d46fb040c480e32bfeb0d705225", 0x20, 0x7f}], 0x2204040, &(0x7f0000000540)={[{@utf8}, {@sbsector={'sbsector', 0x3d, 0x2}}, {@check_relaxed}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fowner_lt}, {@dont_appraise}, {@fsmagic={'fsmagic', 0x3d, 0x4d}}, {@subj_role={'subj_role', 0x3d, '&,,\''}}, {@subj_user={'subj_user', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@uid_gt={'uid>', 0xee00}}]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB="5f9382a406c09697fc3af902c3e4895ab83d19c9eb49d8a3838bb14b57ebcd66a4ac7408944d0fc1c96406c9cd29581502174e", @ANYRES16=r4, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="0800c300000000000800c40000000000"], 0x2c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r6, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r7, 0x87d27e71721737b5, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x8}]}, 0x2c}}, 0x0) [ 133.263288] loop2: detected capacity change from 0 to 13 [ 133.265936] loop5: detected capacity change from 0 to 13 [ 133.272158] loop7: detected capacity change from 0 to 13 [ 133.290228] loop6: detected capacity change from 0 to 13 [ 133.292150] loop4: detected capacity change from 0 to 13 [ 133.312177] loop0: detected capacity change from 0 to 13 [ 133.317286] loop1: detected capacity change from 0 to 13 14:25:57 executing program 6: pwritev(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x7fffffe, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = io_uring_setup(0x7258, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="b53700000000000000006700000008000300", @ANYRES32=0x0, @ANYBLOB="084c8ba4eb485ff80900c3ceafa7925f860259eb0d3a70effba1003dfb49c527b6e5a700 VM DIAGNOSIS: 14:25:54 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=0000000000000000 RCX=1ffffffff0a2bb14 RDX=0000000000000000 RSI=0000000000000008 RDI=ffffffff854073a0 RBP=1ffff11008183f51 RSP=ffff888040c1fa78 R8 =0000000000000000 R9 =ffffea000011f4c7 R10=fffff94000023e98 R11=0000000000000001 R12=ffffffff854073a0 R13=ffff888009139270 R14=0000000000000000 R15=ffffea000011f4c0 RIP=ffffffff812a2bb7 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 00000000 00000000 DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ff3d63d2820 CR3=0000000017444000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00362e6f732e6362 696c2f756e672d78 YMM02=0000000000000000 0000000000000000 ffff0000000000ff ffffffffffffffff YMM03=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM04=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000030 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b1c91 RDI=ffffffff87645ba0 RBP=ffffffff87645b60 RSP=ffff88804111f698 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000030 R11=0000000000000001 R12=0000000000000030 R13=ffffffff87645b60 R14=0000000000000010 R15=ffffffff822b1c80 RIP=ffffffff822b1ce9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f185124c700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007feacfbee000 CR3=00000000400e0000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f1853dbd7c0 00007f1853dbd7c8 YMM02=0000000000000000 0000000000000000 00007f1853dbd7e0 00007f1853dbd7c0 YMM03=0000000000000000 0000000000000000 00007f1853dbd7c8 00007f1853dbd7c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000