Warning: Permanently added '[localhost]:64105' (ECDSA) to the list of known hosts.
2022/09/28 03:35:03 fuzzer started
2022/09/28 03:35:03 dialing manager at localhost:35827
syzkaller login: [ 36.895699] cgroup: Unknown subsys name 'net'
[ 36.995550] cgroup: Unknown subsys name 'rlimit'
2022/09/28 03:35:17 syscalls: 2215
2022/09/28 03:35:17 code coverage: enabled
2022/09/28 03:35:17 comparison tracing: enabled
2022/09/28 03:35:17 extra coverage: enabled
2022/09/28 03:35:17 setuid sandbox: enabled
2022/09/28 03:35:17 namespace sandbox: enabled
2022/09/28 03:35:17 Android sandbox: enabled
2022/09/28 03:35:17 fault injection: enabled
2022/09/28 03:35:17 leak checking: enabled
2022/09/28 03:35:17 net packet injection: enabled
2022/09/28 03:35:17 net device setup: enabled
2022/09/28 03:35:17 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist
2022/09/28 03:35:17 devlink PCI setup: PCI device 0000:00:10.0 is not available
2022/09/28 03:35:17 USB emulation: enabled
2022/09/28 03:35:17 hci packet injection: enabled
2022/09/28 03:35:17 wifi device emulation: failed to parse kernel version (6.0.0-rc7-next-20220927 )
2022/09/28 03:35:17 802.15.4 emulation: enabled
2022/09/28 03:35:17 fetching corpus: 0, signal 0/2000 (executing program)
2022/09/28 03:35:17 fetching corpus: 40, signal 23052/26594 (executing program)
2022/09/28 03:35:17 fetching corpus: 90, signal 34528/39479 (executing program)
2022/09/28 03:35:18 fetching corpus: 139, signal 41514/47823 (executing program)
2022/09/28 03:35:18 fetching corpus: 189, signal 47836/55454 (executing program)
2022/09/28 03:35:18 fetching corpus: 239, signal 52752/61597 (executing program)
2022/09/28 03:35:18 fetching corpus: 289, signal 56557/66569 (executing program)
2022/09/28 03:35:18 fetching corpus: 339, signal 63182/74080 (executing program)
2022/09/28 03:35:18 fetching corpus: 388, signal 68336/80115 (executing program)
2022/09/28 03:35:18 fetching corpus: 437, signal 71768/84487 (executing program)
2022/09/28 03:35:18 fetching corpus: 487, signal 75584/89135 (executing program)
2022/09/28 03:35:19 fetching corpus: 537, signal 79686/93958 (executing program)
2022/09/28 03:35:19 fetching corpus: 587, signal 81940/97080 (executing program)
2022/09/28 03:35:19 fetching corpus: 637, signal 87108/102678 (executing program)
2022/09/28 03:35:19 fetching corpus: 687, signal 89641/105955 (executing program)
2022/09/28 03:35:19 fetching corpus: 737, signal 93259/110026 (executing program)
2022/09/28 03:35:19 fetching corpus: 786, signal 94945/112403 (executing program)
2022/09/28 03:35:19 fetching corpus: 836, signal 97001/115101 (executing program)
2022/09/28 03:35:19 fetching corpus: 886, signal 99010/117750 (executing program)
2022/09/28 03:35:20 fetching corpus: 936, signal 101206/120458 (executing program)
2022/09/28 03:35:20 fetching corpus: 986, signal 103568/123244 (executing program)
2022/09/28 03:35:20 fetching corpus: 1036, signal 105914/125962 (executing program)
2022/09/28 03:35:20 fetching corpus: 1086, signal 107572/128175 (executing program)
2022/09/28 03:35:20 fetching corpus: 1136, signal 109287/130348 (executing program)
2022/09/28 03:35:20 fetching corpus: 1182, signal 111830/133123 (executing program)
2022/09/28 03:35:20 fetching corpus: 1228, signal 114045/135519 (executing program)
2022/09/28 03:35:20 fetching corpus: 1278, signal 115503/137432 (executing program)
2022/09/28 03:35:21 fetching corpus: 1328, signal 116912/139269 (executing program)
2022/09/28 03:35:21 fetching corpus: 1376, signal 118963/141482 (executing program)
2022/09/28 03:35:21 fetching corpus: 1426, signal 120848/143582 (executing program)
2022/09/28 03:35:21 fetching corpus: 1475, signal 125307/147379 (executing program)
2022/09/28 03:35:21 fetching corpus: 1525, signal 126794/149073 (executing program)
2022/09/28 03:35:21 fetching corpus: 1575, signal 128451/150921 (executing program)
2022/09/28 03:35:21 fetching corpus: 1625, signal 129502/152305 (executing program)
2022/09/28 03:35:21 fetching corpus: 1675, signal 131396/154169 (executing program)
2022/09/28 03:35:22 fetching corpus: 1723, signal 132872/155782 (executing program)
2022/09/28 03:35:22 fetching corpus: 1772, signal 133859/157027 (executing program)
2022/09/28 03:35:22 fetching corpus: 1821, signal 135142/158463 (executing program)
2022/09/28 03:35:22 fetching corpus: 1871, signal 136179/159711 (executing program)
2022/09/28 03:35:22 fetching corpus: 1920, signal 137190/160879 (executing program)
2022/09/28 03:35:22 fetching corpus: 1970, signal 138479/162230 (executing program)
2022/09/28 03:35:22 fetching corpus: 2020, signal 139614/163476 (executing program)
2022/09/28 03:35:22 fetching corpus: 2070, signal 140532/164493 (executing program)
2022/09/28 03:35:22 fetching corpus: 2119, signal 141448/165595 (executing program)
2022/09/28 03:35:23 fetching corpus: 2169, signal 142424/166708 (executing program)
2022/09/28 03:35:23 fetching corpus: 2218, signal 143163/167644 (executing program)
2022/09/28 03:35:23 fetching corpus: 2267, signal 144129/168652 (executing program)
2022/09/28 03:35:23 fetching corpus: 2317, signal 144949/169607 (executing program)
2022/09/28 03:35:23 fetching corpus: 2367, signal 145843/170530 (executing program)
2022/09/28 03:35:23 fetching corpus: 2417, signal 147111/171630 (executing program)
2022/09/28 03:35:23 fetching corpus: 2467, signal 147887/172463 (executing program)
2022/09/28 03:35:23 fetching corpus: 2517, signal 148804/173385 (executing program)
2022/09/28 03:35:24 fetching corpus: 2567, signal 149868/174342 (executing program)
2022/09/28 03:35:24 fetching corpus: 2617, signal 150846/175251 (executing program)
2022/09/28 03:35:24 fetching corpus: 2667, signal 151619/176030 (executing program)
2022/09/28 03:35:24 fetching corpus: 2717, signal 152351/176811 (executing program)
2022/09/28 03:35:24 fetching corpus: 2767, signal 152923/177496 (executing program)
2022/09/28 03:35:24 fetching corpus: 2816, signal 154472/178517 (executing program)
2022/09/28 03:35:24 fetching corpus: 2866, signal 155886/179468 (executing program)
2022/09/28 03:35:24 fetching corpus: 2916, signal 156692/180148 (executing program)
2022/09/28 03:35:24 fetching corpus: 2966, signal 157269/180797 (executing program)
2022/09/28 03:35:25 fetching corpus: 3015, signal 157940/181420 (executing program)
2022/09/28 03:35:25 fetching corpus: 3063, signal 158878/182197 (executing program)
2022/09/28 03:35:25 fetching corpus: 3113, signal 159801/182864 (executing program)
2022/09/28 03:35:25 fetching corpus: 3163, signal 160321/183403 (executing program)
2022/09/28 03:35:25 fetching corpus: 3211, signal 162992/184607 (executing program)
2022/09/28 03:35:25 fetching corpus: 3260, signal 163905/185180 (executing program)
2022/09/28 03:35:25 fetching corpus: 3310, signal 164670/185761 (executing program)
2022/09/28 03:35:25 fetching corpus: 3359, signal 165806/186406 (executing program)
2022/09/28 03:35:26 fetching corpus: 3409, signal 166681/186936 (executing program)
2022/09/28 03:35:26 fetching corpus: 3458, signal 168637/187709 (executing program)
2022/09/28 03:35:26 fetching corpus: 3507, signal 170519/188486 (executing program)
2022/09/28 03:35:26 fetching corpus: 3557, signal 171007/188913 (executing program)
2022/09/28 03:35:26 fetching corpus: 3607, signal 172016/189388 (executing program)
2022/09/28 03:35:26 fetching corpus: 3656, signal 172452/189705 (executing program)
2022/09/28 03:35:26 fetching corpus: 3705, signal 173187/190128 (executing program)
2022/09/28 03:35:26 fetching corpus: 3755, signal 173913/190495 (executing program)
2022/09/28 03:35:26 fetching corpus: 3805, signal 174471/190838 (executing program)
2022/09/28 03:35:27 fetching corpus: 3854, signal 175033/191165 (executing program)
2022/09/28 03:35:27 fetching corpus: 3904, signal 175942/191618 (executing program)
2022/09/28 03:35:27 fetching corpus: 3952, signal 176476/191897 (executing program)
2022/09/28 03:35:27 fetching corpus: 4002, signal 177648/192265 (executing program)
2022/09/28 03:35:27 fetching corpus: 4052, signal 178434/192507 (executing program)
2022/09/28 03:35:27 fetching corpus: 4102, signal 178970/192757 (executing program)
2022/09/28 03:35:27 fetching corpus: 4152, signal 179431/192961 (executing program)
2022/09/28 03:35:27 fetching corpus: 4201, signal 180461/193235 (executing program)
2022/09/28 03:35:27 fetching corpus: 4251, signal 181430/193450 (executing program)
2022/09/28 03:35:28 fetching corpus: 4301, signal 182060/193647 (executing program)
2022/09/28 03:35:28 fetching corpus: 4351, signal 182891/193901 (executing program)
2022/09/28 03:35:28 fetching corpus: 4399, signal 183850/194086 (executing program)
2022/09/28 03:35:28 fetching corpus: 4449, signal 184492/194249 (executing program)
2022/09/28 03:35:28 fetching corpus: 4498, signal 185059/194406 (executing program)
2022/09/28 03:35:28 fetching corpus: 4548, signal 186326/194572 (executing program)
2022/09/28 03:35:28 fetching corpus: 4598, signal 186980/194679 (executing program)
2022/09/28 03:35:28 fetching corpus: 4648, signal 187309/194750 (executing program)
2022/09/28 03:35:28 fetching corpus: 4698, signal 188138/195012 (executing program)
2022/09/28 03:35:29 fetching corpus: 4748, signal 188781/195012 (executing program)
2022/09/28 03:35:29 fetching corpus: 4753, signal 188817/195012 (executing program)
2022/09/28 03:35:29 fetching corpus: 4753, signal 188817/195012 (executing program)
2022/09/28 03:35:31 starting 8 fuzzer processes
03:35:31 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$SIOCGSTAMP(r0, 0x8906, 0x0)
03:35:31 executing program 1:
syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp6\x00')
03:35:31 executing program 2:
r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0)
03:35:31 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000340)={0x24, 0x68, 0x1, 0x0, 0x0, "", [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, 0x24}], 0x1}, 0x0)
[ 65.063822] audit: type=1400 audit(1664336131.694:6): avc: denied { execmem } for pid=283 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1
03:35:31 executing program 3:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
readv(r0, &(0x7f0000000180)=[{&(0x7f0000000200)=""/179, 0xb3}], 0x1)
03:35:31 executing program 6:
mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0)
pkey_mprotect(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff)
mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3)
03:35:31 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0000001a0001000000000000000000026b02bb7feb773f70d5"], 0x1c}], 0x1}, 0x0)
03:35:31 executing program 7:
msgctl$IPC_RMID(0x0, 0xffffff7f)
[ 66.392653] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1
[ 66.394287] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[ 66.395865] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9
[ 66.397242] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9
[ 66.399222] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 66.400964] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4
[ 66.403218] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3
[ 66.404674] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2
[ 66.410290] Bluetooth: hci1: HCI_REQ-0x0c1a
[ 66.421285] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 66.472790] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1
[ 66.475255] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1
[ 66.477073] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1
[ 66.479066] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1
[ 66.481084] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9
[ 66.482890] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 66.483987] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9
[ 66.486071] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9
[ 66.487330] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9
[ 66.488567] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9
[ 66.489860] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3
[ 66.491855] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9
[ 66.493057] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9
[ 66.494396] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[ 66.497445] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4
[ 66.499166] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9
[ 66.501090] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4
[ 66.503472] Bluetooth: hci0: HCI_REQ-0x0c1a
[ 66.507063] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1
[ 66.515821] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4
[ 66.517149] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3
[ 66.518668] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4
[ 66.520430] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3
[ 66.521844] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2
[ 66.527489] Bluetooth: hci2: HCI_REQ-0x0c1a
[ 66.528897] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3
[ 66.530922] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2
[ 66.547600] Bluetooth: hci6: HCI_REQ-0x0c1a
[ 66.563678] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2
[ 66.565083] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3
[ 66.567140] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2
[ 66.571429] Bluetooth: hci3: HCI_REQ-0x0c1a
[ 66.585812] Bluetooth: hci5: HCI_REQ-0x0c1a
[ 66.607768] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9
[ 66.675657] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1
[ 66.678098] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9
[ 66.679540] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9
[ 66.682467] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9
[ 66.684671] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4
[ 66.687516] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4
[ 66.689816] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3
[ 66.691108] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3
[ 66.692674] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2
[ 66.693921] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2
[ 66.709446] Bluetooth: hci4: HCI_REQ-0x0c1a
[ 66.722530] Bluetooth: hci7: HCI_REQ-0x0c1a
[ 68.471885] Bluetooth: hci1: command 0x0409 tx timeout
[ 68.534920] Bluetooth: hci2: command 0x0409 tx timeout
[ 68.534944] Bluetooth: hci0: command 0x0409 tx timeout
[ 68.598470] Bluetooth: hci3: command 0x0409 tx timeout
[ 68.598582] Bluetooth: hci6: command 0x0409 tx timeout
[ 68.662427] Bluetooth: hci5: command 0x0409 tx timeout
[ 68.726563] Bluetooth: hci7: command 0x0409 tx timeout
[ 68.727212] Bluetooth: hci4: command 0x0409 tx timeout
[ 70.518417] Bluetooth: hci1: command 0x041b tx timeout
[ 70.582463] Bluetooth: hci0: command 0x041b tx timeout
[ 70.582968] Bluetooth: hci2: command 0x041b tx timeout
[ 70.646485] Bluetooth: hci6: command 0x041b tx timeout
[ 70.646939] Bluetooth: hci3: command 0x041b tx timeout
[ 70.710391] Bluetooth: hci5: command 0x041b tx timeout
[ 70.774418] Bluetooth: hci4: command 0x041b tx timeout
[ 70.774878] Bluetooth: hci7: command 0x041b tx timeout
[ 72.566410] Bluetooth: hci1: command 0x040f tx timeout
[ 72.630411] Bluetooth: hci2: command 0x040f tx timeout
[ 72.631092] Bluetooth: hci0: command 0x040f tx timeout
[ 72.694405] Bluetooth: hci3: command 0x040f tx timeout
[ 72.694955] Bluetooth: hci6: command 0x040f tx timeout
[ 72.758397] Bluetooth: hci5: command 0x040f tx timeout
[ 72.822485] Bluetooth: hci7: command 0x040f tx timeout
[ 72.822973] Bluetooth: hci4: command 0x040f tx timeout
[ 74.614430] Bluetooth: hci1: command 0x0419 tx timeout
[ 74.679443] Bluetooth: hci0: command 0x0419 tx timeout
[ 74.679901] Bluetooth: hci2: command 0x0419 tx timeout
[ 74.743452] Bluetooth: hci6: command 0x0419 tx timeout
[ 74.743911] Bluetooth: hci3: command 0x0419 tx timeout
[ 74.807498] Bluetooth: hci5: command 0x0419 tx timeout
[ 74.871450] Bluetooth: hci4: command 0x0419 tx timeout
[ 74.871922] Bluetooth: hci7: command 0x0419 tx timeout
03:36:30 executing program 7:
add_key$fscrypt_v1(&(0x7f0000001680), &(0x7f00000016c0)={'fscrypt:', @desc2}, &(0x7f0000001700)={0x0, "d947b1e589d5ee92a07e4604f32b5f571baa3a5234478e1141363f159df0796cda14d02f1cb1ac339005bb5b64797ad190c2cd628381716370e15e4dda3489cd"}, 0x48, 0xffffffffffffffff)
[ 123.915659] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'.
03:36:30 executing program 4:
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
03:36:30 executing program 7:
setgroups(0x2, &(0x7f00000033c0)=[0x0, 0x0])
getgroups(0x2, &(0x7f0000003400)=[0x0, 0x0])
03:36:30 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000880), 0x4)
setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000940)=@gcm_256={{}, "3a2be956854d7bac", "b590f74b039fa5cadbca4758ab783d474789bcd3973e7114a0ffb84115131ca8", "23141980", "978b155f2857146f"}, 0x38)
03:36:30 executing program 4:
syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff)
socketpair(0x10, 0x2, 0x6, &(0x7f0000000e00))
03:36:30 executing program 7:
epoll_create(0x102f)
syz_read_part_table(0x0, 0x0, 0x0)
03:36:31 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000880), 0x4)
setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000940)=@gcm_256={{}, "3a2be956854d7bac", "b590f74b039fa5cadbca4758ab783d474789bcd3973e7114a0ffb84115131ca8", "23141980", "978b155f2857146f"}, 0x38)
03:36:31 executing program 7:
epoll_create(0x102f)
syz_read_part_table(0x0, 0x0, 0x0)
[ 125.487915] syz-executor.6 (300) used greatest stack depth: 24656 bytes left
[ 127.810731] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1
[ 127.812466] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9
[ 127.814036] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9
[ 127.818124] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4
[ 127.821272] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3
[ 127.823961] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2
[ 127.831220] Bluetooth: hci1: HCI_REQ-0x0c1a
[ 127.888992] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1
[ 127.892631] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9
[ 127.894159] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9
[ 127.899307] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4
[ 127.901379] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3
[ 127.902901] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2
[ 127.908321] Bluetooth: hci3: HCI_REQ-0x0c1a
[ 129.782552] Bluetooth: hci0: Opcode 0x c03 failed: -110
[ 129.846443] Bluetooth: hci1: command 0x0409 tx timeout
[ 129.911399] Bluetooth: hci2: Opcode 0x c03 failed: -110
[ 129.974474] Bluetooth: hci3: command 0x0409 tx timeout
[ 131.894427] Bluetooth: hci1: command 0x041b tx timeout
[ 132.023891] Bluetooth: hci3: command 0x041b tx timeout
[ 132.239162] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[ 132.241332] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 132.244712] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 132.254840] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 132.263986] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3
[ 132.265718] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[ 132.270930] Bluetooth: hci0: HCI_REQ-0x0c1a
[ 132.320593] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1
[ 132.322705] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9
[ 132.324124] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9
[ 132.334892] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4
[ 132.336142] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3
[ 132.337803] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2
[ 132.353442] Bluetooth: hci2: HCI_REQ-0x0c1a
[ 133.943392] Bluetooth: hci1: command 0x040f tx timeout
[ 134.071449] Bluetooth: hci3: command 0x040f tx timeout
[ 134.326653] Bluetooth: hci0: command 0x0409 tx timeout
[ 134.390457] Bluetooth: hci2: command 0x0409 tx timeout
[ 135.990440] Bluetooth: hci1: command 0x0419 tx timeout
[ 136.118569] Bluetooth: hci3: command 0x0419 tx timeout
[ 136.374413] Bluetooth: hci0: command 0x041b tx timeout
[ 136.438394] Bluetooth: hci2: command 0x041b tx timeout
[ 138.422562] Bluetooth: hci0: command 0x040f tx timeout
[ 138.486433] Bluetooth: hci2: command 0x040f tx timeout
[ 140.470398] Bluetooth: hci0: command 0x0419 tx timeout
[ 140.534389] Bluetooth: hci2: command 0x0419 tx timeout
[ 157.430466] audit: type=1400 audit(1664336224.060:7): avc: denied { open } for pid=5743 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1
[ 157.432004] audit: type=1400 audit(1664336224.060:8): avc: denied { kernel } for pid=5743 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1
[ 157.448175] audit: type=1400 audit(1664336224.078:9): avc: denied { read } for pid=5743 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1
03:37:04 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000880), 0x4)
setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000940)=@gcm_256={{}, "3a2be956854d7bac", "b590f74b039fa5cadbca4758ab783d474789bcd3973e7114a0ffb84115131ca8", "23141980", "978b155f2857146f"}, 0x38)
03:37:04 executing program 0:
r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x8002, 0x0)
write$cgroup_pid(r0, 0x0, 0xff07)
03:37:04 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0000001a0001000000000000000000026b02bb7feb773f70d5"], 0x1c}], 0x1}, 0x0)
03:37:04 executing program 1:
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$batadv(&(0x7f0000000540), 0xffffffffffffffff)
03:37:04 executing program 6:
mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0)
pkey_mprotect(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff)
mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3)
03:37:04 executing program 3:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
readv(r0, &(0x7f0000000180)=[{&(0x7f0000000200)=""/179, 0xb3}], 0x1)
03:37:04 executing program 7:
epoll_create(0x102f)
syz_read_part_table(0x0, 0x0, 0x0)
03:37:04 executing program 4:
syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff)
socketpair(0x10, 0x2, 0x6, &(0x7f0000000e00))
[ 157.837988] ------------[ cut here ]------------
[ 157.838015]
[ 157.838018] ======================================================
[ 157.838022] WARNING: possible circular locking dependency detected
[ 157.838025] 6.0.0-rc7-next-20220927 #1 Not tainted
[ 157.838032] ------------------------------------------------------
[ 157.838035] syz-executor.3/5765 is trying to acquire lock:
[ 157.838041] ffffffff853faab8 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70
[ 157.838082]
[ 157.838082] but task is already holding lock:
[ 157.838085] ffff88800f20d820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0
[ 157.838113]
[ 157.838113] which lock already depends on the new lock.
[ 157.838113]
[ 157.838117]
[ 157.838117] the existing dependency chain (in reverse order) is:
[ 157.838120]
[ 157.838120] -> #3 (&ctx->lock){....}-{2:2}:
[ 157.838134] _raw_spin_lock+0x2a/0x40
[ 157.838146] __perf_event_task_sched_out+0x53b/0x18d0
[ 157.838159] __schedule+0xedd/0x2470
[ 157.838175] schedule+0xda/0x1b0
[ 157.838190] futex_wait_queue+0xf5/0x1e0
[ 157.838203] futex_wait+0x28e/0x690
[ 157.838213] do_futex+0x2ff/0x380
[ 157.838222] __x64_sys_futex+0x1c6/0x4d0
[ 157.838232] do_syscall_64+0x3b/0x90
[ 157.838242] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 157.838257]
[ 157.838257] -> #2 (&rq->__lock){-.-.}-{2:2}:
[ 157.838271] _raw_spin_lock_nested+0x30/0x40
[ 157.838286] raw_spin_rq_lock_nested+0x1e/0x30
[ 157.838299] task_fork_fair+0x63/0x4d0
[ 157.838316] sched_cgroup_fork+0x3d0/0x540
[ 157.838330] copy_process+0x4183/0x6e20
[ 157.838341] kernel_clone+0xe7/0x890
[ 157.838350] user_mode_thread+0xad/0xf0
[ 157.838363] rest_init+0x24/0x250
[ 157.838376] arch_call_rest_init+0xf/0x14
[ 157.838391] start_kernel+0x4c6/0x4eb
[ 157.838403] secondary_startup_64_no_verify+0xe0/0xeb
[ 157.838417]
[ 157.838417] -> #1 (&p->pi_lock){-.-.}-{2:2}:
[ 157.838430] _raw_spin_lock_irqsave+0x39/0x60
[ 157.838443] try_to_wake_up+0xab/0x1930
[ 157.838456] up+0x75/0xb0
[ 157.838471] __up_console_sem+0x6e/0x80
[ 157.838487] console_unlock+0x46a/0x590
[ 157.838503] do_con_write+0xc05/0x1d50
[ 157.838516] con_write+0x21/0x40
[ 157.838526] n_tty_write+0x4d4/0xfe0
[ 157.838541] file_tty_write.constprop.0+0x455/0x8a0
[ 157.838555] vfs_write+0x9c3/0xd90
[ 157.838574] ksys_write+0x127/0x250
[ 157.838583] do_syscall_64+0x3b/0x90
[ 157.838593] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 157.838607]
[ 157.838607] -> #0 ((console_sem).lock){....}-{2:2}:
[ 157.838620] __lock_acquire+0x2a02/0x5e70
[ 157.838638] lock_acquire+0x1a2/0x530
[ 157.838653] _raw_spin_lock_irqsave+0x39/0x60
[ 157.838665] down_trylock+0xe/0x70
[ 157.838681] __down_trylock_console_sem+0x3b/0xd0
[ 157.838697] vprintk_emit+0x16b/0x560
[ 157.838713] vprintk+0x84/0xa0
[ 157.838729] _printk+0xba/0xf1
[ 157.838742] report_bug.cold+0x72/0xab
[ 157.838752] handle_bug+0x3c/0x70
[ 157.838762] exc_invalid_op+0x14/0x50
[ 157.838772] asm_exc_invalid_op+0x16/0x20
[ 157.838786] group_sched_out.part.0+0x2c7/0x460
[ 157.838797] ctx_sched_out+0x8f1/0xc10
[ 157.838807] __perf_event_task_sched_out+0x6d0/0x18d0
[ 157.838819] __schedule+0xedd/0x2470
[ 157.838834] schedule+0xda/0x1b0
[ 157.838849] exit_to_user_mode_prepare+0x114/0x1a0
[ 157.838861] syscall_exit_to_user_mode+0x19/0x40
[ 157.838875] do_syscall_64+0x48/0x90
[ 157.838885] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 157.838899]
[ 157.838899] other info that might help us debug this:
[ 157.838899]
[ 157.838902] Chain exists of:
[ 157.838902] (console_sem).lock --> &rq->__lock --> &ctx->lock
[ 157.838902]
[ 157.838917] Possible unsafe locking scenario:
[ 157.838917]
[ 157.838919] CPU0 CPU1
[ 157.838921] ---- ----
[ 157.838924] lock(&ctx->lock);
[ 157.838929] lock(&rq->__lock);
[ 157.838935] lock(&ctx->lock);
[ 157.838941] lock((console_sem).lock);
[ 157.838947]
[ 157.838947] *** DEADLOCK ***
[ 157.838947]
[ 157.838949] 2 locks held by syz-executor.3/5765:
[ 157.838956] #0: ffff88806ce37d18 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470
[ 157.838986] #1: ffff88800f20d820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0
[ 157.839014]
[ 157.839014] stack backtrace:
[ 157.839017] CPU: 0 PID: 5765 Comm: syz-executor.3 Not tainted 6.0.0-rc7-next-20220927 #1
[ 157.839030] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 157.839038] Call Trace:
[ 157.839041]
[ 157.839045] dump_stack_lvl+0x8b/0xb3
[ 157.839057] check_noncircular+0x263/0x2e0
[ 157.839073] ? format_decode+0x26c/0xb50
[ 157.839092] ? print_circular_bug+0x450/0x450
[ 157.839109] ? enable_ptr_key_workfn+0x20/0x20
[ 157.839145] ? format_decode+0x26c/0xb50
[ 157.839164] ? alloc_chain_hlocks+0x1ec/0x5a0
[ 157.839182] __lock_acquire+0x2a02/0x5e70
[ 157.839203] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 157.839226] lock_acquire+0x1a2/0x530
[ 157.839242] ? down_trylock+0xe/0x70
[ 157.839261] ? lock_release+0x750/0x750
[ 157.839279] ? __lock_acquire+0x164d/0x5e70
[ 157.839297] ? vprintk+0x84/0xa0
[ 157.839315] _raw_spin_lock_irqsave+0x39/0x60
[ 157.839328] ? down_trylock+0xe/0x70
[ 157.839345] down_trylock+0xe/0x70
[ 157.839363] ? vprintk+0x84/0xa0
[ 157.839379] __down_trylock_console_sem+0x3b/0xd0
[ 157.839397] vprintk_emit+0x16b/0x560
[ 157.839415] vprintk+0x84/0xa0
[ 157.839433] _printk+0xba/0xf1
[ 157.839446] ? record_print_text.cold+0x16/0x16
[ 157.839463] ? report_bug.cold+0x66/0xab
[ 157.839475] ? group_sched_out.part.0+0x2c7/0x460
[ 157.839486] report_bug.cold+0x72/0xab
[ 157.839499] handle_bug+0x3c/0x70
[ 157.839510] exc_invalid_op+0x14/0x50
[ 157.839522] asm_exc_invalid_op+0x16/0x20
[ 157.839536] RIP: 0010:group_sched_out.part.0+0x2c7/0x460
[ 157.839550] Code: 5e 41 5f e9 ab a9 ef ff e8 a6 a9 ef ff 65 8b 1d 1b 0f ac 7e 31 ff 89 de e8 46 a6 ef ff 85 db 0f 84 8a 00 00 00 e8 89 a9 ef ff <0f> 0b e9 a5 fe ff ff e8 7d a9 ef ff 48 8d 7d 10 48 b8 00 00 00 00
[ 157.839561] RSP: 0018:ffff888031e77c48 EFLAGS: 00010006
[ 157.839570] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000
[ 157.839578] RDX: ffff88801f3dd040 RSI: ffffffff815666b7 RDI: 0000000000000005
[ 157.839586] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001
[ 157.839593] R10: 0000000000000000 R11: ffffffff865b401b R12: ffff88800f20d800
[ 157.839601] R13: ffff88806ce3d140 R14: ffffffff8547cf80 R15: 0000000000000002
[ 157.839612] ? group_sched_out.part.0+0x2c7/0x460
[ 157.839625] ? group_sched_out.part.0+0x2c7/0x460
[ 157.839639] ctx_sched_out+0x8f1/0xc10
[ 157.839652] __perf_event_task_sched_out+0x6d0/0x18d0
[ 157.839668] ? lock_is_held_type+0xd7/0x130
[ 157.839683] ? __perf_cgroup_move+0x160/0x160
[ 157.839696] ? set_next_entity+0x304/0x550
[ 157.839713] ? update_curr+0x267/0x740
[ 157.839731] ? lock_is_held_type+0xd7/0x130
[ 157.839747] __schedule+0xedd/0x2470
[ 157.839766] ? io_schedule_timeout+0x150/0x150
[ 157.839784] ? rcu_read_lock_sched_held+0x3e/0x80
[ 157.839805] schedule+0xda/0x1b0
[ 157.839821] exit_to_user_mode_prepare+0x114/0x1a0
[ 157.839834] syscall_exit_to_user_mode+0x19/0x40
[ 157.839849] do_syscall_64+0x48/0x90
[ 157.839860] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 157.839875] RIP: 0033:0x7f0599856b19
[ 157.839883] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 157.839894] RSP: 002b:00007f0596dcc218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
[ 157.839905] RAX: 0000000000000001 RBX: 00007f0599969f68 RCX: 00007f0599856b19
[ 157.839912] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f0599969f6c
[ 157.839920] RBP: 00007f0599969f60 R08: 000000000000000e R09: 0000000000000000
[ 157.839927] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f0599969f6c
[ 157.839934] R13: 00007fff01861ebf R14: 00007f0596dcc300 R15: 0000000000022000
[ 157.839947]
[ 157.896389] WARNING: CPU: 0 PID: 5765 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460
[ 157.896414] Modules linked in:
[ 157.896420] CPU: 0 PID: 5765 Comm: syz-executor.3 Not tainted 6.0.0-rc7-next-20220927 #1
[ 157.896433] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 157.896441] RIP: 0010:group_sched_out.part.0+0x2c7/0x460
03:37:04 executing program 6:
mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0)
pkey_mprotect(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff)
mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3)
[ 157.896456] Code: 5e 41 5f e9 ab a9 ef ff e8 a6 a9 ef ff 65 8b 1d 1b 0f ac 7e 31 ff 89 de e8 46 a6 ef ff 85 db 0f 84 8a 00 00 00 e8 89 a9 ef ff <0f> 0b e9 a5 fe ff ff e8 7d a9 ef ff 48 8d 7d 10 48 b8 00 00 00 00
[ 157.896467] RSP: 0018:ffff888031e77c48 EFLAGS: 00010006
[ 157.896477] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000
[ 157.896485] RDX: ffff88801f3dd040 RSI: ffffffff815666b7 RDI: 0000000000000005
[ 157.896494] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001
[ 157.896501] R10: 0000000000000000 R11: ffffffff865b401b R12: ffff88800f20d800
[ 157.896510] R13: ffff88806ce3d140 R14: ffffffff8547cf80 R15: 0000000000000002
[ 157.896520] FS: 00007f0596dcc700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000
[ 157.896532] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 157.896541] CR2: 00000000200003c0 CR3: 00000000314b0000 CR4: 0000000000350ef0
[ 157.896549] Call Trace:
[ 157.896553]
[ 157.896559] ctx_sched_out+0x8f1/0xc10
[ 157.896573] __perf_event_task_sched_out+0x6d0/0x18d0
[ 157.896590] ? lock_is_held_type+0xd7/0x130
[ 157.896606] ? __perf_cgroup_move+0x160/0x160
[ 157.896619] ? set_next_entity+0x304/0x550
[ 157.896638] ? update_curr+0x267/0x740
[ 157.896657] ? lock_is_held_type+0xd7/0x130
03:37:04 executing program 7:
epoll_create(0x102f)
syz_read_part_table(0x0, 0x0, 0x0)
03:37:04 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0000001a0001000000000000000000026b02bb7feb773f70d5"], 0x1c}], 0x1}, 0x0)
[ 157.896672] __schedule+0xedd/0x2470
[ 157.896692] ? io_schedule_timeout+0x150/0x150
[ 157.896710] ? rcu_read_lock_sched_held+0x3e/0x80
[ 157.896731] schedule+0xda/0x1b0
[ 157.896748] exit_to_user_mode_prepare+0x114/0x1a0
[ 157.896761] syscall_exit_to_user_mode+0x19/0x40
[ 157.896776] do_syscall_64+0x48/0x90
[ 157.896788] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 157.896804] RIP: 0033:0x7f0599856b19
[ 157.896813] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 157.896824] RSP: 002b:00007f0596dcc218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
[ 157.896836] RAX: 0000000000000001 RBX: 00007f0599969f68 RCX: 00007f0599856b19
[ 157.896844] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f0599969f6c
[ 157.896851] RBP: 00007f0599969f60 R08: 000000000000000e R09: 0000000000000000
[ 157.896859] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f0599969f6c
[ 157.896867] R13: 00007fff01861ebf R14: 00007f0596dcc300 R15: 0000000000022000
[ 157.896880]
[ 157.896883] irq event stamp: 278
[ 157.896887] hardirqs last enabled at (277): [] exit_to_user_mode_prepare+0x109/0x1a0
03:37:04 executing program 1:
prctl$PR_SET_THP_DISABLE(0x29, 0x0)
03:37:04 executing program 3:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
readv(r0, &(0x7f0000000180)=[{&(0x7f0000000200)=""/179, 0xb3}], 0x1)
03:37:04 executing program 6:
mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0)
pkey_mprotect(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff)
mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3)
[ 157.896903] hardirqs last disabled at (278): [] __schedule+0x1225/0x2470
[ 157.896923] softirqs last enabled at (64): [] __irq_exit_rcu+0x11b/0x180
[ 157.896943] softirqs last disabled at (53): [] __irq_exit_rcu+0x11b/0x180
[ 157.896963] ---[ end trace 0000000000000000 ]---
03:37:04 executing program 4:
syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff)
socketpair(0x10, 0x2, 0x6, &(0x7f0000000e00))
03:37:04 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000880), 0x4)
setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000940)=@gcm_256={{}, "3a2be956854d7bac", "b590f74b039fa5cadbca4758ab783d474789bcd3973e7114a0ffb84115131ca8", "23141980", "978b155f2857146f"}, 0x38)
03:37:04 executing program 1:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@updsa={0xf0, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private1, @in, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xa0}, {@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, @in=@local, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0)
03:37:04 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0000001a0001000000000000000000026b02bb7feb773f70d5"], 0x1c}], 0x1}, 0x0)
03:37:04 executing program 0:
r0 = socket$netlink(0x10, 0x3, 0xa)
sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001640)={0x14}, 0x14}}, 0x0)
03:37:04 executing program 7:
r0 = getpid()
setpriority(0x0, r0, 0x0)
03:37:04 executing program 4:
syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff)
socketpair(0x10, 0x2, 0x6, &(0x7f0000000e00))
03:37:04 executing program 3:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
readv(r0, &(0x7f0000000180)=[{&(0x7f0000000200)=""/179, 0xb3}], 0x1)
03:37:04 executing program 7:
r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
getsockopt$bt_hci(r0, 0x0, 0x3, 0x0, &(0x7f0000000040))
03:37:04 executing program 0:
r0 = socket$netlink(0x10, 0x3, 0xa)
sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001640)={0x14}, 0x14}}, 0x0)
03:37:04 executing program 1:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@updsa={0xf0, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private1, @in, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xa0}, {@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, @in=@local, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0)
03:37:04 executing program 6:
r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x41)
ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'})
write$sndseq(r0, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, @time={0x9}, {}, {}, @control}], 0x1c)
ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x1bb, @time})
03:37:04 executing program 7:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000001380)={0x0, {0x2, 0x0, @local}, {0x2, 0x0, @private}, {0x2, 0x0, @multicast2}})
03:37:04 executing program 0:
r0 = socket$netlink(0x10, 0x3, 0xa)
sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001640)={0x14}, 0x14}}, 0x0)
03:37:04 executing program 2:
ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'veth0_vlan\x00', @remote})
shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000540)=""/4096)
03:37:04 executing program 3:
rt_sigtimedwait(0x0, 0x0, 0x0, 0x0)
03:37:04 executing program 5:
clock_getres(0x6, 0x0)
03:37:04 executing program 4:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fallocate(r0, 0x22, 0x4f1, 0x1000)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$netlink(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f00000001c0)={0x14, 0x3e, 0x101, 0x0, 0x0, "", [@nested={0xa}]}, 0x14}], 0x1}, 0x0)
pread64(r1, &(0x7f0000000100)=""/223, 0xdf, 0x10001)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
03:37:04 executing program 6:
r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x41)
ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'})
write$sndseq(r0, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, @time={0x9}, {}, {}, @control}], 0x1c)
ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x1bb, @time})
03:37:05 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0xb4, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f00000001c0)={0x14, 0x3e, 0x101, 0x0, 0x0, "", [@nested={0xa}]}, 0x14}], 0x1}, 0x0)
03:37:05 executing program 1:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@updsa={0xf0, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private1, @in, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xa0}, {@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, @in=@local, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0)
03:37:05 executing program 2:
syz_io_uring_setup(0x5ce4, &(0x7f00000002c0), &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000340), &(0x7f0000000380))
03:37:05 executing program 3:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000000080)="fa", 0x1, 0x2c96}, {&(0x7f0000000100)="1b", 0x1}], 0x10008, &(0x7f00000015c0)={[], [{@hash}, {@dont_appraise}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]})
socketpair(0x1, 0x0, 0x0, &(0x7f0000001740))
socket$inet6(0xa, 0x0, 0x0)
syz_mount_image$iso9660(&(0x7f00000017c0), &(0x7f0000001800)='./file0\x00', 0x0, 0x0, &(0x7f0000001900), 0x826000, &(0x7f0000001940))
03:37:05 executing program 0:
r0 = socket$netlink(0x10, 0x3, 0xa)
sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001640)={0x14}, 0x14}}, 0x0)
03:37:05 executing program 4:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fallocate(r0, 0x22, 0x4f1, 0x1000)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$netlink(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f00000001c0)={0x14, 0x3e, 0x101, 0x0, 0x0, "", [@nested={0xa}]}, 0x14}], 0x1}, 0x0)
pread64(r1, &(0x7f0000000100)=""/223, 0xdf, 0x10001)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
03:37:05 executing program 1:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@updsa={0xf0, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private1, @in, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xa0}, {@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, @in=@local, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0)
[ 158.471989] loop3: detected capacity change from 0 to 44
[ 158.474235] SELinux: security_context_str_to_sid (user_u) failed with errno=-22
[ 158.547287] loop3: detected capacity change from 0 to 44
[ 158.549064] SELinux: security_context_str_to_sid (user_u) failed with errno=-22
03:37:05 executing program 6:
r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x41)
ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'})
write$sndseq(r0, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, @time={0x9}, {}, {}, @control}], 0x1c)
ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x1bb, @time})
03:37:05 executing program 7:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fallocate(r0, 0x22, 0x4f1, 0x1000)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$netlink(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f00000001c0)={0x14, 0x3e, 0x101, 0x0, 0x0, "", [@nested={0xa}]}, 0x14}], 0x1}, 0x0)
pread64(r1, &(0x7f0000000100)=""/223, 0xdf, 0x10001)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
03:37:05 executing program 3:
r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00')
readv(r0, 0x0, 0x0)
03:37:05 executing program 1:
syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x1, &(0x7f0000005480)=[{0x0}], 0x0, 0x0)
03:37:05 executing program 0:
ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0)
syz_mount_image$nfs4(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000200)="3ce6323db3b48d05defc2a73d3670375e9e553473ef9ae41023bbebf4b19ac0254b58414eb37c599c82236d3c9d2187f915452378ff1f5f6ced9148ccfbf7b6d49b9", 0x42}, {&(0x7f00000002c0)="db581060271c7a2e6ea412af45c7ad", 0xf}, {&(0x7f0000000380)="97", 0x1, 0xf01b}], 0x11000, &(0x7f0000000580)={[{'/proc/consoles\x00'}, {}], [{@hash}, {@context={'context', 0x3d, 'user_u'}}, {@uid_gt={'uid>', 0xee00}}, {@obj_user={'obj_user', 0x3d, '}'}}, {@subj_user={'subj_user', 0x3d, '/proc/consoles\x00'}}, {@obj_role={'obj_role', 0x3d, '{]%'}}, {@obj_role}, {@fsmagic}, {@fsmagic={'fsmagic', 0x3d, 0x9}}, {@uid_lt}]})
ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, 0x0)
03:37:05 executing program 2:
r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0)
bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @short={0x2, 0x0, 0xffff}}, 0x14)
03:37:05 executing program 4:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fallocate(r0, 0x22, 0x4f1, 0x1000)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$netlink(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f00000001c0)={0x14, 0x3e, 0x101, 0x0, 0x0, "", [@nested={0xa}]}, 0x14}], 0x1}, 0x0)
pread64(r1, &(0x7f0000000100)=""/223, 0xdf, 0x10001)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
03:37:05 executing program 5:
r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000040))
[ 158.639236] loop0: detected capacity change from 0 to 240
[ 158.660543] loop0: detected capacity change from 0 to 240
03:37:05 executing program 6:
r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x41)
ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'})
write$sndseq(r0, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, @time={0x9}, {}, {}, @control}], 0x1c)
ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x1bb, @time})
03:37:05 executing program 7:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fallocate(r0, 0x22, 0x4f1, 0x1000)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$netlink(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f00000001c0)={0x14, 0x3e, 0x101, 0x0, 0x0, "", [@nested={0xa}]}, 0x14}], 0x1}, 0x0)
pread64(r1, &(0x7f0000000100)=""/223, 0xdf, 0x10001)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
03:37:05 executing program 5:
syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x161941, 0x0)
openat2(0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x11}, 0x18)
pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0)
epoll_create(0x4)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
truncate(&(0x7f0000000180)='./file1\x00', 0x0)
03:37:05 executing program 4:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fallocate(r0, 0x22, 0x4f1, 0x1000)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$netlink(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f00000001c0)={0x14, 0x3e, 0x101, 0x0, 0x0, "", [@nested={0xa}]}, 0x14}], 0x1}, 0x0)
pread64(r1, &(0x7f0000000100)=""/223, 0xdf, 0x10001)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
03:37:05 executing program 1:
getcwd(&(0x7f00000006c0)=""/164, 0xa4)
03:37:05 executing program 2:
sched_rr_get_interval(0x0, &(0x7f0000004ac0))
03:37:05 executing program 0:
add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
r1 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc2}, &(0x7f00000002c0)={0x0, "250f1a93b893897973644e9ef8ed62a1b1a31fba02d2d3aa3531196d619f144efeb878d4e77f8cf1d912bfe5ed77c06aebdb0f9882738e1889cb964ed88176a0", 0x1b}, 0x48, r0)
request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)=':B@}-\\(\x00', r1)
03:37:05 executing program 3:
openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x1d42c0, 0x0)
[ 158.768369] hrtimer: interrupt took 27892 ns
03:37:05 executing program 2:
sched_rr_get_interval(0x0, &(0x7f0000004ac0))
03:37:05 executing program 1:
socket$inet_icmp(0x2, 0x2, 0x1)
sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0)
03:37:05 executing program 0:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x1c, 0x601, 0x0, 0x0, {0x12}, [@typed={0x14, 0x1a, 0x0, 0x0, @ipv6=@mcast2}]}, 0x28}}, 0x0)
03:37:05 executing program 3:
syz_mount_image$ext4(&(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002900))
syz_io_uring_setup(0x74b6, &(0x7f0000002a00), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff8000/0x3000)=nil, 0x0, 0x0)
syz_io_uring_submit(0x0, 0x0, 0x0, 0x0)
removexattr(&(0x7f0000002f00)='./file0\x00', &(0x7f0000002f40)=@random={'user.', 'bh'})
03:37:05 executing program 5:
syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x161941, 0x0)
openat2(0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x11}, 0x18)
pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0)
epoll_create(0x4)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
truncate(&(0x7f0000000180)='./file1\x00', 0x0)
03:37:05 executing program 7:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fallocate(r0, 0x22, 0x4f1, 0x1000)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$netlink(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f00000001c0)={0x14, 0x3e, 0x101, 0x0, 0x0, "", [@nested={0xa}]}, 0x14}], 0x1}, 0x0)
pread64(r1, &(0x7f0000000100)=""/223, 0xdf, 0x10001)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
[ 158.921607] No source specified
[ 158.924602] netlink: 'syz-executor.0': attribute type 11 has an invalid length.
[ 158.941316] No source specified
03:37:05 executing program 4:
syz_open_procfs(0x0, &(0x7f0000000180)='timerslack_ns\x00')
03:37:05 executing program 1:
socket$inet_icmp(0x2, 0x2, 0x1)
sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0)
03:37:05 executing program 2:
sched_rr_get_interval(0x0, &(0x7f0000004ac0))
03:37:05 executing program 6:
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$KDFONTOP_COPY(r0, 0x5424, 0x0)
03:37:05 executing program 0:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x1c, 0x601, 0x0, 0x0, {0x12}, [@typed={0x14, 0x1a, 0x0, 0x0, @ipv6=@mcast2}]}, 0x28}}, 0x0)
03:37:05 executing program 3:
r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x0)
[ 159.040377] netlink: 'syz-executor.0': attribute type 11 has an invalid length.
03:37:05 executing program 4:
syz_emit_ethernet(0x22, &(0x7f0000000000)={@broadcast, @link_local, @void, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @link_local}}}}, 0x0)
03:37:05 executing program 5:
syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x161941, 0x0)
openat2(0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x11}, 0x18)
pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0)
epoll_create(0x4)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
truncate(&(0x7f0000000180)='./file1\x00', 0x0)
03:37:05 executing program 7:
r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0)
ioctl$LOOP_CLR_FD(r0, 0x5451)
[ 159.211714] netlink: 'syz-executor.0': attribute type 11 has an invalid length.
03:37:05 executing program 2:
sched_rr_get_interval(0x0, &(0x7f0000004ac0))
03:37:05 executing program 0:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x1c, 0x601, 0x0, 0x0, {0x12}, [@typed={0x14, 0x1a, 0x0, 0x0, @ipv6=@mcast2}]}, 0x28}}, 0x0)
03:37:05 executing program 3:
futex(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
03:37:05 executing program 6:
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$KDFONTOP_COPY(r0, 0x5424, 0x0)
03:37:05 executing program 7:
write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8)
ioctl$SNDRV_TIMER_IOCTL_STATUS32(0xffffffffffffffff, 0x80585414, &(0x7f0000000040))
setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000000c0), 0x4)
syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff)
fork()
03:37:05 executing program 1:
socket$inet_icmp(0x2, 0x2, 0x1)
sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0)
03:37:05 executing program 5:
syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x161941, 0x0)
openat2(0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x11}, 0x18)
pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0)
epoll_create(0x4)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
truncate(&(0x7f0000000180)='./file1\x00', 0x0)
03:37:05 executing program 4:
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff)
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
03:37:05 executing program 6:
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$KDFONTOP_COPY(r0, 0x5424, 0x0)
03:37:05 executing program 1:
socket$inet_icmp(0x2, 0x2, 0x1)
sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0)
03:37:05 executing program 3:
unshare(0x20020400)
unshare(0x8000000)
unshare(0x4050400)
unshare(0x4010280)
unshare(0xa040000)
unshare(0x60000000)
unshare(0x40000)
semget$private(0x0, 0x3, 0x141)
unshare(0x10000200)
unshare(0x2010000)
unshare(0x2000000)
03:37:05 executing program 4:
r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201)
03:37:05 executing program 0:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x1c, 0x601, 0x0, 0x0, {0x12}, [@typed={0x14, 0x1a, 0x0, 0x0, @ipv6=@mcast2}]}, 0x28}}, 0x0)
03:37:05 executing program 2:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000900), r0)
sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f00000009c0)={&(0x7f00000008c0), 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x14, r2, 0x1}, 0x14}}, 0x0)
[ 159.358248] rfkill: input handler disabled
[ 159.362728] rfkill: input handler enabled
03:37:05 executing program 6:
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$KDFONTOP_COPY(r0, 0x5424, 0x0)
[ 159.390182] netlink: 'syz-executor.0': attribute type 11 has an invalid length.
[ 159.505581] rfkill: input handler disabled
[ 159.506404] rfkill: input handler enabled
03:37:06 executing program 4:
r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201)
03:37:06 executing program 0:
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0)
connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x8, @none}, 0xe)
03:37:06 executing program 3:
unshare(0x20020400)
unshare(0x8000000)
unshare(0x4050400)
unshare(0x4010280)
unshare(0xa040000)
unshare(0x60000000)
unshare(0x40000)
semget$private(0x0, 0x3, 0x141)
unshare(0x10000200)
unshare(0x2010000)
unshare(0x2000000)
03:37:06 executing program 6:
unshare(0x20020400)
unshare(0x8000000)
unshare(0x4050400)
unshare(0x4010280)
unshare(0xa040000)
unshare(0x60000000)
unshare(0x40000)
semget$private(0x0, 0x3, 0x141)
unshare(0x10000200)
unshare(0x2010000)
unshare(0x2000000)
03:37:06 executing program 7:
unshare(0x20020400)
unshare(0x8000000)
unshare(0x4050400)
unshare(0x4010280)
unshare(0xa040000)
unshare(0x60000000)
unshare(0x40000)
semget$private(0x0, 0x3, 0x141)
unshare(0x10000200)
unshare(0x2010000)
unshare(0x2000000)
03:37:06 executing program 2:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000900), r0)
sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f00000009c0)={&(0x7f00000008c0), 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x14, r2, 0x1}, 0x14}}, 0x0)
03:37:06 executing program 4:
r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201)
[ 159.599589] rfkill: input handler disabled
[ 159.600306] rfkill: input handler enabled
03:37:06 executing program 0:
r0 = syz_open_dev$tty20(0xc, 0x4, 0x1)
ioctl$TIOCGSOFTCAR(r0, 0x4b68, 0x0)
03:37:06 executing program 5:
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000080))
03:37:06 executing program 1:
syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff)
openat$nvram(0xffffffffffffff9c, &(0x7f0000000840), 0x6082, 0x0)
03:37:06 executing program 7:
unshare(0x20020400)
unshare(0x8000000)
unshare(0x4050400)
unshare(0x4010280)
unshare(0xa040000)
unshare(0x60000000)
unshare(0x40000)
semget$private(0x0, 0x3, 0x141)
unshare(0x10000200)
unshare(0x2010000)
unshare(0x2000000)
03:37:06 executing program 3:
unshare(0x20020400)
unshare(0x8000000)
unshare(0x4050400)
unshare(0x4010280)
unshare(0xa040000)
unshare(0x60000000)
unshare(0x40000)
semget$private(0x0, 0x3, 0x141)
unshare(0x10000200)
unshare(0x2010000)
unshare(0x2000000)
03:37:06 executing program 2:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000900), r0)
sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f00000009c0)={&(0x7f00000008c0), 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x14, r2, 0x1}, 0x14}}, 0x0)
03:37:06 executing program 4:
r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201)
03:37:06 executing program 6:
unshare(0x20020400)
unshare(0x8000000)
unshare(0x4050400)
unshare(0x4010280)
unshare(0xa040000)
unshare(0x60000000)
unshare(0x40000)
semget$private(0x0, 0x3, 0x141)
unshare(0x10000200)
unshare(0x2010000)
unshare(0x2000000)
[ 159.692553] rfkill: input handler disabled
[ 159.696605] rfkill: input handler enabled
03:37:06 executing program 5:
socket(0xb, 0x0, 0x0)
03:37:06 executing program 1:
r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0)
setsockopt$sock_int(r0, 0x1, 0x31, &(0x7f00000000c0), 0x4)
03:37:06 executing program 2:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000900), r0)
sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f00000009c0)={&(0x7f00000008c0), 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x14, r2, 0x1}, 0x14}}, 0x0)
03:37:06 executing program 0:
r0 = syz_open_dev$tty20(0xc, 0x4, 0x1)
ioctl$TIOCGSOFTCAR(r0, 0x4b68, 0x0)
03:37:06 executing program 4:
openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x83a7c98d5cd300a2, 0x0)
03:37:06 executing program 3:
unshare(0x20020400)
unshare(0x8000000)
unshare(0x4050400)
unshare(0x4010280)
unshare(0xa040000)
unshare(0x60000000)
unshare(0x40000)
semget$private(0x0, 0x3, 0x141)
unshare(0x10000200)
unshare(0x2010000)
unshare(0x2000000)
03:37:06 executing program 7:
unshare(0x20020400)
unshare(0x8000000)
unshare(0x4050400)
unshare(0x4010280)
unshare(0xa040000)
unshare(0x60000000)
unshare(0x40000)
semget$private(0x0, 0x3, 0x141)
unshare(0x10000200)
unshare(0x2010000)
unshare(0x2000000)
03:37:06 executing program 2:
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0)
perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0)
03:37:06 executing program 5:
socket$packet(0x11, 0xa, 0x300)
r0 = socket$inet6(0xa, 0x1, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c)
03:37:06 executing program 0:
r0 = syz_open_dev$tty20(0xc, 0x4, 0x1)
ioctl$TIOCGSOFTCAR(r0, 0x4b68, 0x0)
03:37:06 executing program 4:
openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x83a7c98d5cd300a2, 0x0)
03:37:06 executing program 6:
unshare(0x20020400)
unshare(0x8000000)
unshare(0x4050400)
unshare(0x4010280)
unshare(0xa040000)
unshare(0x60000000)
unshare(0x40000)
semget$private(0x0, 0x3, 0x141)
unshare(0x10000200)
unshare(0x2010000)
unshare(0x2000000)
03:37:06 executing program 1:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000480)={0x0, {{0xa, 0x0, 0x0, @private1}}}, 0x88)
03:37:06 executing program 3:
r0 = socket$inet6(0xa, 0x801, 0x0)
connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c)
r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
r2 = socket(0x23, 0x5, 0x401)
getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000180), &(0x7f00000003c0)=0x4)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0)
shmdt(0x0)
openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18)
r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
sendto$unix(r3, &(0x7f0000000340)="35096a773adb7d1d36d875808da81befb06d941c7e45dd8499cffd0180f67841a413f368df4699ff8e48fff7facc132a5e310e6f1631c880ef5d7c682c374fcc071a408423f98bda4d2b71a4d1c52fe56e6449de857a7bf95de55bdfc7eda7910109a10bd4cb216137edc6c9f6705eb2f2fb31d8affb5d99da19", 0x7a, 0x4000, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e)
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x100}}, './file0\x00'})
ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r6, 0xc018937e, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3, @out_args}, './file0\x00'})
03:37:06 executing program 4:
openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x83a7c98d5cd300a2, 0x0)
03:37:06 executing program 0:
r0 = syz_open_dev$tty20(0xc, 0x4, 0x1)
ioctl$TIOCGSOFTCAR(r0, 0x4b68, 0x0)
03:37:06 executing program 5:
futex(0x0, 0x7, 0x0, 0x0, 0x0, 0x0)
03:37:07 executing program 4:
openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x83a7c98d5cd300a2, 0x0)
03:37:07 executing program 1:
r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000340), 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000a40))
03:37:07 executing program 5:
futex(0x0, 0x7, 0x0, 0x0, 0x0, 0x0)
03:37:07 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0)
mknod$loop(&(0x7f0000000100)='./file0/file0\x00', 0x6000, 0x0)
unlink(&(0x7f0000000180)='./file0/file0\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00')
syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00')
getdents(r0, &(0x7f0000000000)=""/94, 0x20000018)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff})
bind$unix(r1, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e)
03:37:07 executing program 2:
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0)
perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0)
03:37:07 executing program 3:
r0 = socket$inet6(0xa, 0x801, 0x0)
connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c)
r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
r2 = socket(0x23, 0x5, 0x401)
getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000180), &(0x7f00000003c0)=0x4)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0)
shmdt(0x0)
openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18)
r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
sendto$unix(r3, &(0x7f0000000340)="35096a773adb7d1d36d875808da81befb06d941c7e45dd8499cffd0180f67841a413f368df4699ff8e48fff7facc132a5e310e6f1631c880ef5d7c682c374fcc071a408423f98bda4d2b71a4d1c52fe56e6449de857a7bf95de55bdfc7eda7910109a10bd4cb216137edc6c9f6705eb2f2fb31d8affb5d99da19", 0x7a, 0x4000, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e)
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x100}}, './file0\x00'})
ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r6, 0xc018937e, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3, @out_args}, './file0\x00'})
03:37:07 executing program 0:
syz_emit_ethernet(0x6e, &(0x7f00000001c0)={@random="5398acdc7185", @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ddc20", 0x38, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "f2e2a6", 0x0, 0x3a, 0x0, @private2, @loopback, [], "52168a0f02b79fbf"}}}}}}}, 0x0)
03:37:07 executing program 6:
r0 = socket$inet6(0xa, 0x801, 0x0)
connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c)
r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
r2 = socket(0x23, 0x5, 0x401)
getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000180), &(0x7f00000003c0)=0x4)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0)
shmdt(0x0)
openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18)
r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
sendto$unix(r3, &(0x7f0000000340)="35096a773adb7d1d36d875808da81befb06d941c7e45dd8499cffd0180f67841a413f368df4699ff8e48fff7facc132a5e310e6f1631c880ef5d7c682c374fcc071a408423f98bda4d2b71a4d1c52fe56e6449de857a7bf95de55bdfc7eda7910109a10bd4cb216137edc6c9f6705eb2f2fb31d8affb5d99da19", 0x7a, 0x4000, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e)
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x100}}, './file0\x00'})
ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r6, 0xc018937e, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3, @out_args}, './file0\x00'})
03:37:07 executing program 1:
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0)
r1 = dup(r0)
setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000000)=0x3, 0x4)
03:37:07 executing program 0:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000040)={'syz_tun\x00'})
03:37:07 executing program 5:
futex(0x0, 0x7, 0x0, 0x0, 0x0, 0x0)
03:37:07 executing program 2:
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0)
perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0)
[ 160.795829] syz_tun: mtu greater than device maximum
03:37:07 executing program 4:
r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000d80), 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000dc0)=ANY=[@ANYBLOB="040000000123000018"])
[ 160.902285] autofs4:pid:6065:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(4.8961), cmd(0xc0189374)
[ 160.904300] autofs4:pid:6065:validate_dev_ioctl: invalid device control module version supplied for cmd(0xc0189374)
03:37:07 executing program 5:
futex(0x0, 0x7, 0x0, 0x0, 0x0, 0x0)
03:37:07 executing program 3:
r0 = socket$inet6(0xa, 0x801, 0x0)
connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c)
r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
r2 = socket(0x23, 0x5, 0x401)
getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000180), &(0x7f00000003c0)=0x4)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0)
shmdt(0x0)
openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18)
r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
sendto$unix(r3, &(0x7f0000000340)="35096a773adb7d1d36d875808da81befb06d941c7e45dd8499cffd0180f67841a413f368df4699ff8e48fff7facc132a5e310e6f1631c880ef5d7c682c374fcc071a408423f98bda4d2b71a4d1c52fe56e6449de857a7bf95de55bdfc7eda7910109a10bd4cb216137edc6c9f6705eb2f2fb31d8affb5d99da19", 0x7a, 0x4000, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e)
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x100}}, './file0\x00'})
ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r6, 0xc018937e, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3, @out_args}, './file0\x00'})
03:37:07 executing program 1:
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0)
r1 = dup(r0)
setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000000)=0x3, 0x4)
03:37:07 executing program 0:
r0 = signalfd4(0xffffffffffffffff, &(0x7f0000007d00), 0x8, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={{r1}})
03:37:07 executing program 2:
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0)
perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0)
03:37:07 executing program 6:
r0 = socket$inet6(0xa, 0x801, 0x0)
connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c)
r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
r2 = socket(0x23, 0x5, 0x401)
getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000180), &(0x7f00000003c0)=0x4)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0)
shmdt(0x0)
openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18)
r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
sendto$unix(r3, &(0x7f0000000340)="35096a773adb7d1d36d875808da81befb06d941c7e45dd8499cffd0180f67841a413f368df4699ff8e48fff7facc132a5e310e6f1631c880ef5d7c682c374fcc071a408423f98bda4d2b71a4d1c52fe56e6449de857a7bf95de55bdfc7eda7910109a10bd4cb216137edc6c9f6705eb2f2fb31d8affb5d99da19", 0x7a, 0x4000, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e)
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x100}}, './file0\x00'})
ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r6, 0xc018937e, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3, @out_args}, './file0\x00'})
03:37:07 executing program 4:
r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000d80), 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000dc0)=ANY=[@ANYBLOB="040000000123000018"])
03:37:07 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0)
mknod$loop(&(0x7f0000000100)='./file0/file0\x00', 0x6000, 0x0)
unlink(&(0x7f0000000180)='./file0/file0\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00')
syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00')
getdents(r0, &(0x7f0000000000)=""/94, 0x20000018)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff})
bind$unix(r1, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e)
[ 161.059639] autofs4:pid:6085:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(4.8961), cmd(0xc0189374)
[ 161.061739] autofs4:pid:6085:validate_dev_ioctl: invalid device control module version supplied for cmd(0xc0189374)
03:37:07 executing program 1:
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0)
r1 = dup(r0)
setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000000)=0x3, 0x4)
03:37:07 executing program 0:
r0 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000040)=0x81, 0x4)
sendmmsg$inet6(r0, &(0x7f0000003440)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0)
03:37:07 executing program 4:
r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000d80), 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000dc0)=ANY=[@ANYBLOB="040000000123000018"])
03:37:07 executing program 2:
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0)
ioctl$TIOCGETD(r0, 0x80045440, &(0x7f0000000440))
03:37:07 executing program 5:
semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000200))
03:37:07 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0)
mknod$loop(&(0x7f0000000100)='./file0/file0\x00', 0x6000, 0x0)
unlink(&(0x7f0000000180)='./file0/file0\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00')
syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00')
getdents(r0, &(0x7f0000000000)=""/94, 0x20000018)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff})
bind$unix(r1, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e)
[ 161.235065] autofs4:pid:6099:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(4.8961), cmd(0xc0189374)
[ 161.236372] autofs4:pid:6099:validate_dev_ioctl: invalid device control module version supplied for cmd(0xc0189374)
03:37:07 executing program 5:
syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x36, 0x2d, 0x36, 0x3a, 0x37, 0x33, 0x2f, 0x37]}}}}]})
03:37:07 executing program 4:
r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000d80), 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000dc0)=ANY=[@ANYBLOB="040000000123000018"])
03:37:07 executing program 1:
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0)
r1 = dup(r0)
setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000000)=0x3, 0x4)
[ 161.312819] autofs4:pid:6105:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(4.8961), cmd(0xc0189374)
[ 161.314056] autofs4:pid:6105:validate_dev_ioctl: invalid device control module version supplied for cmd(0xc0189374)
[ 161.325617] tmpfs: Bad value for 'mpol'
[ 161.327789] tmpfs: Bad value for 'mpol'
03:37:08 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0)
mknod$loop(&(0x7f0000000100)='./file0/file0\x00', 0x6000, 0x0)
unlink(&(0x7f0000000180)='./file0/file0\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00')
syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00')
getdents(r0, &(0x7f0000000000)=""/94, 0x20000018)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff})
bind$unix(r1, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e)
03:37:08 executing program 5:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]})
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0)
signalfd4(0xffffffffffffffff, &(0x7f0000000280), 0x8, 0x0)
inotify_init()
socket$inet6_udp(0xa, 0x2, 0x0)
pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0)
03:37:08 executing program 4:
syz_emit_ethernet(0xbe, &(0x7f00000000c0)={@local, @empty, @void, {@ipv4={0x8864, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x21, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x0, 0x9c, 0x0, @wg}}}}}, 0x0)
03:37:08 executing program 1:
get_robust_list(0x0, 0x0, &(0x7f0000000180))
03:37:08 executing program 3:
r0 = socket$inet6(0xa, 0x801, 0x0)
connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c)
r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
r2 = socket(0x23, 0x5, 0x401)
getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000180), &(0x7f00000003c0)=0x4)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0)
shmdt(0x0)
openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18)
r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
sendto$unix(r3, &(0x7f0000000340)="35096a773adb7d1d36d875808da81befb06d941c7e45dd8499cffd0180f67841a413f368df4699ff8e48fff7facc132a5e310e6f1631c880ef5d7c682c374fcc071a408423f98bda4d2b71a4d1c52fe56e6449de857a7bf95de55bdfc7eda7910109a10bd4cb216137edc6c9f6705eb2f2fb31d8affb5d99da19", 0x7a, 0x4000, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e)
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x100}}, './file0\x00'})
ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r6, 0xc018937e, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3, @out_args}, './file0\x00'})
03:37:08 executing program 6:
r0 = socket$inet6(0xa, 0x801, 0x0)
connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c)
r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3)
r2 = socket(0x23, 0x5, 0x401)
getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000180), &(0x7f00000003c0)=0x4)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00')
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0)
shmdt(0x0)
openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18)
r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
sendto$unix(r3, &(0x7f0000000340)="35096a773adb7d1d36d875808da81befb06d941c7e45dd8499cffd0180f67841a413f368df4699ff8e48fff7facc132a5e310e6f1631c880ef5d7c682c374fcc071a408423f98bda4d2b71a4d1c52fe56e6449de857a7bf95de55bdfc7eda7910109a10bd4cb216137edc6c9f6705eb2f2fb31d8affb5d99da19", 0x7a, 0x4000, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e)
ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x100}}, './file0\x00'})
ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r6, 0xc018937e, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3, @out_args}, './file0\x00'})
03:37:08 executing program 2:
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0)
ioctl$TIOCGETD(r0, 0x80045440, &(0x7f0000000440))
03:37:08 executing program 0:
r0 = signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8)
signalfd(r0, &(0x7f0000000340), 0x8)
03:37:08 executing program 4:
syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]})
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00')
renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00')
fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0)
perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
03:37:08 executing program 5:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]})
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0)
signalfd4(0xffffffffffffffff, &(0x7f0000000280), 0x8, 0x0)
inotify_init()
socket$inet6_udp(0xa, 0x2, 0x0)
pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0)
03:37:08 executing program 0:
r0 = signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8)
signalfd(r0, &(0x7f0000000340), 0x8)
03:37:08 executing program 1:
syz_mount_image$iso9660(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0))
03:37:08 executing program 2:
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0)
ioctl$TIOCGETD(r0, 0x80045440, &(0x7f0000000440))
[ 162.063173] loop4: detected capacity change from 0 to 5
[ 162.086098] =======================================================
[ 162.086098] WARNING: The mand mount option has been deprecated and
[ 162.086098] and is ignored by this kernel. Remove the mand
[ 162.086098] option from the mount to silence this warning.
[ 162.086098] =======================================================
03:37:08 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x63f}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000014a00))
[ 162.343086] loop4: detected capacity change from 0 to 5
03:37:09 executing program 2:
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0)
ioctl$TIOCGETD(r0, 0x80045440, &(0x7f0000000440))
03:37:09 executing program 0:
r0 = signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8)
signalfd(r0, &(0x7f0000000340), 0x8)
03:37:09 executing program 5:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]})
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0)
signalfd4(0xffffffffffffffff, &(0x7f0000000280), 0x8, 0x0)
inotify_init()
socket$inet6_udp(0xa, 0x2, 0x0)
pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0)
03:37:09 executing program 6:
openat$nvram(0xffffffffffffff9c, &(0x7f0000001e00), 0x4001, 0x0)
03:37:09 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x63f}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000014a00))
03:37:09 executing program 3:
mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000)
sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, 0x0, 0x0)
03:37:09 executing program 4:
syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]})
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00')
renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00')
fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0)
perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
03:37:09 executing program 7:
syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x36, 0x2d, 0x36, 0x3a, 0x4e]}}}}]})
[ 162.435987] tmpfs: Bad value for 'mpol'
[ 162.436981] tmpfs: Bad value for 'mpol'
[ 162.459851] loop4: detected capacity change from 0 to 5
03:37:09 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x63f}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000014a00))
03:37:09 executing program 2:
syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]})
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00')
renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00')
fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0)
perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
03:37:09 executing program 3:
syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]})
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00')
renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00')
fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0)
perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
03:37:09 executing program 5:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]})
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0)
signalfd4(0xffffffffffffffff, &(0x7f0000000280), 0x8, 0x0)
inotify_init()
socket$inet6_udp(0xa, 0x2, 0x0)
pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0)
03:37:09 executing program 0:
r0 = signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8)
signalfd(r0, &(0x7f0000000340), 0x8)
03:37:09 executing program 6:
syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]})
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00')
renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00')
fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0)
perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
03:37:09 executing program 7:
syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]})
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00')
renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00')
fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0)
perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
[ 162.537949] loop6: detected capacity change from 0 to 5
03:37:09 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x63f}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000014a00))
[ 162.567845] loop7: detected capacity change from 0 to 5
03:37:09 executing program 5:
syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]})
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00')
renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00')
fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0)
perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
03:37:09 executing program 2:
syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]})
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00')
renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00')
fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0)
perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
03:37:09 executing program 3:
syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]})
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00')
renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00')
fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0)
perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
[ 162.620960] loop5: detected capacity change from 0 to 5
03:37:09 executing program 0:
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000900)=[{0x0}], 0x0, 0x0)
03:37:09 executing program 4:
syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]})
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00')
renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00')
fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0)
perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
[ 162.713394] loop4: detected capacity change from 0 to 5
03:37:09 executing program 6:
syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]})
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00')
renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00')
fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0)
perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
03:37:09 executing program 5:
syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]})
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00')
renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00')
fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0)
perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
[ 162.729230] loop5: detected capacity change from 0 to 5
[ 162.742084] loop6: detected capacity change from 0 to 5
[ 162.802103] loop4: detected capacity change from 0 to 5
[ 162.811906] loop7: detected capacity change from 0 to 5
[ 162.820211] loop5: detected capacity change from 0 to 5
[ 162.827510] loop6: detected capacity change from 0 to 5
03:37:09 executing program 4:
syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]})
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00')
renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00')
fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0)
perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
03:37:09 executing program 7:
syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]})
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00')
renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00')
fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0)
perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
03:37:09 executing program 3:
syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]})
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00')
renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00')
fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0)
perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
03:37:09 executing program 0:
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000900)=[{0x0}], 0x0, 0x0)
03:37:09 executing program 5:
syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]})
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00')
renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00')
fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0)
perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
03:37:09 executing program 6:
syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]})
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00')
renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00')
fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0)
perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
03:37:09 executing program 1:
move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x6)
03:37:09 executing program 2:
syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]})
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00')
renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00')
fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0)
perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
03:37:09 executing program 1:
r0 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r0, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e)
ioctl$sock_SIOCINQ(r0, 0x89e0, 0x0)
03:37:09 executing program 0:
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000900)=[{0x0}], 0x0, 0x0)
03:37:09 executing program 3:
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0)
bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @any, 0x0, 0x2}, 0xe)
listen(r0, 0x0)
03:37:09 executing program 5:
r0 = syz_open_dev$tty20(0xc, 0x4, 0x1)
ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x400})
03:37:09 executing program 7:
syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x3f, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="f4ed7efa4f5d1dbf13871d905fbbd6e0759a31107dad1332f0cdbf269bf113ed3d06d6", 0x23, 0x7}, {&(0x7f0000000340)="71b945737c159b720c7729a2c23adef6c897404ffaee5b26bea234a42f51f573d1ff8507e2b8e0db893c8057c047dafaa1385c52f5a806dcf5ea0ab8e8afafd3ab0fb53fe5f43c5b0f75034e91256cbc7d34ffd25b5f62a4f25b9611ad649a3e912ffa32e63aab2b1ca57e8bd412eb929a92df35222751affdcdabfb8a13ad590f8ceb653a627a54b56cec51bcb3e2464f6d4bf142e5f59a8bac035af8f71422", 0xa0, 0x3}, {&(0x7f0000000400)="bf01f5da2731c824195749e81d849a718ee6c678e94889d331a51f011b5a9713308e508aa8432f22078bb56941c49c246e267919ee34f7176779edfd23ff535421aa14d11674a8a2164a6bbca8", 0x4d, 0x57c}], 0x808c0, &(0x7f0000000500)={[{@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type}, {@obj_role={'obj_role', 0x3d, '\'\xcb.['}}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '*+)@'}}]})
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00')
renameat(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file1\x00')
fspick(r1, &(0x7f0000000040)='./file1\x00', 0x0)
perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0xff, 0x7f, 0x8, 0x8, 0x0, 0x5, 0x4410, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffff80, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x1200, 0x81, 0x20, 0x1, 0x9, 0xf5, 0x7, 0x0, 0x8}, 0x0, 0x6, r1, 0x2)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
03:37:09 executing program 1:
r0 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r0, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e)
ioctl$sock_SIOCINQ(r0, 0x89e0, 0x0)
[ 162.986694] loop7: detected capacity change from 0 to 5
03:37:09 executing program 5:
r0 = syz_open_dev$tty20(0xc, 0x4, 0x1)
ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x400})
03:37:09 executing program 3:
io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0)
03:37:09 executing program 3:
epoll_create(0x102f)
03:37:09 executing program 7:
openat(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
r1 = dup(r0)
connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local}, 0x1c)
connect$unix(r1, &(0x7f0000000000)=@abs, 0x6e)
03:37:09 executing program 4:
r0 = syz_open_dev$loop(&(0x7f0000003800), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0)
03:37:09 executing program 5:
r0 = syz_open_dev$tty20(0xc, 0x4, 0x1)
ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x400})
03:37:09 executing program 0:
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000900)=[{0x0}], 0x0, 0x0)
03:37:09 executing program 6:
prctl$PR_SET_PDEATHSIG(0x27, 0x41)
03:37:09 executing program 1:
r0 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r0, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e)
ioctl$sock_SIOCINQ(r0, 0x89e0, 0x0)
03:37:09 executing program 6:
symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00')
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffff9c, 0x800c6613, 0x0)
readlinkat(0xffffffffffffffff, 0x0, &(0x7f0000000100)=""/234, 0xea)
r0 = syz_mount_image$iso9660(&(0x7f0000000200), 0x0, 0x8, 0x0, 0x0, 0x40040, &(0x7f0000001680)={[{@map_acorn}], [{@euid_gt}]})
syz_mount_image$iso9660(&(0x7f0000001740), &(0x7f0000001780)='./file0\x00', 0x0, 0x3, &(0x7f0000001e80)=[{0x0}, {0x0}, {&(0x7f0000001980)="c8a22f0095a185cb2bcd3cd4d32d15b42d29d25702b4138f13cf2b3a99a0e7a195daff0f313b", 0x26, 0xfffffffffffffff8}], 0x0, &(0x7f0000001f40)={[], [{@dont_hash}, {@seclabel}, {@uid_lt}, {@uid_gt={'uid>', 0xee01}}]})
execveat(0xffffffffffffffff, &(0x7f0000002040)='./file0\x00', 0x0, &(0x7f0000002240)=[&(0x7f0000002180)='euid>', &(0x7f00000021c0)='\x00'], 0x0)
r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000002280), 0x80201, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0)
ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000002500), 0x0, 0x0)
mkdirat(0xffffffffffffff9c, &(0x7f00000025c0)='./file1\x00', 0x40)
execveat(r1, 0x0, 0x0, &(0x7f0000002880)=[&(0x7f0000002780)='euid', 0x0, &(0x7f0000002800)='\xe3U\xa7j\x11\xa1\xbe\x18'], 0x0)
io_uring_setup(0x4082, 0x0)
execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
03:37:09 executing program 2:
r0 = socket$packet(0x11, 0x2, 0x300)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440))
03:37:09 executing program 1:
r0 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r0, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e)
ioctl$sock_SIOCINQ(r0, 0x89e0, 0x0)
03:37:09 executing program 4:
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
03:37:09 executing program 7:
personality(0x400000)
pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3, 0xffffffffffffffff)
03:37:09 executing program 5:
r0 = syz_open_dev$tty20(0xc, 0x4, 0x1)
ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x400})
VM DIAGNOSIS:
03:37:04 Registers:
info registers vcpu 0
RAX=000000000000002d RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8
RSI=ffffffff823ba0b1 RDI=ffffffff8765a980 RBP=ffffffff8765a940 RSP=ffff888031e77690
R8 =0000000000000001 R9 =000000000000000a R10=000000000000002d R11=0000000000000001
R12=000000000000002d R13=ffffffff8765a940 R14=0000000000000010 R15=ffffffff823ba0a0
RIP=ffffffff823ba109 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 00007f0596dcc700 00000000 00000000
GS =0000 ffff88806ce00000 00000000 00000000
LDT=0000 fffffe0000000000 00000000 00000000
TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy
GDT= fffffe0000001000 0000007f
IDT= fffffe0000000000 00000fff
CR0=80050033 CR2=00000000200003c0 CR3=00000000314b0000 CR4=00350ef0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM01=0000000000000000 0000000000000000 00007f059993d7c0 00007f059993d7c8
YMM02=0000000000000000 0000000000000000 00007f059993d7e0 00007f059993d7c0
YMM03=0000000000000000 0000000000000000 00007f059993d7c8 00007f059993d7c0
YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000
YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245
YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040
YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000
info registers vcpu 1
RAX=0000000000000000 RBX=ffff888031e3fdf0 RCX=ffffffff817cd7a3 RDX=ffff8880100cb580
RSI=0000000000000000 RDI=0000000000000000 RBP=0000000000000000 RSP=ffff888031e3fd68
R8 =0000000000000007 R9 =0000000000000000 R10=0000000000000000 R11=0000000000000001
R12=0000000000008001 R13=ffff888031e3fea8 R14=0000000000000002 R15=0000000000000000
RIP=ffffffff81460d14 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 0000555557362400 00000000 00000000
GS =0000 ffff88806cf00000 00000000 00000000
LDT=0000 fffffe0000000000 00000000 00000000
TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy
GDT= fffffe0000048000 0000007f
IDT= fffffe0000000000 00000fff
CR0=80050033 CR2=00007f0f801f9540 CR3=0000000040b8e000 CR4=00350ee0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM01=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000
YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245
YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040
YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000