Warning: Permanently added '[localhost]:21286' (ECDSA) to the list of known hosts. 2022/09/29 03:24:48 fuzzer started 2022/09/29 03:24:48 dialing manager at localhost:45751 syzkaller login: [ 44.212729] cgroup: Unknown subsys name 'net' [ 44.328961] cgroup: Unknown subsys name 'rlimit' 2022/09/29 03:25:02 syscalls: 2215 2022/09/29 03:25:02 code coverage: enabled 2022/09/29 03:25:02 comparison tracing: enabled 2022/09/29 03:25:02 extra coverage: enabled 2022/09/29 03:25:02 setuid sandbox: enabled 2022/09/29 03:25:02 namespace sandbox: enabled 2022/09/29 03:25:02 Android sandbox: enabled 2022/09/29 03:25:02 fault injection: enabled 2022/09/29 03:25:02 leak checking: enabled 2022/09/29 03:25:02 net packet injection: enabled 2022/09/29 03:25:02 net device setup: enabled 2022/09/29 03:25:02 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/29 03:25:02 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/29 03:25:02 USB emulation: enabled 2022/09/29 03:25:02 hci packet injection: enabled 2022/09/29 03:25:02 wifi device emulation: failed to parse kernel version (6.0.0-rc7-next-20220928) 2022/09/29 03:25:02 802.15.4 emulation: enabled 2022/09/29 03:25:02 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/29 03:25:02 fetching corpus: 43, signal 21240/24778 (executing program) 2022/09/29 03:25:03 fetching corpus: 89, signal 36001/40814 (executing program) 2022/09/29 03:25:03 fetching corpus: 139, signal 47016/52925 (executing program) 2022/09/29 03:25:03 fetching corpus: 189, signal 57393/64227 (executing program) 2022/09/29 03:25:03 fetching corpus: 237, signal 62792/70561 (executing program) 2022/09/29 03:25:03 fetching corpus: 286, signal 67793/76484 (executing program) 2022/09/29 03:25:03 fetching corpus: 335, signal 70832/80504 (executing program) 2022/09/29 03:25:03 fetching corpus: 382, signal 75571/85953 (executing program) 2022/09/29 03:25:03 fetching corpus: 431, signal 77408/88731 (executing program) 2022/09/29 03:25:04 fetching corpus: 480, signal 80446/92516 (executing program) 2022/09/29 03:25:04 fetching corpus: 528, signal 82780/95635 (executing program) 2022/09/29 03:25:04 fetching corpus: 577, signal 85909/99332 (executing program) 2022/09/29 03:25:04 fetching corpus: 627, signal 87328/101590 (executing program) 2022/09/29 03:25:04 fetching corpus: 676, signal 90478/105231 (executing program) 2022/09/29 03:25:04 fetching corpus: 726, signal 91624/107188 (executing program) 2022/09/29 03:25:04 fetching corpus: 776, signal 95060/110983 (executing program) 2022/09/29 03:25:04 fetching corpus: 823, signal 97158/113578 (executing program) 2022/09/29 03:25:04 fetching corpus: 873, signal 99827/116631 (executing program) 2022/09/29 03:25:04 fetching corpus: 922, signal 101535/118862 (executing program) 2022/09/29 03:25:05 fetching corpus: 971, signal 103918/121532 (executing program) 2022/09/29 03:25:05 fetching corpus: 1021, signal 106461/124294 (executing program) 2022/09/29 03:25:05 fetching corpus: 1070, signal 107627/125983 (executing program) 2022/09/29 03:25:05 fetching corpus: 1118, signal 108792/127682 (executing program) 2022/09/29 03:25:05 fetching corpus: 1167, signal 112251/130988 (executing program) 2022/09/29 03:25:05 fetching corpus: 1214, signal 114007/132953 (executing program) 2022/09/29 03:25:05 fetching corpus: 1264, signal 115503/134697 (executing program) 2022/09/29 03:25:05 fetching corpus: 1314, signal 117704/136919 (executing program) 2022/09/29 03:25:06 fetching corpus: 1364, signal 118727/138344 (executing program) 2022/09/29 03:25:06 fetching corpus: 1414, signal 120329/140141 (executing program) 2022/09/29 03:25:06 fetching corpus: 1464, signal 121459/141557 (executing program) 2022/09/29 03:25:06 fetching corpus: 1514, signal 123169/143283 (executing program) 2022/09/29 03:25:06 fetching corpus: 1560, signal 124364/144664 (executing program) 2022/09/29 03:25:06 fetching corpus: 1610, signal 125758/146130 (executing program) 2022/09/29 03:25:06 fetching corpus: 1658, signal 127900/148046 (executing program) 2022/09/29 03:25:06 fetching corpus: 1707, signal 129072/149338 (executing program) 2022/09/29 03:25:07 fetching corpus: 1757, signal 130160/150589 (executing program) 2022/09/29 03:25:07 fetching corpus: 1806, signal 131789/152095 (executing program) 2022/09/29 03:25:07 fetching corpus: 1856, signal 132645/153166 (executing program) 2022/09/29 03:25:07 fetching corpus: 1904, signal 133925/154396 (executing program) 2022/09/29 03:25:07 fetching corpus: 1952, signal 135086/155550 (executing program) 2022/09/29 03:25:07 fetching corpus: 2002, signal 135872/156457 (executing program) 2022/09/29 03:25:07 fetching corpus: 2051, signal 137618/157860 (executing program) 2022/09/29 03:25:07 fetching corpus: 2099, signal 139208/159127 (executing program) 2022/09/29 03:25:07 fetching corpus: 2149, signal 140454/160228 (executing program) 2022/09/29 03:25:08 fetching corpus: 2198, signal 142420/161679 (executing program) 2022/09/29 03:25:08 fetching corpus: 2248, signal 143652/162712 (executing program) 2022/09/29 03:25:08 fetching corpus: 2298, signal 144915/163723 (executing program) 2022/09/29 03:25:08 fetching corpus: 2348, signal 145625/164428 (executing program) 2022/09/29 03:25:08 fetching corpus: 2398, signal 146467/165165 (executing program) 2022/09/29 03:25:08 fetching corpus: 2448, signal 147445/165999 (executing program) 2022/09/29 03:25:08 fetching corpus: 2497, signal 148762/166903 (executing program) 2022/09/29 03:25:08 fetching corpus: 2547, signal 149395/167527 (executing program) 2022/09/29 03:25:09 fetching corpus: 2597, signal 150049/168122 (executing program) 2022/09/29 03:25:09 fetching corpus: 2647, signal 150862/168786 (executing program) 2022/09/29 03:25:09 fetching corpus: 2697, signal 151543/169392 (executing program) 2022/09/29 03:25:09 fetching corpus: 2746, signal 152549/170114 (executing program) 2022/09/29 03:25:09 fetching corpus: 2794, signal 153480/170795 (executing program) 2022/09/29 03:25:09 fetching corpus: 2844, signal 154370/171386 (executing program) 2022/09/29 03:25:09 fetching corpus: 2894, signal 155331/171995 (executing program) 2022/09/29 03:25:09 fetching corpus: 2944, signal 156508/172667 (executing program) 2022/09/29 03:25:09 fetching corpus: 2994, signal 157067/173106 (executing program) 2022/09/29 03:25:09 fetching corpus: 3044, signal 157868/173602 (executing program) 2022/09/29 03:25:10 fetching corpus: 3092, signal 158683/174062 (executing program) 2022/09/29 03:25:10 fetching corpus: 3142, signal 159499/174554 (executing program) 2022/09/29 03:25:10 fetching corpus: 3191, signal 160951/175220 (executing program) 2022/09/29 03:25:10 fetching corpus: 3241, signal 161623/175623 (executing program) 2022/09/29 03:25:10 fetching corpus: 3291, signal 162447/176013 (executing program) 2022/09/29 03:25:10 fetching corpus: 3341, signal 162923/176328 (executing program) 2022/09/29 03:25:10 fetching corpus: 3391, signal 164135/176773 (executing program) 2022/09/29 03:25:10 fetching corpus: 3439, signal 165124/177139 (executing program) 2022/09/29 03:25:11 fetching corpus: 3489, signal 166209/177620 (executing program) 2022/09/29 03:25:11 fetching corpus: 3539, signal 166855/177904 (executing program) 2022/09/29 03:25:11 fetching corpus: 3589, signal 168128/178364 (executing program) 2022/09/29 03:25:11 fetching corpus: 3638, signal 168795/178579 (executing program) 2022/09/29 03:25:11 fetching corpus: 3688, signal 169580/178832 (executing program) 2022/09/29 03:25:11 fetching corpus: 3737, signal 170386/179058 (executing program) 2022/09/29 03:25:11 fetching corpus: 3787, signal 170900/179256 (executing program) 2022/09/29 03:25:12 fetching corpus: 3837, signal 171930/179499 (executing program) 2022/09/29 03:25:12 fetching corpus: 3887, signal 172383/179657 (executing program) 2022/09/29 03:25:12 fetching corpus: 3937, signal 172853/179788 (executing program) 2022/09/29 03:25:12 fetching corpus: 3987, signal 173313/179918 (executing program) 2022/09/29 03:25:12 fetching corpus: 4036, signal 174089/180075 (executing program) 2022/09/29 03:25:12 fetching corpus: 4086, signal 174727/180181 (executing program) 2022/09/29 03:25:12 fetching corpus: 4109, signal 175048/180268 (executing program) 2022/09/29 03:25:12 fetching corpus: 4109, signal 175048/180331 (executing program) 2022/09/29 03:25:12 fetching corpus: 4109, signal 175048/180395 (executing program) 2022/09/29 03:25:12 fetching corpus: 4109, signal 175048/180455 (executing program) 2022/09/29 03:25:12 fetching corpus: 4109, signal 175048/180517 (executing program) 2022/09/29 03:25:12 fetching corpus: 4109, signal 175048/180517 (executing program) 2022/09/29 03:25:12 fetching corpus: 4109, signal 175048/180517 (executing program) 2022/09/29 03:25:15 starting 8 fuzzer processes 03:25:15 executing program 0: io_setup(0x475, &(0x7f0000000000)) io_setup(0x0, 0x0) 03:25:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000580)={@dev, @empty}, &(0x7f00000005c0)=0xc) 03:25:15 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1b, &(0x7f0000000000), 0xc) 03:25:15 executing program 3: syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) 03:25:15 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @short={0x2, 0x0, 0xffff}}, 0x14) [ 70.952468] audit: type=1400 audit(1664421915.407:6): avc: denied { execmem } for pid=287 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 03:25:15 executing program 5: rt_sigpending(0x0, 0x0) 03:25:15 executing program 6: syz_genetlink_get_family_id$ieee802154(&(0x7f0000000600), 0xffffffffffffffff) 03:25:15 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) [ 72.267107] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 72.269460] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 72.271369] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 72.275131] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 72.277757] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 72.279214] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 72.284921] Bluetooth: hci0: HCI_REQ-0x0c1a [ 72.329794] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 72.331391] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 72.334008] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 72.335230] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 72.337435] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 72.338815] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 72.348148] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 72.349561] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 72.356092] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 72.357349] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 72.357465] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 72.359716] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 72.364474] Bluetooth: hci2: HCI_REQ-0x0c1a [ 72.368397] Bluetooth: hci1: HCI_REQ-0x0c1a [ 72.419148] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 72.421563] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 72.425946] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 72.427588] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 72.427863] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 72.430280] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 72.432987] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 72.433022] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 72.434355] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 72.441021] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 72.442716] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 72.444261] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 72.446829] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 72.448270] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 72.449841] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 72.451389] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 72.452786] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 72.454881] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 72.460105] Bluetooth: hci7: HCI_REQ-0x0c1a [ 72.463084] Bluetooth: hci6: HCI_REQ-0x0c1a [ 72.514623] Bluetooth: hci3: HCI_REQ-0x0c1a [ 74.357042] Bluetooth: hci0: command 0x0409 tx timeout [ 74.419619] Bluetooth: hci1: command 0x0409 tx timeout [ 74.419717] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 74.420271] Bluetooth: hci2: command 0x0409 tx timeout [ 74.423052] Bluetooth: hci5: Opcode 0x c03 failed: -110 [ 74.484567] Bluetooth: hci7: command 0x0409 tx timeout [ 74.548616] Bluetooth: hci3: command 0x0409 tx timeout [ 74.549177] Bluetooth: hci6: command 0x0409 tx timeout [ 76.404605] Bluetooth: hci0: command 0x041b tx timeout [ 76.467676] Bluetooth: hci2: command 0x041b tx timeout [ 76.468487] Bluetooth: hci1: command 0x041b tx timeout [ 76.532698] Bluetooth: hci7: command 0x041b tx timeout [ 76.596660] Bluetooth: hci6: command 0x041b tx timeout [ 76.597445] Bluetooth: hci3: command 0x041b tx timeout [ 77.718068] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 77.721192] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 77.722727] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 77.729183] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 77.735346] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 77.739682] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 77.758206] Bluetooth: hci5: HCI_REQ-0x0c1a [ 78.451740] Bluetooth: hci0: command 0x040f tx timeout [ 78.515667] Bluetooth: hci1: command 0x040f tx timeout [ 78.516441] Bluetooth: hci2: command 0x040f tx timeout [ 78.579567] Bluetooth: hci7: command 0x040f tx timeout [ 78.643647] Bluetooth: hci3: command 0x040f tx timeout [ 78.644422] Bluetooth: hci6: command 0x040f tx timeout [ 79.539571] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 79.796851] Bluetooth: hci5: command 0x0409 tx timeout [ 80.500551] Bluetooth: hci0: command 0x0419 tx timeout [ 80.564543] Bluetooth: hci2: command 0x0419 tx timeout [ 80.564996] Bluetooth: hci1: command 0x0419 tx timeout [ 80.628542] Bluetooth: hci7: command 0x0419 tx timeout [ 80.692595] Bluetooth: hci6: command 0x0419 tx timeout [ 80.693033] Bluetooth: hci3: command 0x0419 tx timeout [ 81.845084] Bluetooth: hci5: command 0x041b tx timeout [ 83.891587] Bluetooth: hci5: command 0x040f tx timeout [ 84.148545] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 85.940593] Bluetooth: hci5: command 0x0419 tx timeout [ 86.725998] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 86.728373] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 86.730347] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 86.733406] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 86.735674] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 86.737036] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 86.755570] Bluetooth: hci4: HCI_REQ-0x0c1a [ 88.819611] Bluetooth: hci4: command 0x0409 tx timeout [ 90.867564] Bluetooth: hci4: command 0x041b tx timeout [ 92.916609] Bluetooth: hci4: command 0x040f tx timeout [ 94.964555] Bluetooth: hci4: command 0x0419 tx timeout 03:26:10 executing program 4: r0 = getpid() prlimit64(r0, 0x0, 0x0, &(0x7f0000000040)) 03:26:10 executing program 4: r0 = getpid() prlimit64(r0, 0x0, 0x0, &(0x7f0000000040)) 03:26:10 executing program 4: r0 = getpid() prlimit64(r0, 0x0, 0x0, &(0x7f0000000040)) 03:26:10 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfb, 0x1}, 0xc) 03:26:10 executing program 4: r0 = getpid() prlimit64(r0, 0x0, 0x0, &(0x7f0000000040)) 03:26:10 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1b, &(0x7f0000000000), 0xc) 03:26:10 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1b, &(0x7f0000000000), 0xc) 03:26:10 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfb, 0x1}, 0xc) 03:26:16 executing program 0: syz_emit_ethernet(0x32e, &(0x7f0000000000)={@random="bd99d58573e9", @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x2f8, 0x3a, 0xff, @private2, @local, {[], @ndisc_ns={0x87, 0x0, 0x0, @rand_addr=' \x01\x00', [{0x0, 0x3, "57b3d04771900b492d6d099be51a6565f38f408a18f7b360"}, {0x0, 0x17, "6645aeee840c8050ddbe2c178fdae1cf69ae9412478d79d0c60d7a1af59bc0b7aa0cc3533d18460617841b6a324d1eb9ccd0e0aeaaa350a5dd6b3865a39256659b63512d24da4755a2991e03cc66eaf77c680f893c83942735d2c5e5ea9d676fe8cd49e4836da45c7adf15c843f651a1a176452b67be0a514b45e707d8cf2680fc7721d1f2803c76a0c092b23d1e8a7c68073e11b8ba7cbc0f0706302faf05b8958fee428406f0403a9e7f91fceb36c0dd7f2e14f444cb8a"}, {0x0, 0x19, "190671b067ef39d88ee6c687b9627c1f9bfb214392a097c6ab8c3037c41462ce5eb2603c2a0e0446944b5528325716c8d39503cdd72d8c53325179d0ce7f81de52f0352500510e071da16b4c6f2429e67164ec37983d615699b5bc72f1f7d4f531dc51660c0daa90a29fac27c1bf1406d79ceded356ab878eb6e6d4f4c7d0b12639aa31bf90cc6a2955a1e96bf63a5c14ae3756c9e1fcd51fb4b2c606896dd984296b432e5b701f0907ce6f18dcce6cc0c1fe4a46d3aacefa99977e931eb2149f4c52c101b707b233474d7"}, {0x0, 0x13, "dbb1e5498f50147514c42255261b84abcde773320435d1373386f9142444920a195205fc4745476b25c8c36fb220e7af6298f8f0edd9d49fdb21ccbe66c9b010a197274982debcad43f1c9fa67eed093544073b09985b5f9a4e6cc0662c211b756546866dfe45d678e6ea377ebd00153a61e302c397a62fe097cc8dd7e36952591647eaf1d3fc83263ba7c58e0bc64b8ed44770432a9c04364"}, {0x1, 0x15, "51ec4405ebf6af44b69f3d19af64d4a8aef9b545a106b12908f6b89bbd5519f02cc9ff96aa3a97de9a49bb1437467a7b7ab028245a232c4ea1d90a5878f770be68ac4448452c457ac05789600b8367a684b62ca8f7aa52f3f5c11d925464394002c1960cbec514cbc911df10d9fec93f2f353f02126d6a986918ade326218d057c2735f7fd6f88caf96d064cdefec2ac02f2e69cea7fb5eaa3e605de8cb3a9718851d8dd2457"}]}}}}}}, 0x0) 03:26:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='sessionid\x00') pread64(r0, 0x0, 0x0, 0x0) 03:26:16 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1b, &(0x7f0000000000), 0xc) 03:26:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000021c0)={{{@in, @in6=@local}}, {{@in=@remote}, 0x0, @in=@remote}}, 0xe8) 03:26:16 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]}) capget(&(0x7f0000000000)={0x20071026}, 0x0) 03:26:16 executing program 6: r0 = epoll_create(0x4) fcntl$lock(r0, 0x6, &(0x7f0000000240)={0x0, 0x0, 0x7fffffffffffffff, 0x8}) 03:26:16 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfb, 0x1}, 0xc) 03:26:16 executing program 3: shmctl$SHM_STAT_ANY(0x0, 0xf, &(0x7f0000000000)=""/238) shmctl$SHM_UNLOCK(0xffffffffffffffff, 0xc) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)=0x2, 0x4) shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffd000/0x3000)=nil) [ 131.892581] capability: warning: `syz-executor.7' uses deprecated v2 capabilities in a way that may be insecure 03:26:16 executing program 6: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt(r0, 0x0, 0xc9, 0x0, 0x0) 03:26:16 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount$cgroup(0x0, &(0x7f0000000840)='./file1\x00', &(0x7f0000000880), 0x0, &(0x7f0000000a00)={[{@release_agent={'release_agent', 0x3d, './file1'}}, {@release_agent={'release_agent', 0x3d, './file2'}}]}) 03:26:16 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'ip6_vti0\x00', &(0x7f0000000380)={'ip6gre0\x00', 0x0, 0x29, 0x4, 0x6, 0x1, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80, 0x20, 0x1000, 0xffffffff}}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000440)={@dev={0xfe, 0x80, '\x00', 0x33}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x10001, 0x5, 0x200, 0x0, 0x9e, 0x1000000, r1}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@remote, @ipv4={'\x00', '\xff\xff', @empty}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x6395, 0x0, 0x0, 0x0, 0x5000004}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x4}}, './file0\x00'}) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={@mcast1, @mcast1, @remote, 0x8, 0x2, 0x400, 0x100, 0x3, 0x100000}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x2100c, 0x0) 03:26:16 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]}) capget(&(0x7f0000000000)={0x20071026}, 0x0) 03:26:16 executing program 3: shmctl$SHM_STAT_ANY(0x0, 0xf, &(0x7f0000000000)=""/238) shmctl$SHM_UNLOCK(0xffffffffffffffff, 0xc) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)=0x2, 0x4) shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffd000/0x3000)=nil) 03:26:16 executing program 2: flock(0xffffffffffffffff, 0x3) [ 132.025648] audit: type=1400 audit(1664421976.480:7): avc: denied { open } for pid=3990 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 132.027172] audit: type=1400 audit(1664421976.480:8): avc: denied { kernel } for pid=3990 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 132.040993] cgroup: release_agent respecified [ 132.045410] ------------[ cut here ]------------ [ 132.045432] [ 132.045436] ====================================================== [ 132.045439] WARNING: possible circular locking dependency detected [ 132.045444] 6.0.0-rc7-next-20220928 #1 Not tainted [ 132.045451] ------------------------------------------------------ [ 132.045454] syz-executor.1/3997 is trying to acquire lock: [ 132.045461] ffffffff853faab8 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 132.045511] [ 132.045511] but task is already holding lock: [ 132.045514] ffff88800f009420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 132.045545] [ 132.045545] which lock already depends on the new lock. [ 132.045545] [ 132.045548] [ 132.045548] the existing dependency chain (in reverse order) is: [ 132.045552] [ 132.045552] -> #3 (&ctx->lock){....}-{2:2}: [ 132.045567] _raw_spin_lock+0x2a/0x40 [ 132.045580] __perf_event_task_sched_out+0x53b/0x18d0 [ 132.045594] __schedule+0xedd/0x2470 [ 132.045612] schedule+0xda/0x1b0 [ 132.045629] exit_to_user_mode_prepare+0x114/0x1a0 [ 132.045642] syscall_exit_to_user_mode+0x19/0x40 [ 132.045658] do_syscall_64+0x48/0x90 [ 132.045669] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 132.045685] [ 132.045685] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 132.045700] _raw_spin_lock_nested+0x30/0x40 [ 132.045712] raw_spin_rq_lock_nested+0x1e/0x30 [ 132.045727] task_fork_fair+0x63/0x4d0 [ 132.045747] sched_cgroup_fork+0x3d0/0x540 [ 132.045762] copy_process+0x4183/0x6e20 [ 132.045774] kernel_clone+0xe7/0x890 [ 132.045784] user_mode_thread+0xad/0xf0 [ 132.045795] rest_init+0x24/0x250 [ 132.045809] arch_call_rest_init+0xf/0x14 [ 132.045830] start_kernel+0x4c6/0x4eb [ 132.045848] secondary_startup_64_no_verify+0xe0/0xeb [ 132.045864] [ 132.045864] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 132.045878] _raw_spin_lock_irqsave+0x39/0x60 [ 132.045891] try_to_wake_up+0xab/0x1930 [ 132.045906] up+0x75/0xb0 [ 132.045923] __up_console_sem+0x6e/0x80 [ 132.045941] console_unlock+0x46a/0x590 [ 132.045959] do_con_write+0xc05/0x1d50 [ 132.045973] con_write+0x21/0x40 [ 132.045984] n_tty_write+0x4d4/0xfe0 [ 132.046000] file_tty_write.constprop.0+0x455/0x8a0 [ 132.046013] vfs_write+0x9c3/0xd90 [ 132.046034] ksys_write+0x127/0x250 [ 132.046043] do_syscall_64+0x3b/0x90 [ 132.046054] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 132.046069] [ 132.046069] -> #0 ((console_sem).lock){....}-{2:2}: [ 132.046087] __lock_acquire+0x2a02/0x5e70 [ 132.046106] lock_acquire+0x1a2/0x530 [ 132.046123] _raw_spin_lock_irqsave+0x39/0x60 [ 132.046136] down_trylock+0xe/0x70 [ 132.046155] __down_trylock_console_sem+0x3b/0xd0 [ 132.046173] vprintk_emit+0x16b/0x560 [ 132.046191] vprintk+0x84/0xa0 [ 132.046209] _printk+0xba/0xf1 [ 132.046223] report_bug.cold+0x72/0xab [ 132.046234] handle_bug+0x3c/0x70 [ 132.046244] exc_invalid_op+0x14/0x50 [ 132.046255] asm_exc_invalid_op+0x16/0x20 [ 132.046270] group_sched_out.part.0+0x2c7/0x460 [ 132.046281] ctx_sched_out+0x8f1/0xc10 [ 132.046292] __perf_event_task_sched_out+0x6d0/0x18d0 [ 132.046306] __schedule+0xedd/0x2470 [ 132.046322] schedule+0xda/0x1b0 [ 132.046339] exit_to_user_mode_prepare+0x114/0x1a0 [ 132.046350] syscall_exit_to_user_mode+0x19/0x40 [ 132.046366] do_syscall_64+0x48/0x90 [ 132.046376] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 132.046392] [ 132.046392] other info that might help us debug this: [ 132.046392] [ 132.046394] Chain exists of: [ 132.046394] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 132.046394] [ 132.046410] Possible unsafe locking scenario: [ 132.046410] [ 132.046413] CPU0 CPU1 [ 132.046415] ---- ---- [ 132.046418] lock(&ctx->lock); [ 132.046424] lock(&rq->__lock); [ 132.046431] lock(&ctx->lock); [ 132.046438] lock((console_sem).lock); [ 132.046444] [ 132.046444] *** DEADLOCK *** [ 132.046444] [ 132.046446] 2 locks held by syz-executor.1/3997: [ 132.046453] #0: ffff88806cf37d18 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 132.046487] #1: ffff88800f009420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 132.046516] [ 132.046516] stack backtrace: [ 132.046519] CPU: 1 PID: 3997 Comm: syz-executor.1 Not tainted 6.0.0-rc7-next-20220928 #1 [ 132.046533] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 132.046541] Call Trace: [ 132.046545] [ 132.046549] dump_stack_lvl+0x8b/0xb3 [ 132.046562] check_noncircular+0x263/0x2e0 [ 132.046580] ? format_decode+0x26c/0xb50 [ 132.046600] ? print_circular_bug+0x450/0x450 [ 132.046619] ? enable_ptr_key_workfn+0x20/0x20 [ 132.046640] ? format_decode+0x26c/0xb50 [ 132.046660] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 132.046680] __lock_acquire+0x2a02/0x5e70 [ 132.046704] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 132.046728] lock_acquire+0x1a2/0x530 [ 132.046747] ? down_trylock+0xe/0x70 [ 132.046768] ? lock_release+0x750/0x750 [ 132.046791] ? vprintk+0x84/0xa0 [ 132.046811] _raw_spin_lock_irqsave+0x39/0x60 [ 132.046825] ? down_trylock+0xe/0x70 [ 132.046845] down_trylock+0xe/0x70 [ 132.046864] ? vprintk+0x84/0xa0 [ 132.046883] __down_trylock_console_sem+0x3b/0xd0 [ 132.046902] vprintk_emit+0x16b/0x560 [ 132.046923] vprintk+0x84/0xa0 [ 132.046943] _printk+0xba/0xf1 [ 132.046957] ? record_print_text.cold+0x16/0x16 [ 132.046976] ? report_bug.cold+0x66/0xab [ 132.046988] ? group_sched_out.part.0+0x2c7/0x460 [ 132.047001] report_bug.cold+0x72/0xab [ 132.047014] handle_bug+0x3c/0x70 [ 132.047025] exc_invalid_op+0x14/0x50 [ 132.047037] asm_exc_invalid_op+0x16/0x20 [ 132.047053] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 132.047068] Code: 5e 41 5f e9 cb a9 ef ff e8 c6 a9 ef ff 65 8b 1d db 12 ac 7e 31 ff 89 de e8 66 a6 ef ff 85 db 0f 84 8a 00 00 00 e8 a9 a9 ef ff <0f> 0b e9 a5 fe ff ff e8 9d a9 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 132.047080] RSP: 0018:ffff88803e1cfc48 EFLAGS: 00010006 [ 132.047089] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 132.047097] RDX: ffff88803ea6b580 RSI: ffffffff815662f7 RDI: 0000000000000005 [ 132.047105] RBP: ffff88803e788000 R08: 0000000000000005 R09: 0000000000000001 [ 132.047113] R10: 0000000000000000 R11: ffffffff865b405b R12: ffff88800f009400 [ 132.047121] R13: ffff88806cf3d140 R14: ffffffff8547cf00 R15: 0000000000000002 [ 132.047133] ? group_sched_out.part.0+0x2c7/0x460 [ 132.047147] ? group_sched_out.part.0+0x2c7/0x460 [ 132.047162] ctx_sched_out+0x8f1/0xc10 [ 132.047175] __perf_event_task_sched_out+0x6d0/0x18d0 [ 132.047192] ? lock_is_held_type+0xd7/0x130 [ 132.047209] ? __perf_cgroup_move+0x160/0x160 [ 132.047223] ? set_next_entity+0x304/0x550 [ 132.047242] ? update_curr+0x267/0x740 [ 132.047263] ? lock_is_held_type+0xd7/0x130 [ 132.047280] __schedule+0xedd/0x2470 [ 132.047301] ? io_schedule_timeout+0x150/0x150 [ 132.047321] ? rcu_read_lock_sched_held+0x3e/0x80 [ 132.047344] schedule+0xda/0x1b0 [ 132.047362] exit_to_user_mode_prepare+0x114/0x1a0 [ 132.047376] syscall_exit_to_user_mode+0x19/0x40 [ 132.047392] do_syscall_64+0x48/0x90 [ 132.047404] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 132.047420] RIP: 0033:0x7f69c6d95b19 [ 132.047429] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 132.047440] RSP: 002b:00007f69c430b218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 132.047451] RAX: 0000000000000001 RBX: 00007f69c6ea8f68 RCX: 00007f69c6d95b19 [ 132.047459] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f69c6ea8f6c [ 132.047467] RBP: 00007f69c6ea8f60 R08: 000000000000000e R09: 0000000000000000 [ 132.047475] R10: 0000000000000004 R11: 0000000000000246 R12: 00007f69c6ea8f6c [ 132.047482] R13: 00007ffc395f6f4f R14: 00007f69c430b300 R15: 0000000000022000 [ 132.047496] [ 132.104835] WARNING: CPU: 1 PID: 3997 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 132.105542] Modules linked in: [ 132.105785] CPU: 1 PID: 3997 Comm: syz-executor.1 Not tainted 6.0.0-rc7-next-20220928 #1 [ 132.106387] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 132.107234] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 132.107641] Code: 5e 41 5f e9 cb a9 ef ff e8 c6 a9 ef ff 65 8b 1d db 12 ac 7e 31 ff 89 de e8 66 a6 ef ff 85 db 0f 84 8a 00 00 00 e8 a9 a9 ef ff <0f> 0b e9 a5 fe ff ff e8 9d a9 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 132.109002] RSP: 0018:ffff88803e1cfc48 EFLAGS: 00010006 [ 132.109408] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 132.109944] RDX: ffff88803ea6b580 RSI: ffffffff815662f7 RDI: 0000000000000005 [ 132.110427] RBP: ffff88803e788000 R08: 0000000000000005 R09: 0000000000000001 [ 132.110914] R10: 0000000000000000 R11: ffffffff865b405b R12: ffff88800f009400 [ 132.111395] R13: ffff88806cf3d140 R14: ffffffff8547cf00 R15: 0000000000000002 [ 132.111889] FS: 00007f69c430b700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 132.112430] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 132.112825] CR2: 00007fc393fee000 CR3: 000000002c6be000 CR4: 0000000000350ee0 [ 132.113307] Call Trace: [ 132.113483] [ 132.113642] ctx_sched_out+0x8f1/0xc10 [ 132.113909] __perf_event_task_sched_out+0x6d0/0x18d0 [ 132.114256] ? lock_is_held_type+0xd7/0x130 [ 132.114552] ? __perf_cgroup_move+0x160/0x160 [ 132.114859] ? set_next_entity+0x304/0x550 [ 132.115151] ? update_curr+0x267/0x740 [ 132.115425] ? lock_is_held_type+0xd7/0x130 [ 132.115726] __schedule+0xedd/0x2470 [ 132.115991] ? io_schedule_timeout+0x150/0x150 [ 132.116306] ? rcu_read_lock_sched_held+0x3e/0x80 [ 132.116644] schedule+0xda/0x1b0 [ 132.116884] exit_to_user_mode_prepare+0x114/0x1a0 [ 132.117215] syscall_exit_to_user_mode+0x19/0x40 [ 132.117539] do_syscall_64+0x48/0x90 [ 132.117794] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 132.118145] RIP: 0033:0x7f69c6d95b19 [ 132.118404] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 132.119588] RSP: 002b:00007f69c430b218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 132.120097] RAX: 0000000000000001 RBX: 00007f69c6ea8f68 RCX: 00007f69c6d95b19 [ 132.120569] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f69c6ea8f6c [ 132.121041] RBP: 00007f69c6ea8f60 R08: 000000000000000e R09: 0000000000000000 [ 132.121508] R10: 0000000000000004 R11: 0000000000000246 R12: 00007f69c6ea8f6c [ 132.121979] R13: 00007ffc395f6f4f R14: 00007f69c430b300 R15: 0000000000022000 [ 132.122454] [ 132.122618] irq event stamp: 878 [ 132.122844] hardirqs last enabled at (877): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 132.123460] hardirqs last disabled at (878): [] __schedule+0x1225/0x2470 [ 132.124073] softirqs last enabled at (546): [] __irq_exit_rcu+0x11b/0x180 [ 132.124743] softirqs last disabled at (535): [] __irq_exit_rcu+0x11b/0x180 [ 132.125403] ---[ end trace 0000000000000000 ]--- [ 132.281507] hrtimer: interrupt took 20268 ns [ 132.446412] loop1: detected capacity change from 0 to 256 [ 132.721842] loop1: detected capacity change from 0 to 256 03:26:17 executing program 0: syz_io_uring_setup(0xcc, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x1, &(0x7f0000000500)=[{&(0x7f0000000440)="c6", 0x1}], 0x0, &(0x7f0000000540)={[{@mpol={'mpol', 0x3d, {'interleave', '=relative'}}}]}) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f00000008c0)={0x14}, 0x14}}, 0x0) setxattr$system_posix_acl(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 03:26:17 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000003140), 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000003180)) 03:26:17 executing program 3: shmctl$SHM_STAT_ANY(0x0, 0xf, &(0x7f0000000000)=""/238) shmctl$SHM_UNLOCK(0xffffffffffffffff, 0xc) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)=0x2, 0x4) shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffd000/0x3000)=nil) 03:26:17 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfb, 0x1}, 0xc) 03:26:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x24e1, 0x0) ioctl$EXT4_IOC_GETSTATE(r0, 0x40086607, &(0x7f0000002000)) 03:26:17 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'ip6_vti0\x00', &(0x7f0000000380)={'ip6gre0\x00', 0x0, 0x29, 0x4, 0x6, 0x1, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80, 0x20, 0x1000, 0xffffffff}}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000440)={@dev={0xfe, 0x80, '\x00', 0x33}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x10001, 0x5, 0x200, 0x0, 0x9e, 0x1000000, r1}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@remote, @ipv4={'\x00', '\xff\xff', @empty}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x6395, 0x0, 0x0, 0x0, 0x5000004}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x4}}, './file0\x00'}) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={@mcast1, @mcast1, @remote, 0x8, 0x2, 0x400, 0x100, 0x3, 0x100000}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x2100c, 0x0) 03:26:17 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]}) capget(&(0x7f0000000000)={0x20071026}, 0x0) 03:26:17 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@getsa={0x3c, 0x12, 0x1, 0x0, 0x0, {@in=@multicast1, 0x0, 0xa}, [@srcaddr={0x14, 0xd, @in=@loopback}]}, 0x3c}}, 0x0) [ 132.840457] tmpfs: Bad value for 'mpol' 03:26:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x24e1, 0x0) ioctl$EXT4_IOC_GETSTATE(r0, 0x40086607, &(0x7f0000002000)) [ 132.872300] tmpfs: Bad value for 'mpol' [ 132.896479] loop1: detected capacity change from 0 to 256 03:26:17 executing program 3: shmctl$SHM_STAT_ANY(0x0, 0xf, &(0x7f0000000000)=""/238) shmctl$SHM_UNLOCK(0xffffffffffffffff, 0xc) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)=0x2, 0x4) shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffd000/0x3000)=nil) 03:26:17 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'ip6_vti0\x00', &(0x7f0000000380)={'ip6gre0\x00', 0x0, 0x29, 0x4, 0x6, 0x1, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80, 0x20, 0x1000, 0xffffffff}}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000440)={@dev={0xfe, 0x80, '\x00', 0x33}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x10001, 0x5, 0x200, 0x0, 0x9e, 0x1000000, r1}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@remote, @ipv4={'\x00', '\xff\xff', @empty}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x6395, 0x0, 0x0, 0x0, 0x5000004}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x4}}, './file0\x00'}) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={@mcast1, @mcast1, @remote, 0x8, 0x2, 0x400, 0x100, 0x3, 0x100000}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x2100c, 0x0) 03:26:17 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]}) capget(&(0x7f0000000000)={0x20071026}, 0x0) 03:26:17 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000003140), 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000003180)) 03:26:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x24e1, 0x0) ioctl$EXT4_IOC_GETSTATE(r0, 0x40086607, &(0x7f0000002000)) 03:26:17 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @val={0x3a, [0x30]}}}}]}) mknodat$loop(r0, &(0x7f0000000180)='./file1\x00', 0x0, 0x1) 03:26:17 executing program 0: syz_io_uring_setup(0xcc, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x1, &(0x7f0000000500)=[{&(0x7f0000000440)="c6", 0x1}], 0x0, &(0x7f0000000540)={[{@mpol={'mpol', 0x3d, {'interleave', '=relative'}}}]}) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f00000008c0)={0x14}, 0x14}}, 0x0) setxattr$system_posix_acl(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 03:26:17 executing program 5: execveat(0xffffffffffffff9c, &(0x7f0000004180)='./file0\x00', 0x0, 0x0, 0x0) [ 133.048522] process 'syz-executor.5' launched './file0' with NULL argv: empty string added [ 133.122027] tmpfs: Bad value for 'mpol' 03:26:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000014a00)) 03:26:17 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @val={0x3a, [0x30]}}}}]}) mknodat$loop(r0, &(0x7f0000000180)='./file1\x00', 0x0, 0x1) 03:26:17 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000003140), 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000003180)) 03:26:17 executing program 0: syz_io_uring_setup(0xcc, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x1, &(0x7f0000000500)=[{&(0x7f0000000440)="c6", 0x1}], 0x0, &(0x7f0000000540)={[{@mpol={'mpol', 0x3d, {'interleave', '=relative'}}}]}) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f00000008c0)={0x14}, 0x14}}, 0x0) setxattr$system_posix_acl(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 03:26:17 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'ip6_vti0\x00', &(0x7f0000000380)={'ip6gre0\x00', 0x0, 0x29, 0x4, 0x6, 0x1, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80, 0x20, 0x1000, 0xffffffff}}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000440)={@dev={0xfe, 0x80, '\x00', 0x33}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x10001, 0x5, 0x200, 0x0, 0x9e, 0x1000000, r1}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@remote, @ipv4={'\x00', '\xff\xff', @empty}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x6395, 0x0, 0x0, 0x0, 0x5000004}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x4}}, './file0\x00'}) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={@mcast1, @mcast1, @remote, 0x8, 0x2, 0x400, 0x100, 0x3, 0x100000}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x2100c, 0x0) 03:26:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x24e1, 0x0) ioctl$EXT4_IOC_GETSTATE(r0, 0x40086607, &(0x7f0000002000)) [ 133.181997] loop5: detected capacity change from 0 to 4096 [ 133.244690] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. [ 133.251793] loop1: detected capacity change from 0 to 256 [ 133.253425] tmpfs: Bad value for 'mpol' [ 133.306601] EXT4-fs (loop5): unmounting filesystem. 03:26:17 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @val={0x3a, [0x30]}}}}]}) mknodat$loop(r0, &(0x7f0000000180)='./file1\x00', 0x0, 0x1) 03:26:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000014a00)) 03:26:17 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000003140), 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000003180)) 03:26:17 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = inotify_init() fcntl$setstatus(r1, 0x4, 0x2800) close_range(r0, 0xffffffffffffffff, 0x0) 03:26:17 executing program 7: timer_create(0x0, 0x0, 0x0) 03:26:17 executing program 0: syz_io_uring_setup(0xcc, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x1, &(0x7f0000000500)=[{&(0x7f0000000440)="c6", 0x1}], 0x0, &(0x7f0000000540)={[{@mpol={'mpol', 0x3d, {'interleave', '=relative'}}}]}) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f00000008c0)={0x14}, 0x14}}, 0x0) setxattr$system_posix_acl(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) [ 133.373267] loop5: detected capacity change from 0 to 4096 [ 133.389102] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. 03:26:17 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0xc1000100) creat(&(0x7f0000000a80)='./file0/file0\x00', 0x0) [ 133.413988] tmpfs: Bad value for 'mpol' 03:26:17 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @val={0x3a, [0x30]}}}}]}) mknodat$loop(r0, &(0x7f0000000180)='./file1\x00', 0x0, 0x1) [ 133.449778] EXT4-fs (loop5): unmounting filesystem. 03:26:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x4, 0x0, 0x0) 03:26:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000014a00)) [ 133.478092] loop5: detected capacity change from 0 to 4096 [ 133.492117] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. 03:26:17 executing program 7: openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='net_cls.classid\x00', 0x2, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000380)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) 03:26:17 executing program 0: r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/186, 0xba}, {&(0x7f0000000140)=""/198, 0xc6}, {&(0x7f0000000240)=""/168, 0xa8}, {&(0x7f0000000300)=""/61, 0x3d}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000000880)=[{&(0x7f0000000580)=""/49, 0x31}, {&(0x7f00000005c0)=""/157, 0x9d}], 0x2, 0x0) 03:26:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x4, 0x0, 0x0) 03:26:17 executing program 1: pipe2$9p(&(0x7f0000000140), 0x0) 03:26:17 executing program 6: openat$sr(0xffffffffffffff9c, &(0x7f0000003200), 0x88840, 0x0) 03:26:17 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x4, 0x0, 0x0) 03:26:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000014a00)) 03:26:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_PMKSA(r0, &(0x7f0000001240)={&(0x7f00000010c0), 0xc, &(0x7f0000001200)={&(0x7f0000001180)={0x50, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_PMK={0x14, 0xfe, "1d6d25b827167cfaede614af27e7c15c"}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x20}]}, 0x50}}, 0x0) 03:26:18 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000003c0)=""/123) 03:26:18 executing program 2: write$rfkill(0xffffffffffffffff, 0x0, 0x0) [ 133.618770] EXT4-fs (loop5): unmounting filesystem. [ 133.656144] loop5: detected capacity change from 0 to 4096 [ 133.669554] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. [ 133.701304] EXT4-fs (loop5): unmounting filesystem. 03:26:18 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:18 executing program 6: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf470, 0x6, @perf_config_ext={0x9, 0x4}, 0x40021, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1be2f630}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) clone3(&(0x7f0000000480)={0x100008100, &(0x7f0000000040), &(0x7f0000000100), 0x0, {0x3}, &(0x7f00000003c0)=""/147, 0x93, &(0x7f0000000240)=""/28, &(0x7f0000000300)=[r0, 0x0, r2], 0x3}, 0x58) 03:26:18 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$TIOCGETD(r0, 0x80045432, &(0x7f0000000440)) 03:26:18 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x4, 0x0, 0x0) 03:26:18 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:18 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:18 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:18 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:18 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:18 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:18 executing program 6: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf470, 0x6, @perf_config_ext={0x9, 0x4}, 0x40021, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1be2f630}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) clone3(&(0x7f0000000480)={0x100008100, &(0x7f0000000040), &(0x7f0000000100), 0x0, {0x3}, &(0x7f00000003c0)=""/147, 0x93, &(0x7f0000000240)=""/28, &(0x7f0000000300)=[r0, 0x0, r2], 0x3}, 0x58) 03:26:18 executing program 6: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf470, 0x6, @perf_config_ext={0x9, 0x4}, 0x40021, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1be2f630}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) clone3(&(0x7f0000000480)={0x100008100, &(0x7f0000000040), &(0x7f0000000100), 0x0, {0x3}, &(0x7f00000003c0)=""/147, 0x93, &(0x7f0000000240)=""/28, &(0x7f0000000300)=[r0, 0x0, r2], 0x3}, 0x58) 03:26:18 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:18 executing program 5: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:18 executing program 6: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf470, 0x6, @perf_config_ext={0x9, 0x4}, 0x40021, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1be2f630}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) clone3(&(0x7f0000000480)={0x100008100, &(0x7f0000000040), &(0x7f0000000100), 0x0, {0x3}, &(0x7f00000003c0)=""/147, 0x93, &(0x7f0000000240)=""/28, &(0x7f0000000300)=[r0, 0x0, r2], 0x3}, 0x58) 03:26:18 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:18 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:18 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:18 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:18 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) [ 134.556384] syz-executor.7 (4125) used greatest stack depth: 24472 bytes left 03:26:19 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:19 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:19 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:19 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:19 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:19 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:19 executing program 5: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:19 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:19 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:19 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:19 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000001c0)) 03:26:19 executing program 5: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:19 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:19 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:19 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:19 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:19 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000001c0)) 03:26:19 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:19 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:19 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000001c0)) 03:26:19 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000001c0)) 03:26:19 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000001c0)) 03:26:20 executing program 6: syz_emit_ethernet(0x1a, &(0x7f0000000180)={@multicast, @multicast, @val={@val={0x8100}}, {@llc={0x8100, {@llc={0x0, 0x0, '\x00\x00'}}}}}, 0x0) 03:26:20 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000040)=""/32, 0x20}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000380)=""/197, 0xc5}], 0x6, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}, 0x12001) sendfile(0xffffffffffffffff, r1, &(0x7f0000000800)=0x6, 0x0) syz_open_procfs(r0, &(0x7f0000000600)='attr/fscreate\x00') syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = epoll_create(0x7fffffff) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)) r5 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000040)={0x8}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000780)=0xffff) fsetxattr$security_capability(r5, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x0, 0x100}, {0x9, 0x200}]}, 0x14, 0x2) r6 = inotify_init1(0x0) dup2(r6, r2) 03:26:20 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000001c0)) 03:26:20 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000001c0)) [ 135.615126] Bluetooth: hci0: HCI_REQ-0x080f [ 135.617707] loop1: detected capacity change from 0 to 40 03:26:20 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) 03:26:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="00000000000000005e4d57d9cf66696c"]) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r1, 0xa015000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x11, 0x0, 0x0) write$binfmt_aout(r3, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d97aa1", 0xe}, {&(0x7f0000000100)="9f", 0x1}, {&(0x7f00000002c0)='^', 0x1}], 0x3, 0x0, 0x0, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f00000001c0)) sendfile(r3, r0, 0x0, 0xfffffdef) 03:26:20 executing program 7: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$usbmon(r0, 0x0, 0x0) 03:26:20 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e1, &(0x7f00000002c0)) 03:26:20 executing program 7: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$usbmon(r0, 0x0, 0x0) 03:26:20 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) 03:26:20 executing program 6: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) 03:26:20 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) 03:26:20 executing program 7: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$usbmon(r0, 0x0, 0x0) 03:26:20 executing program 6: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) [ 135.739292] syz-executor.1: attempt to access beyond end of device [ 135.739292] loop1: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 135.740651] Buffer I/O error on dev loop1, logical block 10, lost async page write 03:26:20 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) 03:26:20 executing program 7: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$usbmon(r0, 0x0, 0x0) 03:26:20 executing program 6: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) 03:26:20 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000580)) 03:26:20 executing program 0: r0 = fsopen(&(0x7f0000000040)='selinuxfs\x00', 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 03:26:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="00000000000000005e4d57d9cf66696c"]) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r1, 0xa015000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x11, 0x0, 0x0) write$binfmt_aout(r3, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d97aa1", 0xe}, {&(0x7f0000000100)="9f", 0x1}, {&(0x7f00000002c0)='^', 0x1}], 0x3, 0x0, 0x0, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f00000001c0)) sendfile(r3, r0, 0x0, 0xfffffdef) 03:26:20 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e1, &(0x7f00000002c0)) 03:26:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="00000000000000005e4d57d9cf66696c"]) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r1, 0xa015000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x11, 0x0, 0x0) write$binfmt_aout(r3, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d97aa1", 0xe}, {&(0x7f0000000100)="9f", 0x1}, {&(0x7f00000002c0)='^', 0x1}], 0x3, 0x0, 0x0, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f00000001c0)) sendfile(r3, r0, 0x0, 0xfffffdef) [ 136.524158] loop4: detected capacity change from 0 to 40 [ 136.533803] loop1: detected capacity change from 0 to 40 03:26:21 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="00000000000000005e4d57d9cf66696c"]) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r1, 0xa015000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x11, 0x0, 0x0) write$binfmt_aout(r3, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d97aa1", 0xe}, {&(0x7f0000000100)="9f", 0x1}, {&(0x7f00000002c0)='^', 0x1}], 0x3, 0x0, 0x0, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f00000001c0)) sendfile(r3, r0, 0x0, 0xfffffdef) 03:26:21 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="00000000000000005e4d57d9cf66696c"]) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r1, 0xa015000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x11, 0x0, 0x0) write$binfmt_aout(r3, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d97aa1", 0xe}, {&(0x7f0000000100)="9f", 0x1}, {&(0x7f00000002c0)='^', 0x1}], 0x3, 0x0, 0x0, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f00000001c0)) sendfile(r3, r0, 0x0, 0xfffffdef) [ 136.579011] Bluetooth: hci0: HCI_REQ-0x080f 03:26:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="00000000000000005e4d57d9cf66696c"]) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r1, 0xa015000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x11, 0x0, 0x0) write$binfmt_aout(r3, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0 VM DIAGNOSIS: 03:26:16 Registers: info registers vcpu 0 RAX=0000000000019cf4 RBX=ffff88806cf3d460 RCX=ffffc9000700f000 RDX=0000000000040000 RSI=ffffffff813bbb37 RDI=0000000000000005 RBP=0000000000000001 RSP=ffff88803ea07818 R8 =0000000000000005 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=0000000000000003 R13=ffffed100d9e7a8d R14=ffff88806cf3d468 R15=0000000000000001 RIP=ffffffff813bbb39 RFL=00000216 [----AP-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fb53b5d5700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fb53e173018 CR3=000000003da06000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007fb53e1467c0 00007fb53e1467c8 YMM02=0000000000000000 0000000000000000 00007fb53e1467e0 00007fb53e1467c0 YMM03=0000000000000000 0000000000000000 00007fb53e1467c8 00007fb53e1467c0 YMM04=0000000000000000 0000000000000000 ff00000000000000 0000000000000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000034 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff823ba131 RDI=ffffffff8765a980 RBP=ffffffff8765a940 RSP=ffff88803e1cf690 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000034 R11=0000000000000001 R12=0000000000000034 R13=ffffffff8765a940 R14=0000000000000010 R15=ffffffff823ba120 RIP=ffffffff823ba189 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f69c430b700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fc393fee000 CR3=000000002c6be000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f69c6e7c7c0 00007f69c6e7c7c8 YMM02=0000000000000000 0000000000000000 00007f69c6e7c7e0 00007f69c6e7c7c0 YMM03=0000000000000000 0000000000000000 00007f69c6e7c7c8 00007f69c6e7c7c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000