Warning: Permanently added '[localhost]:7660' (ECDSA) to the list of known hosts. 2022/10/03 10:17:21 fuzzer started 2022/10/03 10:17:21 dialing manager at localhost:35095 syzkaller login: [ 44.549869] cgroup: Unknown subsys name 'net' [ 44.685834] cgroup: Unknown subsys name 'rlimit' 2022/10/03 10:17:37 syscalls: 206 2022/10/03 10:17:37 code coverage: enabled 2022/10/03 10:17:37 comparison tracing: enabled 2022/10/03 10:17:37 extra coverage: enabled 2022/10/03 10:17:37 setuid sandbox: enabled 2022/10/03 10:17:37 namespace sandbox: enabled 2022/10/03 10:17:37 Android sandbox: enabled 2022/10/03 10:17:37 fault injection: enabled 2022/10/03 10:17:37 leak checking: enabled 2022/10/03 10:17:37 net packet injection: enabled 2022/10/03 10:17:37 net device setup: enabled 2022/10/03 10:17:37 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/10/03 10:17:37 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/10/03 10:17:37 USB emulation: enabled 2022/10/03 10:17:37 hci packet injection: enabled 2022/10/03 10:17:37 wifi device emulation: failed to parse kernel version (6.0.0-rc7-next-20220930) 2022/10/03 10:17:37 802.15.4 emulation: enabled 2022/10/03 10:17:37 fetching corpus: 0, signal 0/0 (executing program) 2022/10/03 10:17:39 starting 8 fuzzer processes 10:17:39 executing program 0: setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)={0x8, "e3c5e2"}, 0x6) r0 = fsopen(&(0x7f0000000040)='cgroup\x00', 0x8d07077d4dd54d41) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x125180, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, 0x0, 0x800, 0x70bd29, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x6, @link='syz0\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x810}, 0x20000008) r3 = accept4$unix(r2, 0x0, &(0x7f0000000240), 0x800) newfstatat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) mount$cgroup2(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x400, &(0x7f00000003c0)={[{@subsystem='cpu'}, {@memory_recursiveprot}, {@subsystem='pids'}, {@subsystem='hugetlb'}, {}, {@memory_localevents}, {@memory_recursiveprot}, {@memory_recursiveprot}], [{@dont_appraise}, {@obj_role={'obj_role', 0x3d, '!'}}, {@euid_eq={'euid', 0x3d, r4}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'cgroup\x00'}}, {@euid_lt}, {@appraise}, {@subj_user={'subj_user', 0x3d, '\''}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\'}[*'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x34, 0x31, 0x64, 0x32, 0x3d9af854c7cdb0c2, 0x57, 0x64], 0x2d, [0x35, 0x39, 0x36, 0x66], 0x2d, [0x61, 0x31, 0x38, 0x31], 0x2d, [0x32, 0x32, 0x35, 0x36], 0x2d, [0x64, 0x61, 0x64, 0x30, 0x36, 0x38, 0x38, 0x63]}}}]}) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x68, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x196, @media='udp\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40800}, 0x4004000) ptrace$setregs(0xd, 0x0, 0x50, &(0x7f0000000640)="7ff032286d7cb70dc4687c2cb7940b61a91a7a7d2ac1bafcf00b1ddad49e3668e779fdb5c321a7d2649e6ed0467be863cf05eb0af6617c3d27553bcde3d92af8de2e613b9a17f00624f8531eaf0621b4d215b68d170f77f52fa5b77ccf6630353e4a487818ca16802ddbf34456d580b910b88dc8b8122b814fef2a3c9225465f4ce86f31a2d82d490e9d51f98ce8359428eb") sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x7c, 0x0, 0x100, 0x70bd25, 0x25dfdbff, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'hsr0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'team0\x00'}]}, 0x7c}}, 0x4000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000840)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r5, 0xc0189379, &(0x7f0000000880)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) lsetxattr$security_capability(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900), &(0x7f0000000940)=@v1={0x1000000, [{0x80, 0x5}]}, 0xc, 0x3) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x1c, 0x0, 0x8, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a80), r5) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) r8 = syz_genetlink_get_family_id$smc(&(0x7f0000000b40), r5) sendmsg$SMC_PNETID_GET(r7, &(0x7f0000000c40)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000c00)={&(0x7f0000000b80)={0x48, r8, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x40080}, 0x40800) 10:17:39 executing program 1: ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8001, 0x1}}, './file0\x00'}) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) r1 = gettid() syz_open_procfs$namespace(r1, &(0x7f0000000040)='ns/ipc\x00') ptrace$peeksig(0x4209, r1, &(0x7f0000000080)={0x7ff, 0x0, 0x1}, &(0x7f00000000c0)=[{}]) ioctl$HIDIOCGRDESC(r0, 0x90044802, &(0x7f0000000140)={0x19, "d477f42664344f7d3bb8d47f61601055e8383704671c6b1454"}) getpriority(0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x10900, 0x88) recvmsg$unix(r2, &(0x7f0000000480)={&(0x7f00000001c0), 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/25, 0x19}, {&(0x7f0000000280)=""/46, 0x2e}], 0x2, &(0x7f0000000300)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x150}, 0x2041) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r6, 0xc0189379, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r8 = memfd_secret(0x80000) accept$unix(r8, 0x0, &(0x7f0000000500)) ioctl$NS_GET_NSTYPE(r3, 0xb703, 0x0) r9 = syz_genetlink_get_family_id$smc(&(0x7f0000000580), r4) sendmsg$SMC_PNETID_DEL(r5, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x34, r9, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) getuid() r10 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0), r2) sendmsg$TIPC_CMD_SET_NETID(r7, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r10, 0x5597dd26b7b66778, 0x70bd27, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x200}}, ["", "", "", ""]}, 0x24}}, 0x4000080) 10:17:39 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000240)='htcp\x00', 0x5) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000280)=0x7f, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0}) r1 = inotify_init1(0x40800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000340)={r0, 0x2, r1, 0x8001}) r2 = memfd_secret(0x80000) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000380)={{0x1, 0x1, 0x18, r2, {0x100, 0x10000000}}, './file0\x00'}) ioctl$sock_bt_hci(r3, 0x2002247a, &(0x7f00000003c0)="f97cfacb0a11a31519e7b55d887f5d15f603e0d2e3eb2ac027d5d0b0170ec9012d43c68983e3f4c8806c76d661da13d9d5db6af5f4050fe24907a61dcb74969fca85fcf37b5359adcc3c9d1a") ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000440)=0x4) ioctl$AUTOFS_DEV_IOCTL_VERSION(r3, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18}, './file1\x00'}) r4 = socket(0x29, 0x0, 0x5) recvmsg$unix(r2, &(0x7f0000001b80)={&(0x7f00000007c0), 0x6e, &(0x7f00000019c0)=[{&(0x7f0000000840)=""/24, 0x18}, {&(0x7f0000000880)=""/153, 0x99}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/114, 0x72}], 0x4, &(0x7f0000001a00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x158}, 0x120) sendmsg$unix(r4, &(0x7f0000001c00)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000540)="71aa618f1066790b9ca7541b4637fb294ba0770f11958bd3265df874beb7943d8fdd18d4dacc7eb8de52b3da7ea083d35b56c0074821544b4062191ca72b2c5d128f2db5df59ad4df7d10cbc0735db772779866453b28081a22a8f8826a107bdb4f9d868ff331ac455c393d117e3b894a95cad256fcacacb2fd1129cf44944cf07f2d84aae0feac5cbfce71180f01d748d1c1d6d441b01b610a382493dfb77d2d60b37f2656d04218aeda7b3ad916b23ea5fab46ece2dc0edac8f260a30565b5b9cc4f6a", 0xc4}, {&(0x7f0000000640)="ffc85f3b71943fe3526e3145dfe0cdda0ae4c9507ec01b97275e9599527c6338cc1341d439012c2122c79d3fac444f27f9a9fce36dc0235bc09c02b4f8c4c4e331de9353c853cf9e1635a10b75f07d6d289856404d", 0x55}, {&(0x7f00000006c0)="63014dee3bbcf8e3a506f749b91216cc2916b6d52a8a92b5e9200aeb849b675a3f789c82b288899349f5b8d5913aca2423276479db9d58d7b832e923de7bb69b5a85669bcb5076d1db7ff81e5dead29da52924b091ff8889b0985e7fa982d52ca2f47cd32fe42b9f8f3266e60045a27a74947f36ecbb4fb45361dd7aa4a86a2cffb129731cfc054eb7579c18931bfe1490c843366ba4322156849e4617acc27685", 0xa1}], 0x3, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}], 0x20, 0x80}, 0x40000) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000001d00)={&(0x7f0000001c40)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001cc0)={&(0x7f0000001c80)={0x30, 0x0, 0x100, 0x70bd26, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x0, 0x0, 0x81, 0x8}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000011}, 0x8040) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNSETLINK(r6, 0x400454cd, 0x301) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000001d40)={{0x1, 0x1, 0x18, r5, {0x9}}, '.\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f0000001d80)={r0, 0x1, 0xffffffffffffffff, 0xfffffffd}) 10:17:39 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000850) syz_genetlink_get_family_id$SEG6(&(0x7f0000000180), 0xffffffffffffffff) read$hidraw(0xffffffffffffffff, &(0x7f00000001c0)=""/177, 0xb1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000000280)=""/136, 0x88}, {&(0x7f0000000340)=""/58, 0x3a}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x3, &(0x7f00000013c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}, 0x40) sendmsg$SMC_PNETID_GET(r6, &(0x7f0000001540)={0xfffffffffffffffe, 0x0, &(0x7f0000001500)={&(0x7f0000001480)={0x60, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'nr0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv_slave_1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x60}}, 0x10) r10 = syz_genetlink_get_family_id$smc(&(0x7f00000015c0), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r6, &(0x7f00000016c0)={&(0x7f0000001580), 0xc, &(0x7f0000001680)={&(0x7f0000001600)={0x4c, r10, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000) r11 = syz_genetlink_get_family_id$smc(&(0x7f0000001740), r9) sendmsg$SMC_PNETID_DEL(r4, &(0x7f0000001800)={&(0x7f0000001700), 0xc, &(0x7f00000017c0)={&(0x7f0000001780)={0x20, r11, 0x400, 0x70bd26, 0x25dfdbff, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040004}, 0x4000) sendmsg$TIPC_CMD_GET_LINKS(r6, &(0x7f0000001900)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000018c0)={&(0x7f0000001880)={0x24, r0, 0x100, 0x70bd2b, 0x25dfdbfb, {{}, {}, {0x8, 0x11, 0x81}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0xb101409338bc67e5}, 0x4000000) r12 = syz_genetlink_get_family_id$tipc(&(0x7f0000001980), r6) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000001a40)={&(0x7f0000001940)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001a00)={&(0x7f00000019c0)={0x1c, r12, 0xa08, 0x70bd28, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) clock_getres(0x1, &(0x7f0000001a80)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000001b00)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) syz_genetlink_get_family_id$gtp(&(0x7f0000001ac0), r13) r14 = syz_genetlink_get_family_id$tipc(&(0x7f0000001b80), r6) sendmsg$TIPC_CMD_SHOW_PORTS(r8, &(0x7f0000001c40)={&(0x7f0000001b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001c00)={&(0x7f0000001bc0)={0x1c, r14, 0x8, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x5) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r7, &(0x7f0000001c80)={r8, 0xffffffffffffffff, 0x3f}) 10:17:39 executing program 4: ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x400}}, '.\x00'}) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040)={0x5, "bc7f48"}, 0x6) r1 = io_uring_setup(0x3c02, &(0x7f0000000080)={0x0, 0x77af, 0x0, 0x1, 0x166, 0x0, r0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x5, 0x1d0}}, './file0\x00'}) accept4$unix(r0, &(0x7f0000000140), &(0x7f00000001c0)=0x6e, 0x0) mknodat$loop(r2, &(0x7f0000000200)='./file0\x00', 0x100, 0x1) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {r3}}, './file0\x00'}) sendmsg$TIPC_CMD_SET_LINK_TOL(r5, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x68, 0x0, 0x200, 0x70bd2d, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0x1, @link='syz0\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4008005}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000054}, 0x40000c4) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x4000010, r5, 0x10000000) syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) io_uring_setup(0x131a, &(0x7f0000000940)={0x0, 0x6a03, 0x8, 0x1, 0x16c, 0x0, r7}) syz_genetlink_get_family_id$smc(&(0x7f00000009c0), r4) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x24, 0x0, 0x8, 0x70bd2a, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x1}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24000001}, 0x44000) [ 61.183664] audit: type=1400 audit(1664792259.218:6): avc: denied { execmem } for pid=286 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 10:17:39 executing program 6: r0 = memfd_secret(0x80000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x0, 0x400, 0x70bd27, 0x25dfdbff, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r3 = gettid() sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x48, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {{}, {@void, @void, @val={0xc, 0x99, {0xff, 0x75}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x7b}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x73}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r0}, @NL80211_ATTR_PID={0x8, 0x52, r3}]}, 0x48}}, 0x44000) ptrace$setregs(0xf, 0x0, 0x5, &(0x7f00000003c0)="bdd67d59efde8cf926ccf0b712fbd0577bc1c988990bf6a06795764c0463d0ea41a21b9a7335a7b330e53feed0cae6") r4 = gettid() rt_sigqueueinfo(r4, 0x12, &(0x7f0000000400)={0x27, 0x6, 0x6}) r5 = socket(0x1a, 0x800, 0x2) sendmsg$SMC_PNETID_ADD(r5, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x48, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x2000000) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x8080}, 0x4000000) sched_rr_get_interval(r3, &(0x7f00000006c0)) lgetxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)=@known='system.sockprotoname\x00', &(0x7f0000000780)=""/153, 0x99) r6 = getuid() recvmsg$unix(r2, &(0x7f0000000ac0)={&(0x7f0000000880)=@abs, 0x6e, &(0x7f0000000980)=[{&(0x7f0000000900)=""/66, 0x42}], 0x1, &(0x7f00000009c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xd8}, 0x40002000) chown(&(0x7f0000000840)='./file0\x00', r6, r7) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000b00)=0x2, 0x4) ioctl$NS_GET_USERNS(r8, 0xb701, 0x0) 10:17:39 executing program 7: fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000000)=']!\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xff, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="1a574815b6185e042d60d885c18d7a134bb837a114917738f256e017f706ecc8bd051a9e88b2a77ce12138806e4a1f45c91f8e62cad166bc2051b5c89328", 0x3e, 0xfffffffffffffffe}], 0x1008002, &(0x7f0000000180)={[{@utf8no}, {@shortname_win95}, {@shortname_lower}, {@rodir}, {@nonumtail}, {@numtail}, {@shortname_win95}], [{@pcr}, {@measure}, {@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x30, 0x61, 0x63, 0x64, 0x34, 0x65, 0x34], 0x2d, [0x62, 0x36, 0x31, 0x63], 0x2d, [0x35, 0x36, 0x63, 0x31], 0x2d, [0x62, 0x15359d50cc9df773, 0x34, 0x57], 0x2d, [0x5c, 0x32, 0x66, 0x36, 0x66, 0x64, 0x35, 0x35]}}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfshat={'smackfshat', 0x3d, ']!\x00'}}, {@appraise_type}, {@subj_type}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000002c0)=0x80, 0x2) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) write$hidraw(r3, &(0x7f0000000340)="39b0a85c1fe20c732238c7bf17723a5aafb211ab9ac530e9d3", 0x19) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0), r2) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x84, r4, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x2}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x3, 0x8, 0x6]}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x39}}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}]}, 0x84}, 0x1, 0x0, 0x0, 0x800}, 0x8010) r5 = ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r5) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, r0, {0x6}}, './file1\x00'}) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r0, &(0x7f0000000580)={0x80000000}) socketpair(0x11, 0x2, 0x1f, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$TIPC_CMD_SET_NODE_ADDR(r7, &(0x7f0000000640)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0}, 0xc0080) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000680)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r8, 0xc0189371, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) r9 = syz_mount_image$vfat(&(0x7f0000000700), &(0x7f0000000740)='./file1\x00', 0x2, 0x6, &(0x7f0000000b00)=[{&(0x7f0000000780)="3af73b17b2f40e227f8c4aaf1db8d70bd2a32e49b5abde2b9a1343b14ef11d4236ebc9e0f79a77580c5194bb36be4aed5b52b782716d639b41306187b5d264cc53916506eedd409caa271c0aeb5cd720fec7aa67eed30f8f508dfe4cc95af5dc6f067faedccf46bb296c89ec9a51a0a89247e1ededc1a7ba0c", 0x79, 0x8000}, {&(0x7f0000000800)="10daa81ce2f6c7fea33447bf2ad690a49c393b7a527de4c6723c3c3a29d1507374af4f4b27ec4823cea64cfd89a66e69f1c340ee381cff632857a67e591ef20ace5dad14ab706ae020ed43f413824cdc9fdb33624bc137b9c7f23ce016a889c76100d567701034ac1e29f88cba12f8b1c3e54df33aa4d06050527064f1f707d96249762e5332dfa5801652a0f3a170dda1", 0x91, 0x3}, {&(0x7f00000008c0)="88dc4cc242558b6ae26a21b427f13e4762eec85ca8d950a28c4866d67f61fe51b300b0a672d7a34570926e1614f427b82df8e6f7db7da6537264df6ac834e025c3aeb07af81588616a3c9d8ed5d1a3371204eb80c266ddb94c46f22870380391274810ec5d0012d2f25d94798c3dac965ad03ed88cdd60529ba9316d65ec3c55a32b03cae220961af740d2b9765eca38d5ee85be12fe318955aed1441feaa50820338f42388a5682db6319e9894dba76c4ef911148e7eebf9cf1843f7516fea18009838251a7053a968a5837772885690217794f1e3afc8fb7217ca6597a", 0xde, 0x2}, {&(0x7f00000009c0)="8b86466cf7712d8d23dd26a8a13e1d4064363ff903260aa03f220ba763f239a2253d96e12326d0e36d1edef5bc10fdf8450cfc5801bef0b990cc0ef9cb39691d06113f2f66495afe83926eb4a4cf6fe68c2279804436ede30edb79d9e417f0711574e26b2559ee8c48c12ad4e1668885cbb8b6aa20e87bba70e5e6e861f509c3f952a79944e169807d8a974c5e065ad9b853c95464cbf814ce6d0d1e0fa3a3a5df6fc5598986720a0f1358608f87dbeae1e74181e613e149c7ebc8859e", 0xbd, 0x2}, {&(0x7f0000000a80)="317d180049562ef4ba8530eacad13770c925c0a396dfe5d17bfb6bc35079ff9a440e67363c15a1d6c7c9ad59e24ba173d105abb55beef8", 0x37, 0xc3}, {&(0x7f0000000ac0)="076da493a19df1c53582408e2cf4780aace6aa4a8c87057e4e1f983b326f059da717d17b0a2043f9ea5805bcee02dc71148572921b26e6d1329c26a5810c6e", 0x3f, 0xcf}], 0x1044000, &(0x7f0000000bc0)={[{@shortname_lower}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsroot={'smackfsroot', 0x3d, '+*\''}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) openat(r9, &(0x7f0000000c40)='./file1\x00', 0x18801, 0x4) r10 = openat(0xffffffffffffff9c, &(0x7f0000000c80)='./file0\x00', 0x81, 0x1) execveat(r10, &(0x7f0000000cc0)='./file1\x00', &(0x7f0000000d40)=[&(0x7f0000000d00)='\x00'], &(0x7f0000000e00)=[&(0x7f0000000d80)='nnonumtail=1', &(0x7f0000000dc0)='nnonumtail=1'], 0x1000) 10:17:39 executing program 5: ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000000)) bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x24040000) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x3, @link='broadcast-link\x00'}}}}, 0x68}}, 0x400d4) link(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000380)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000780)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x7f, "ac74680eaee4c7"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001780)={{0x0, 0x3, 0x9, 0x7, 0x7fffffff, 0x519, 0x7, 0x0, 0x40, 0x8, 0x3f, 0x3f, 0x3f, 0xfffffffffffffffd, 0x5}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002780)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002980)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002b80)={0x81, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "67b0e37f9967b3"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000003b80)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x4, "a46dfcdc0c77a1"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004b80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000004d80)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x2, "0d52c59a9bf452"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000005d80)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x3e, "cf171832716571"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000006d80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000006f80)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1f, "dfb4a050e9ac35"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007f80)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x81, "aaa61064b0763e"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000006cb80)={0x0, [{}, {}, {}, {}, {}, {0x0, r0}, {}, {r1}, {r2}, {r3, r4}, {}, {r5}, {}, {0x0, r6}, {}, {r7, r8}, {}, {}, {r9}, {}, {}, {}, {}, {0x0, r10}, {}, {0x0, r11}, {r12}, {0x0, r13}], 0x26, "d22c612109fee6"}) [ 62.511697] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 62.514045] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 62.516238] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 62.517963] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 62.521232] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 62.522491] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 62.526450] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 62.528588] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 62.530804] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 62.544102] Bluetooth: hci0: HCI_REQ-0x0c1a [ 62.553667] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 62.610958] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 62.612324] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 62.613457] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 62.615020] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 62.616776] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 62.618655] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 62.619767] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 62.620774] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 62.621840] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 62.623440] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 62.624484] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 62.625865] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 62.627173] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 62.628699] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 62.637872] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 62.642922] Bluetooth: hci1: HCI_REQ-0x0c1a [ 62.644826] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 62.646663] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 62.652907] Bluetooth: hci2: HCI_REQ-0x0c1a [ 62.670456] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 62.671562] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 62.672927] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 62.675167] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 62.676961] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 62.678056] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 62.679108] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 62.680607] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 62.681835] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 62.688255] Bluetooth: hci6: HCI_REQ-0x0c1a [ 62.695103] Bluetooth: hci5: HCI_REQ-0x0c1a [ 62.695898] Bluetooth: hci3: HCI_REQ-0x0c1a [ 62.851916] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 62.857224] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 62.859255] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 62.867806] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 62.871265] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 62.872631] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 62.877822] Bluetooth: hci7: HCI_REQ-0x0c1a [ 64.580546] Bluetooth: hci0: command 0x0409 tx timeout [ 64.581510] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 64.708063] Bluetooth: hci5: command 0x0409 tx timeout [ 64.708162] Bluetooth: hci6: command 0x0409 tx timeout [ 64.709008] Bluetooth: hci2: command 0x0409 tx timeout [ 64.710023] Bluetooth: hci1: command 0x0409 tx timeout [ 64.772178] Bluetooth: hci3: command 0x0409 tx timeout [ 64.900245] Bluetooth: hci7: command 0x0409 tx timeout [ 66.628056] Bluetooth: hci0: command 0x041b tx timeout [ 66.756121] Bluetooth: hci2: command 0x041b tx timeout [ 66.756148] Bluetooth: hci6: command 0x041b tx timeout [ 66.756929] Bluetooth: hci1: command 0x041b tx timeout [ 66.757421] Bluetooth: hci5: command 0x041b tx timeout [ 66.820049] Bluetooth: hci3: command 0x041b tx timeout [ 66.948139] Bluetooth: hci7: command 0x041b tx timeout [ 68.677133] Bluetooth: hci0: command 0x040f tx timeout [ 68.804053] Bluetooth: hci5: command 0x040f tx timeout [ 68.805357] Bluetooth: hci1: command 0x040f tx timeout [ 68.806074] Bluetooth: hci6: command 0x040f tx timeout [ 68.806749] Bluetooth: hci2: command 0x040f tx timeout [ 68.868288] Bluetooth: hci3: command 0x040f tx timeout [ 68.996108] Bluetooth: hci7: command 0x040f tx timeout [ 69.508124] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 70.724036] Bluetooth: hci0: command 0x0419 tx timeout [ 70.852386] Bluetooth: hci2: command 0x0419 tx timeout [ 70.852459] Bluetooth: hci6: command 0x0419 tx timeout [ 70.852850] Bluetooth: hci1: command 0x0419 tx timeout [ 70.853437] Bluetooth: hci5: command 0x0419 tx timeout [ 70.916097] Bluetooth: hci3: command 0x0419 tx timeout [ 71.044067] Bluetooth: hci7: command 0x0419 tx timeout [ 72.103446] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 72.105373] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 72.106311] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 72.108715] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 72.109686] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 72.110472] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 72.115023] Bluetooth: hci4: HCI_REQ-0x0c1a [ 74.180118] Bluetooth: hci4: command 0x0409 tx timeout [ 76.228243] Bluetooth: hci4: command 0x041b tx timeout [ 78.277492] Bluetooth: hci4: command 0x040f tx timeout [ 80.324122] Bluetooth: hci4: command 0x0419 tx timeout 10:18:31 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000240)='htcp\x00', 0x5) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000280)=0x7f, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0}) r1 = inotify_init1(0x40800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000340)={r0, 0x2, r1, 0x8001}) r2 = memfd_secret(0x80000) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000380)={{0x1, 0x1, 0x18, r2, {0x100, 0x10000000}}, './file0\x00'}) ioctl$sock_bt_hci(r3, 0x2002247a, &(0x7f00000003c0)="f97cfacb0a11a31519e7b55d887f5d15f603e0d2e3eb2ac027d5d0b0170ec9012d43c68983e3f4c8806c76d661da13d9d5db6af5f4050fe24907a61dcb74969fca85fcf37b5359adcc3c9d1a") ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000440)=0x4) ioctl$AUTOFS_DEV_IOCTL_VERSION(r3, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18}, './file1\x00'}) r4 = socket(0x29, 0x0, 0x5) recvmsg$unix(r2, &(0x7f0000001b80)={&(0x7f00000007c0), 0x6e, &(0x7f00000019c0)=[{&(0x7f0000000840)=""/24, 0x18}, {&(0x7f0000000880)=""/153, 0x99}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/114, 0x72}], 0x4, &(0x7f0000001a00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x158}, 0x120) sendmsg$unix(r4, &(0x7f0000001c00)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000540)="71aa618f1066790b9ca7541b4637fb294ba0770f11958bd3265df874beb7943d8fdd18d4dacc7eb8de52b3da7ea083d35b56c0074821544b4062191ca72b2c5d128f2db5df59ad4df7d10cbc0735db772779866453b28081a22a8f8826a107bdb4f9d868ff331ac455c393d117e3b894a95cad256fcacacb2fd1129cf44944cf07f2d84aae0feac5cbfce71180f01d748d1c1d6d441b01b610a382493dfb77d2d60b37f2656d04218aeda7b3ad916b23ea5fab46ece2dc0edac8f260a30565b5b9cc4f6a", 0xc4}, {&(0x7f0000000640)="ffc85f3b71943fe3526e3145dfe0cdda0ae4c9507ec01b97275e9599527c6338cc1341d439012c2122c79d3fac444f27f9a9fce36dc0235bc09c02b4f8c4c4e331de9353c853cf9e1635a10b75f07d6d289856404d", 0x55}, {&(0x7f00000006c0)="63014dee3bbcf8e3a506f749b91216cc2916b6d52a8a92b5e9200aeb849b675a3f789c82b288899349f5b8d5913aca2423276479db9d58d7b832e923de7bb69b5a85669bcb5076d1db7ff81e5dead29da52924b091ff8889b0985e7fa982d52ca2f47cd32fe42b9f8f3266e60045a27a74947f36ecbb4fb45361dd7aa4a86a2cffb129731cfc054eb7579c18931bfe1490c843366ba4322156849e4617acc27685", 0xa1}], 0x3, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}], 0x20, 0x80}, 0x40000) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000001d00)={&(0x7f0000001c40)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001cc0)={&(0x7f0000001c80)={0x30, 0x0, 0x100, 0x70bd26, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x0, 0x0, 0x81, 0x8}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000011}, 0x8040) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNSETLINK(r6, 0x400454cd, 0x301) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000001d40)={{0x1, 0x1, 0x18, r5, {0x9}}, '.\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f0000001d80)={r0, 0x1, 0xffffffffffffffff, 0xfffffffd}) 10:18:31 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000240)='htcp\x00', 0x5) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000280)=0x7f, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0}) r1 = inotify_init1(0x40800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000340)={r0, 0x2, r1, 0x8001}) r2 = memfd_secret(0x80000) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000380)={{0x1, 0x1, 0x18, r2, {0x100, 0x10000000}}, './file0\x00'}) ioctl$sock_bt_hci(r3, 0x2002247a, &(0x7f00000003c0)="f97cfacb0a11a31519e7b55d887f5d15f603e0d2e3eb2ac027d5d0b0170ec9012d43c68983e3f4c8806c76d661da13d9d5db6af5f4050fe24907a61dcb74969fca85fcf37b5359adcc3c9d1a") ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000440)=0x4) ioctl$AUTOFS_DEV_IOCTL_VERSION(r3, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18}, './file1\x00'}) r4 = socket(0x29, 0x0, 0x5) recvmsg$unix(r2, &(0x7f0000001b80)={&(0x7f00000007c0), 0x6e, &(0x7f00000019c0)=[{&(0x7f0000000840)=""/24, 0x18}, {&(0x7f0000000880)=""/153, 0x99}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/114, 0x72}], 0x4, &(0x7f0000001a00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x158}, 0x120) sendmsg$unix(r4, &(0x7f0000001c00)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000540)="71aa618f1066790b9ca7541b4637fb294ba0770f11958bd3265df874beb7943d8fdd18d4dacc7eb8de52b3da7ea083d35b56c0074821544b4062191ca72b2c5d128f2db5df59ad4df7d10cbc0735db772779866453b28081a22a8f8826a107bdb4f9d868ff331ac455c393d117e3b894a95cad256fcacacb2fd1129cf44944cf07f2d84aae0feac5cbfce71180f01d748d1c1d6d441b01b610a382493dfb77d2d60b37f2656d04218aeda7b3ad916b23ea5fab46ece2dc0edac8f260a30565b5b9cc4f6a", 0xc4}, {&(0x7f0000000640)="ffc85f3b71943fe3526e3145dfe0cdda0ae4c9507ec01b97275e9599527c6338cc1341d439012c2122c79d3fac444f27f9a9fce36dc0235bc09c02b4f8c4c4e331de9353c853cf9e1635a10b75f07d6d289856404d", 0x55}, {&(0x7f00000006c0)="63014dee3bbcf8e3a506f749b91216cc2916b6d52a8a92b5e9200aeb849b675a3f789c82b288899349f5b8d5913aca2423276479db9d58d7b832e923de7bb69b5a85669bcb5076d1db7ff81e5dead29da52924b091ff8889b0985e7fa982d52ca2f47cd32fe42b9f8f3266e60045a27a74947f36ecbb4fb45361dd7aa4a86a2cffb129731cfc054eb7579c18931bfe1490c843366ba4322156849e4617acc27685", 0xa1}], 0x3, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}], 0x20, 0x80}, 0x40000) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000001d00)={&(0x7f0000001c40)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001cc0)={&(0x7f0000001c80)={0x30, 0x0, 0x100, 0x70bd26, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x0, 0x0, 0x81, 0x8}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000011}, 0x8040) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNSETLINK(r6, 0x400454cd, 0x301) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000001d40)={{0x1, 0x1, 0x18, r5, {0x9}}, '.\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f0000001d80)={r0, 0x1, 0xffffffffffffffff, 0xfffffffd}) 10:18:32 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000240)='htcp\x00', 0x5) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000280)=0x7f, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0}) r1 = inotify_init1(0x40800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000340)={r0, 0x2, r1, 0x8001}) r2 = memfd_secret(0x80000) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000380)={{0x1, 0x1, 0x18, r2, {0x100, 0x10000000}}, './file0\x00'}) ioctl$sock_bt_hci(r3, 0x2002247a, &(0x7f00000003c0)="f97cfacb0a11a31519e7b55d887f5d15f603e0d2e3eb2ac027d5d0b0170ec9012d43c68983e3f4c8806c76d661da13d9d5db6af5f4050fe24907a61dcb74969fca85fcf37b5359adcc3c9d1a") ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000440)=0x4) ioctl$AUTOFS_DEV_IOCTL_VERSION(r3, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18}, './file1\x00'}) r4 = socket(0x29, 0x0, 0x5) recvmsg$unix(r2, &(0x7f0000001b80)={&(0x7f00000007c0), 0x6e, &(0x7f00000019c0)=[{&(0x7f0000000840)=""/24, 0x18}, {&(0x7f0000000880)=""/153, 0x99}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/114, 0x72}], 0x4, &(0x7f0000001a00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x158}, 0x120) sendmsg$unix(r4, &(0x7f0000001c00)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000540)="71aa618f1066790b9ca7541b4637fb294ba0770f11958bd3265df874beb7943d8fdd18d4dacc7eb8de52b3da7ea083d35b56c0074821544b4062191ca72b2c5d128f2db5df59ad4df7d10cbc0735db772779866453b28081a22a8f8826a107bdb4f9d868ff331ac455c393d117e3b894a95cad256fcacacb2fd1129cf44944cf07f2d84aae0feac5cbfce71180f01d748d1c1d6d441b01b610a382493dfb77d2d60b37f2656d04218aeda7b3ad916b23ea5fab46ece2dc0edac8f260a30565b5b9cc4f6a", 0xc4}, {&(0x7f0000000640)="ffc85f3b71943fe3526e3145dfe0cdda0ae4c9507ec01b97275e9599527c6338cc1341d439012c2122c79d3fac444f27f9a9fce36dc0235bc09c02b4f8c4c4e331de9353c853cf9e1635a10b75f07d6d289856404d", 0x55}, {&(0x7f00000006c0)="63014dee3bbcf8e3a506f749b91216cc2916b6d52a8a92b5e9200aeb849b675a3f789c82b288899349f5b8d5913aca2423276479db9d58d7b832e923de7bb69b5a85669bcb5076d1db7ff81e5dead29da52924b091ff8889b0985e7fa982d52ca2f47cd32fe42b9f8f3266e60045a27a74947f36ecbb4fb45361dd7aa4a86a2cffb129731cfc054eb7579c18931bfe1490c843366ba4322156849e4617acc27685", 0xa1}], 0x3, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}], 0x20, 0x80}, 0x40000) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000001d00)={&(0x7f0000001c40)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001cc0)={&(0x7f0000001c80)={0x30, 0x0, 0x100, 0x70bd26, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x0, 0x0, 0x81, 0x8}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000011}, 0x8040) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNSETLINK(r6, 0x400454cd, 0x301) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000001d40)={{0x1, 0x1, 0x18, r5, {0x9}}, '.\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f0000001d80)={r0, 0x1, 0xffffffffffffffff, 0xfffffffd}) 10:18:32 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000240)='htcp\x00', 0x5) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000280)=0x7f, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0}) r1 = inotify_init1(0x40800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000340)={r0, 0x2, r1, 0x8001}) r2 = memfd_secret(0x80000) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000380)={{0x1, 0x1, 0x18, r2, {0x100, 0x10000000}}, './file0\x00'}) ioctl$sock_bt_hci(r3, 0x2002247a, &(0x7f00000003c0)="f97cfacb0a11a31519e7b55d887f5d15f603e0d2e3eb2ac027d5d0b0170ec9012d43c68983e3f4c8806c76d661da13d9d5db6af5f4050fe24907a61dcb74969fca85fcf37b5359adcc3c9d1a") ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000440)=0x4) ioctl$AUTOFS_DEV_IOCTL_VERSION(r3, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18}, './file1\x00'}) r4 = socket(0x29, 0x0, 0x5) recvmsg$unix(r2, &(0x7f0000001b80)={&(0x7f00000007c0), 0x6e, &(0x7f00000019c0)=[{&(0x7f0000000840)=""/24, 0x18}, {&(0x7f0000000880)=""/153, 0x99}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/114, 0x72}], 0x4, &(0x7f0000001a00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x158}, 0x120) sendmsg$unix(r4, &(0x7f0000001c00)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000540)="71aa618f1066790b9ca7541b4637fb294ba0770f11958bd3265df874beb7943d8fdd18d4dacc7eb8de52b3da7ea083d35b56c0074821544b4062191ca72b2c5d128f2db5df59ad4df7d10cbc0735db772779866453b28081a22a8f8826a107bdb4f9d868ff331ac455c393d117e3b894a95cad256fcacacb2fd1129cf44944cf07f2d84aae0feac5cbfce71180f01d748d1c1d6d441b01b610a382493dfb77d2d60b37f2656d04218aeda7b3ad916b23ea5fab46ece2dc0edac8f260a30565b5b9cc4f6a", 0xc4}, {&(0x7f0000000640)="ffc85f3b71943fe3526e3145dfe0cdda0ae4c9507ec01b97275e9599527c6338cc1341d439012c2122c79d3fac444f27f9a9fce36dc0235bc09c02b4f8c4c4e331de9353c853cf9e1635a10b75f07d6d289856404d", 0x55}, {&(0x7f00000006c0)="63014dee3bbcf8e3a506f749b91216cc2916b6d52a8a92b5e9200aeb849b675a3f789c82b288899349f5b8d5913aca2423276479db9d58d7b832e923de7bb69b5a85669bcb5076d1db7ff81e5dead29da52924b091ff8889b0985e7fa982d52ca2f47cd32fe42b9f8f3266e60045a27a74947f36ecbb4fb45361dd7aa4a86a2cffb129731cfc054eb7579c18931bfe1490c843366ba4322156849e4617acc27685", 0xa1}], 0x3, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xee00}}}], 0x20, 0x80}, 0x40000) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000001d00)={&(0x7f0000001c40)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001cc0)={&(0x7f0000001c80)={0x30, 0x0, 0x100, 0x70bd26, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x0, 0x0, 0x81, 0x8}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000011}, 0x8040) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNSETLINK(r6, 0x400454cd, 0x301) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000001d40)={{0x1, 0x1, 0x18, r5, {0x9}}, '.\x00'}) 10:18:32 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000240)='htcp\x00', 0x5) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000280)=0x7f, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0}) r1 = inotify_init1(0x40800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000340)={r0, 0x2, r1, 0x8001}) r2 = memfd_secret(0x80000) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000380)={{0x1, 0x1, 0x18, r2, {0x100, 0x10000000}}, './file0\x00'}) ioctl$sock_bt_hci(r3, 0x2002247a, &(0x7f00000003c0)="f97cfacb0a11a31519e7b55d887f5d15f603e0d2e3eb2ac027d5d0b0170ec9012d43c68983e3f4c8806c76d661da13d9d5db6af5f4050fe24907a61dcb74969fca85fcf37b5359adcc3c9d1a") ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000440)=0x4) ioctl$AUTOFS_DEV_IOCTL_VERSION(r3, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18}, './file1\x00'}) r4 = socket(0x29, 0x0, 0x5) recvmsg$unix(r2, &(0x7f0000001b80)={&(0x7f00000007c0), 0x6e, &(0x7f00000019c0)=[{&(0x7f0000000840)=""/24, 0x18}, {&(0x7f0000000880)=""/153, 0x99}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/114, 0x72}], 0x4, &(0x7f0000001a00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x158}, 0x120) sendmsg$unix(r4, &(0x7f0000001c00)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000540)="71aa618f1066790b9ca7541b4637fb294ba0770f11958bd3265df874beb7943d8fdd18d4dacc7eb8de52b3da7ea083d35b56c0074821544b4062191ca72b2c5d128f2db5df59ad4df7d10cbc0735db772779866453b28081a22a8f8826a107bdb4f9d868ff331ac455c393d117e3b894a95cad256fcacacb2fd1129cf44944cf07f2d84aae0feac5cbfce71180f01d748d1c1d6d441b01b610a382493dfb77d2d60b37f2656d04218aeda7b3ad916b23ea5fab46ece2dc0edac8f260a30565b5b9cc4f6a", 0xc4}, {&(0x7f0000000640)="ffc85f3b71943fe3526e3145dfe0cdda0ae4c9507ec01b97275e9599527c6338cc1341d439012c2122c79d3fac444f27f9a9fce36dc0235bc09c02b4f8c4c4e331de9353c853cf9e1635a10b75f07d6d289856404d", 0x55}, {&(0x7f00000006c0)="63014dee3bbcf8e3a506f749b91216cc2916b6d52a8a92b5e9200aeb849b675a3f789c82b288899349f5b8d5913aca2423276479db9d58d7b832e923de7bb69b5a85669bcb5076d1db7ff81e5dead29da52924b091ff8889b0985e7fa982d52ca2f47cd32fe42b9f8f3266e60045a27a74947f36ecbb4fb45361dd7aa4a86a2cffb129731cfc054eb7579c18931bfe1490c843366ba4322156849e4617acc27685", 0xa1}], 0x3, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {r6, 0x0, 0xee00}}}], 0x20, 0x80}, 0x40000) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000001d00)={&(0x7f0000001c40)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001cc0)={&(0x7f0000001c80)={0x30, 0x0, 0x100, 0x70bd26, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x0, 0x0, 0x81, 0x8}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000011}, 0x8040) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNSETLINK(r5, 0x400454cd, 0x301) 10:18:32 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000240)='htcp\x00', 0x5) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000280)=0x7f, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0}) r1 = inotify_init1(0x40800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000340)={r0, 0x2, r1, 0x8001}) r2 = memfd_secret(0x80000) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000380)={{0x1, 0x1, 0x18, r2, {0x100, 0x10000000}}, './file0\x00'}) ioctl$sock_bt_hci(r3, 0x2002247a, &(0x7f00000003c0)="f97cfacb0a11a31519e7b55d887f5d15f603e0d2e3eb2ac027d5d0b0170ec9012d43c68983e3f4c8806c76d661da13d9d5db6af5f4050fe24907a61dcb74969fca85fcf37b5359adcc3c9d1a") ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000440)=0x4) ioctl$AUTOFS_DEV_IOCTL_VERSION(r3, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18}, './file1\x00'}) r4 = socket(0x29, 0x0, 0x5) recvmsg$unix(r2, &(0x7f0000001b80)={&(0x7f00000007c0), 0x6e, &(0x7f00000019c0)=[{&(0x7f0000000840)=""/24, 0x18}, {&(0x7f0000000880)=""/153, 0x99}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/114, 0x72}], 0x4, &(0x7f0000001a00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x158}, 0x120) sendmsg$unix(r4, &(0x7f0000001c00)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000540)="71aa618f1066790b9ca7541b4637fb294ba0770f11958bd3265df874beb7943d8fdd18d4dacc7eb8de52b3da7ea083d35b56c0074821544b4062191ca72b2c5d128f2db5df59ad4df7d10cbc0735db772779866453b28081a22a8f8826a107bdb4f9d868ff331ac455c393d117e3b894a95cad256fcacacb2fd1129cf44944cf07f2d84aae0feac5cbfce71180f01d748d1c1d6d441b01b610a382493dfb77d2d60b37f2656d04218aeda7b3ad916b23ea5fab46ece2dc0edac8f260a30565b5b9cc4f6a", 0xc4}, {&(0x7f0000000640)="ffc85f3b71943fe3526e3145dfe0cdda0ae4c9507ec01b97275e9599527c6338cc1341d439012c2122c79d3fac444f27f9a9fce36dc0235bc09c02b4f8c4c4e331de9353c853cf9e1635a10b75f07d6d289856404d", 0x55}, {&(0x7f00000006c0)="63014dee3bbcf8e3a506f749b91216cc2916b6d52a8a92b5e9200aeb849b675a3f789c82b288899349f5b8d5913aca2423276479db9d58d7b832e923de7bb69b5a85669bcb5076d1db7ff81e5dead29da52924b091ff8889b0985e7fa982d52ca2f47cd32fe42b9f8f3266e60045a27a74947f36ecbb4fb45361dd7aa4a86a2cffb129731cfc054eb7579c18931bfe1490c843366ba4322156849e4617acc27685", 0xa1}], 0x3, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee00}}}], 0x20, 0x80}, 0x40000) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000001d00)={&(0x7f0000001c40)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001cc0)={&(0x7f0000001c80)={0x30, 0x0, 0x100, 0x70bd26, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x0, 0x0, 0x81, 0x8}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000011}, 0x8040) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) 10:18:33 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000240)='htcp\x00', 0x5) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000280)=0x7f, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0}) r1 = inotify_init1(0x40800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000340)={r0, 0x2, r1, 0x8001}) r2 = memfd_secret(0x80000) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000380)={{0x1, 0x1, 0x18, r2, {0x100, 0x10000000}}, './file0\x00'}) ioctl$sock_bt_hci(r3, 0x2002247a, &(0x7f00000003c0)="f97cfacb0a11a31519e7b55d887f5d15f603e0d2e3eb2ac027d5d0b0170ec9012d43c68983e3f4c8806c76d661da13d9d5db6af5f4050fe24907a61dcb74969fca85fcf37b5359adcc3c9d1a") ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000440)=0x4) ioctl$AUTOFS_DEV_IOCTL_VERSION(r3, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18}, './file1\x00'}) r4 = socket(0x29, 0x0, 0x5) recvmsg$unix(r2, &(0x7f0000001b80)={&(0x7f00000007c0), 0x6e, &(0x7f00000019c0)=[{&(0x7f0000000840)=""/24, 0x18}, {&(0x7f0000000880)=""/153, 0x99}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/114, 0x72}], 0x4, &(0x7f0000001a00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x158}, 0x120) sendmsg$unix(r4, &(0x7f0000001c00)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000540)="71aa618f1066790b9ca7541b4637fb294ba0770f11958bd3265df874beb7943d8fdd18d4dacc7eb8de52b3da7ea083d35b56c0074821544b4062191ca72b2c5d128f2db5df59ad4df7d10cbc0735db772779866453b28081a22a8f8826a107bdb4f9d868ff331ac455c393d117e3b894a95cad256fcacacb2fd1129cf44944cf07f2d84aae0feac5cbfce71180f01d748d1c1d6d441b01b610a382493dfb77d2d60b37f2656d04218aeda7b3ad916b23ea5fab46ece2dc0edac8f260a30565b5b9cc4f6a", 0xc4}, {&(0x7f0000000640)="ffc85f3b71943fe3526e3145dfe0cdda0ae4c9507ec01b97275e9599527c6338cc1341d439012c2122c79d3fac444f27f9a9fce36dc0235bc09c02b4f8c4c4e331de9353c853cf9e1635a10b75f07d6d289856404d", 0x55}, {&(0x7f00000006c0)="63014dee3bbcf8e3a506f749b91216cc2916b6d52a8a92b5e9200aeb849b675a3f789c82b288899349f5b8d5913aca2423276479db9d58d7b832e923de7bb69b5a85669bcb5076d1db7ff81e5dead29da52924b091ff8889b0985e7fa982d52ca2f47cd32fe42b9f8f3266e60045a27a74947f36ecbb4fb45361dd7aa4a86a2cffb129731cfc054eb7579c18931bfe1490c843366ba4322156849e4617acc27685", 0xa1}], 0x3, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee00}}}], 0x20, 0x80}, 0x40000) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000001d00)={&(0x7f0000001c40)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001cc0)={&(0x7f0000001c80)={0x30, 0x0, 0x100, 0x70bd26, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x0, 0x0, 0x81, 0x8}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000011}, 0x8040) 10:18:33 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000240)='htcp\x00', 0x5) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000280)=0x7f, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0}) r1 = inotify_init1(0x40800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000340)={r0, 0x2, r1, 0x8001}) r2 = memfd_secret(0x80000) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000380)={{0x1, 0x1, 0x18, r2, {0x100, 0x10000000}}, './file0\x00'}) ioctl$sock_bt_hci(r3, 0x2002247a, &(0x7f00000003c0)="f97cfacb0a11a31519e7b55d887f5d15f603e0d2e3eb2ac027d5d0b0170ec9012d43c68983e3f4c8806c76d661da13d9d5db6af5f4050fe24907a61dcb74969fca85fcf37b5359adcc3c9d1a") ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000440)=0x4) ioctl$AUTOFS_DEV_IOCTL_VERSION(r3, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18}, './file1\x00'}) r4 = socket(0x29, 0x0, 0x5) recvmsg$unix(r2, &(0x7f0000001b80)={&(0x7f00000007c0), 0x6e, &(0x7f00000019c0)=[{&(0x7f0000000840)=""/24, 0x18}, {&(0x7f0000000880)=""/153, 0x99}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/114, 0x72}], 0x4, &(0x7f0000001a00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x158}, 0x120) sendmsg$unix(r4, &(0x7f0000001c00)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000540)="71aa618f1066790b9ca7541b4637fb294ba0770f11958bd3265df874beb7943d8fdd18d4dacc7eb8de52b3da7ea083d35b56c0074821544b4062191ca72b2c5d128f2db5df59ad4df7d10cbc0735db772779866453b28081a22a8f8826a107bdb4f9d868ff331ac455c393d117e3b894a95cad256fcacacb2fd1129cf44944cf07f2d84aae0feac5cbfce71180f01d748d1c1d6d441b01b610a382493dfb77d2d60b37f2656d04218aeda7b3ad916b23ea5fab46ece2dc0edac8f260a30565b5b9cc4f6a", 0xc4}, {&(0x7f0000000640)="ffc85f3b71943fe3526e3145dfe0cdda0ae4c9507ec01b97275e9599527c6338cc1341d439012c2122c79d3fac444f27f9a9fce36dc0235bc09c02b4f8c4c4e331de9353c853cf9e1635a10b75f07d6d289856404d", 0x55}, {&(0x7f00000006c0)="63014dee3bbcf8e3a506f749b91216cc2916b6d52a8a92b5e9200aeb849b675a3f789c82b288899349f5b8d5913aca2423276479db9d58d7b832e923de7bb69b5a85669bcb5076d1db7ff81e5dead29da52924b091ff8889b0985e7fa982d52ca2f47cd32fe42b9f8f3266e60045a27a74947f36ecbb4fb45361dd7aa4a86a2cffb129731cfc054eb7579c18931bfe1490c843366ba4322156849e4617acc27685", 0xa1}], 0x3, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee00}}}], 0x20, 0x80}, 0x40000) [ 118.030510] loop7: detected capacity change from 0 to 16383 [ 118.050714] loop7: detected capacity change from 0 to 128 [ 118.062819] loop7: detected capacity change from 0 to 128 10:18:54 executing program 4: ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x400}}, '.\x00'}) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040)={0x5, "bc7f48"}, 0x6) r1 = io_uring_setup(0x3c02, &(0x7f0000000080)={0x0, 0x77af, 0x0, 0x1, 0x166, 0x0, r0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x5, 0x1d0}}, './file0\x00'}) accept4$unix(r0, &(0x7f0000000140), &(0x7f00000001c0)=0x6e, 0x0) mknodat$loop(r2, &(0x7f0000000200)='./file0\x00', 0x100, 0x1) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {r3}}, './file0\x00'}) sendmsg$TIPC_CMD_SET_LINK_TOL(r5, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x68, 0x0, 0x200, 0x70bd2d, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0x1, @link='syz0\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4008005}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000054}, 0x40000c4) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x4000010, r5, 0x10000000) syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) io_uring_setup(0x131a, &(0x7f0000000940)={0x0, 0x6a03, 0x8, 0x1, 0x16c, 0x0, r7}) syz_genetlink_get_family_id$smc(&(0x7f00000009c0), r4) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x24, 0x0, 0x8, 0x70bd2a, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x1}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24000001}, 0x44000) 10:18:54 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000240)='htcp\x00', 0x5) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000280)=0x7f, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0}) r1 = inotify_init1(0x40800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000340)={r0, 0x2, r1, 0x8001}) r2 = memfd_secret(0x80000) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000380)={{0x1, 0x1, 0x18, r2, {0x100, 0x10000000}}, './file0\x00'}) ioctl$sock_bt_hci(r3, 0x2002247a, &(0x7f00000003c0)="f97cfacb0a11a31519e7b55d887f5d15f603e0d2e3eb2ac027d5d0b0170ec9012d43c68983e3f4c8806c76d661da13d9d5db6af5f4050fe24907a61dcb74969fca85fcf37b5359adcc3c9d1a") ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000440)=0x4) ioctl$AUTOFS_DEV_IOCTL_VERSION(r3, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18}, './file1\x00'}) r4 = socket(0x29, 0x0, 0x5) sendmsg$unix(r4, &(0x7f0000001c00)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000540)="71aa618f1066790b9ca7541b4637fb294ba0770f11958bd3265df874beb7943d8fdd18d4dacc7eb8de52b3da7ea083d35b56c0074821544b4062191ca72b2c5d128f2db5df59ad4df7d10cbc0735db772779866453b28081a22a8f8826a107bdb4f9d868ff331ac455c393d117e3b894a95cad256fcacacb2fd1129cf44944cf07f2d84aae0feac5cbfce71180f01d748d1c1d6d441b01b610a382493dfb77d2d60b37f2656d04218aeda7b3ad916b23ea5fab46ece2dc0edac8f260a30565b5b9cc4f6a", 0xc4}, {&(0x7f0000000640)="ffc85f3b71943fe3526e3145dfe0cdda0ae4c9507ec01b97275e9599527c6338cc1341d439012c2122c79d3fac444f27f9a9fce36dc0235bc09c02b4f8c4c4e331de9353c853cf9e1635a10b75f07d6d289856404d", 0x55}, {&(0x7f00000006c0)="63014dee3bbcf8e3a506f749b91216cc2916b6d52a8a92b5e9200aeb849b675a3f789c82b288899349f5b8d5913aca2423276479db9d58d7b832e923de7bb69b5a85669bcb5076d1db7ff81e5dead29da52924b091ff8889b0985e7fa982d52ca2f47cd32fe42b9f8f3266e60045a27a74947f36ecbb4fb45361dd7aa4a86a2cffb129731cfc054eb7579c18931bfe1490c843366ba4322156849e4617acc27685", 0xa1}], 0x3, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x20, 0x80}, 0x40000) 10:18:54 executing program 1: ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8001, 0x1}}, './file0\x00'}) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) r1 = gettid() syz_open_procfs$namespace(r1, &(0x7f0000000040)='ns/ipc\x00') ptrace$peeksig(0x4209, r1, &(0x7f0000000080)={0x7ff, 0x0, 0x1}, &(0x7f00000000c0)=[{}]) ioctl$HIDIOCGRDESC(r0, 0x90044802, &(0x7f0000000140)={0x19, "d477f42664344f7d3bb8d47f61601055e8383704671c6b1454"}) getpriority(0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x10900, 0x88) recvmsg$unix(r2, &(0x7f0000000480)={&(0x7f00000001c0), 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/25, 0x19}, {&(0x7f0000000280)=""/46, 0x2e}], 0x2, &(0x7f0000000300)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x150}, 0x2041) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r6, 0xc0189379, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r8 = memfd_secret(0x80000) accept$unix(r8, 0x0, &(0x7f0000000500)) ioctl$NS_GET_NSTYPE(r3, 0xb703, 0x0) r9 = syz_genetlink_get_family_id$smc(&(0x7f0000000580), r4) sendmsg$SMC_PNETID_DEL(r5, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x34, r9, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) getuid() r10 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0), r2) sendmsg$TIPC_CMD_SET_NETID(r7, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r10, 0x5597dd26b7b66778, 0x70bd27, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x200}}, ["", "", "", ""]}, 0x24}}, 0x4000080) 10:18:54 executing program 0: setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)={0x8, "e3c5e2"}, 0x6) r0 = fsopen(&(0x7f0000000040)='cgroup\x00', 0x8d07077d4dd54d41) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x125180, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, 0x0, 0x800, 0x70bd29, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x6, @link='syz0\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x810}, 0x20000008) r3 = accept4$unix(r2, 0x0, &(0x7f0000000240), 0x800) newfstatat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) mount$cgroup2(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x400, &(0x7f00000003c0)={[{@subsystem='cpu'}, {@memory_recursiveprot}, {@subsystem='pids'}, {@subsystem='hugetlb'}, {}, {@memory_localevents}, {@memory_recursiveprot}, {@memory_recursiveprot}], [{@dont_appraise}, {@obj_role={'obj_role', 0x3d, '!'}}, {@euid_eq={'euid', 0x3d, r4}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'cgroup\x00'}}, {@euid_lt}, {@appraise}, {@subj_user={'subj_user', 0x3d, '\''}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\'}[*'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x34, 0x31, 0x64, 0x32, 0x3d9af854c7cdb0c2, 0x57, 0x64], 0x2d, [0x35, 0x39, 0x36, 0x66], 0x2d, [0x61, 0x31, 0x38, 0x31], 0x2d, [0x32, 0x32, 0x35, 0x36], 0x2d, [0x64, 0x61, 0x64, 0x30, 0x36, 0x38, 0x38, 0x63]}}}]}) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x68, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x196, @media='udp\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40800}, 0x4004000) ptrace$setregs(0xd, 0x0, 0x50, &(0x7f0000000640)="7ff032286d7cb70dc4687c2cb7940b61a91a7a7d2ac1bafcf00b1ddad49e3668e779fdb5c321a7d2649e6ed0467be863cf05eb0af6617c3d27553bcde3d92af8de2e613b9a17f00624f8531eaf0621b4d215b68d170f77f52fa5b77ccf6630353e4a487818ca16802ddbf34456d580b910b88dc8b8122b814fef2a3c9225465f4ce86f31a2d82d490e9d51f98ce8359428eb") sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x7c, 0x0, 0x100, 0x70bd25, 0x25dfdbff, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'hsr0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'team0\x00'}]}, 0x7c}}, 0x4000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000840)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r5, 0xc0189379, &(0x7f0000000880)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) lsetxattr$security_capability(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900), &(0x7f0000000940)=@v1={0x1000000, [{0x80, 0x5}]}, 0xc, 0x3) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x1c, 0x0, 0x8, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a80), r5) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) r8 = syz_genetlink_get_family_id$smc(&(0x7f0000000b40), r5) sendmsg$SMC_PNETID_GET(r7, &(0x7f0000000c40)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000c00)={&(0x7f0000000b80)={0x48, r8, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x40080}, 0x40800) 10:18:54 executing program 6: r0 = memfd_secret(0x80000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x0, 0x400, 0x70bd27, 0x25dfdbff, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r3 = gettid() sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x48, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {{}, {@void, @void, @val={0xc, 0x99, {0xff, 0x75}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x7b}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x73}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r0}, @NL80211_ATTR_PID={0x8, 0x52, r3}]}, 0x48}}, 0x44000) ptrace$setregs(0xf, 0x0, 0x5, &(0x7f00000003c0)="bdd67d59efde8cf926ccf0b712fbd0577bc1c988990bf6a06795764c0463d0ea41a21b9a7335a7b330e53feed0cae6") r4 = gettid() rt_sigqueueinfo(r4, 0x12, &(0x7f0000000400)={0x27, 0x6, 0x6}) r5 = socket(0x1a, 0x800, 0x2) sendmsg$SMC_PNETID_ADD(r5, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x48, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x2000000) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x8080}, 0x4000000) sched_rr_get_interval(r3, &(0x7f00000006c0)) lgetxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)=@known='system.sockprotoname\x00', &(0x7f0000000780)=""/153, 0x99) r6 = getuid() recvmsg$unix(r2, &(0x7f0000000ac0)={&(0x7f0000000880)=@abs, 0x6e, &(0x7f0000000980)=[{&(0x7f0000000900)=""/66, 0x42}], 0x1, &(0x7f00000009c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xd8}, 0x40002000) chown(&(0x7f0000000840)='./file0\x00', r6, r7) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000b00)=0x2, 0x4) ioctl$NS_GET_USERNS(r8, 0xb701, 0x0) 10:18:54 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000850) syz_genetlink_get_family_id$SEG6(&(0x7f0000000180), 0xffffffffffffffff) read$hidraw(0xffffffffffffffff, &(0x7f00000001c0)=""/177, 0xb1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000000280)=""/136, 0x88}, {&(0x7f0000000340)=""/58, 0x3a}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x3, &(0x7f00000013c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}, 0x40) sendmsg$SMC_PNETID_GET(r6, &(0x7f0000001540)={0xfffffffffffffffe, 0x0, &(0x7f0000001500)={&(0x7f0000001480)={0x60, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'nr0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv_slave_1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x60}}, 0x10) r10 = syz_genetlink_get_family_id$smc(&(0x7f00000015c0), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r6, &(0x7f00000016c0)={&(0x7f0000001580), 0xc, &(0x7f0000001680)={&(0x7f0000001600)={0x4c, r10, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000) r11 = syz_genetlink_get_family_id$smc(&(0x7f0000001740), r9) sendmsg$SMC_PNETID_DEL(r4, &(0x7f0000001800)={&(0x7f0000001700), 0xc, &(0x7f00000017c0)={&(0x7f0000001780)={0x20, r11, 0x400, 0x70bd26, 0x25dfdbff, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040004}, 0x4000) sendmsg$TIPC_CMD_GET_LINKS(r6, &(0x7f0000001900)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000018c0)={&(0x7f0000001880)={0x24, r0, 0x100, 0x70bd2b, 0x25dfdbfb, {{}, {}, {0x8, 0x11, 0x81}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0xb101409338bc67e5}, 0x4000000) r12 = syz_genetlink_get_family_id$tipc(&(0x7f0000001980), r6) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000001a40)={&(0x7f0000001940)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001a00)={&(0x7f00000019c0)={0x1c, r12, 0xa08, 0x70bd28, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) clock_getres(0x1, &(0x7f0000001a80)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000001b00)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) syz_genetlink_get_family_id$gtp(&(0x7f0000001ac0), r13) r14 = syz_genetlink_get_family_id$tipc(&(0x7f0000001b80), r6) sendmsg$TIPC_CMD_SHOW_PORTS(r8, &(0x7f0000001c40)={&(0x7f0000001b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001c00)={&(0x7f0000001bc0)={0x1c, r14, 0x8, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x5) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r7, &(0x7f0000001c80)={r8, 0xffffffffffffffff, 0x3f}) 10:18:54 executing program 5: ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000000)) bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x24040000) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x3, @link='broadcast-link\x00'}}}}, 0x68}}, 0x400d4) link(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000380)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000780)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x7f, "ac74680eaee4c7"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001780)={{0x0, 0x3, 0x9, 0x7, 0x7fffffff, 0x519, 0x7, 0x0, 0x40, 0x8, 0x3f, 0x3f, 0x3f, 0xfffffffffffffffd, 0x5}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002780)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002980)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002b80)={0x81, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "67b0e37f9967b3"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000003b80)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x4, "a46dfcdc0c77a1"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004b80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000004d80)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x2, "0d52c59a9bf452"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000005d80)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x3e, "cf171832716571"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000006d80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000006f80)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1f, "dfb4a050e9ac35"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007f80)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x81, "aaa61064b0763e"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000006cb80)={0x0, [{}, {}, {}, {}, {}, {0x0, r0}, {}, {r1}, {r2}, {r3, r4}, {}, {r5}, {}, {0x0, r6}, {}, {r7, r8}, {}, {}, {r9}, {}, {}, {}, {}, {0x0, r10}, {}, {0x0, r11}, {r12}, {0x0, r13}], 0x26, "d22c612109fee6"}) 10:18:54 executing program 7: fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000000)=']!\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xff, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="1a574815b6185e042d60d885c18d7a134bb837a114917738f256e017f706ecc8bd051a9e88b2a77ce12138806e4a1f45c91f8e62cad166bc2051b5c89328", 0x3e, 0xfffffffffffffffe}], 0x1008002, &(0x7f0000000180)={[{@utf8no}, {@shortname_win95}, {@shortname_lower}, {@rodir}, {@nonumtail}, {@numtail}, {@shortname_win95}], [{@pcr}, {@measure}, {@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x30, 0x61, 0x63, 0x64, 0x34, 0x65, 0x34], 0x2d, [0x62, 0x36, 0x31, 0x63], 0x2d, [0x35, 0x36, 0x63, 0x31], 0x2d, [0x62, 0x15359d50cc9df773, 0x34, 0x57], 0x2d, [0x5c, 0x32, 0x66, 0x36, 0x66, 0x64, 0x35, 0x35]}}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfshat={'smackfshat', 0x3d, ']!\x00'}}, {@appraise_type}, {@subj_type}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000002c0)=0x80, 0x2) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) write$hidraw(r3, &(0x7f0000000340)="39b0a85c1fe20c732238c7bf17723a5aafb211ab9ac530e9d3", 0x19) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0), r2) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x84, r4, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x2}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x3, 0x8, 0x6]}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x39}}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}]}, 0x84}, 0x1, 0x0, 0x0, 0x800}, 0x8010) r5 = ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r5) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, r0, {0x6}}, './file1\x00'}) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r0, &(0x7f0000000580)={0x80000000}) socketpair(0x11, 0x2, 0x1f, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$TIPC_CMD_SET_NODE_ADDR(r7, &(0x7f0000000640)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0}, 0xc0080) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000680)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r8, 0xc0189371, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) r9 = syz_mount_image$vfat(&(0x7f0000000700), &(0x7f0000000740)='./file1\x00', 0x2, 0x6, &(0x7f0000000b00)=[{&(0x7f0000000780)="3af73b17b2f40e227f8c4aaf1db8d70bd2a32e49b5abde2b9a1343b14ef11d4236ebc9e0f79a77580c5194bb36be4aed5b52b782716d639b41306187b5d264cc53916506eedd409caa271c0aeb5cd720fec7aa67eed30f8f508dfe4cc95af5dc6f067faedccf46bb296c89ec9a51a0a89247e1ededc1a7ba0c", 0x79, 0x8000}, {&(0x7f0000000800)="10daa81ce2f6c7fea33447bf2ad690a49c393b7a527de4c6723c3c3a29d1507374af4f4b27ec4823cea64cfd89a66e69f1c340ee381cff632857a67e591ef20ace5dad14ab706ae020ed43f413824cdc9fdb33624bc137b9c7f23ce016a889c76100d567701034ac1e29f88cba12f8b1c3e54df33aa4d06050527064f1f707d96249762e5332dfa5801652a0f3a170dda1", 0x91, 0x3}, {&(0x7f00000008c0)="88dc4cc242558b6ae26a21b427f13e4762eec85ca8d950a28c4866d67f61fe51b300b0a672d7a34570926e1614f427b82df8e6f7db7da6537264df6ac834e025c3aeb07af81588616a3c9d8ed5d1a3371204eb80c266ddb94c46f22870380391274810ec5d0012d2f25d94798c3dac965ad03ed88cdd60529ba9316d65ec3c55a32b03cae220961af740d2b9765eca38d5ee85be12fe318955aed1441feaa50820338f42388a5682db6319e9894dba76c4ef911148e7eebf9cf1843f7516fea18009838251a7053a968a5837772885690217794f1e3afc8fb7217ca6597a", 0xde, 0x2}, {&(0x7f00000009c0)="8b86466cf7712d8d23dd26a8a13e1d4064363ff903260aa03f220ba763f239a2253d96e12326d0e36d1edef5bc10fdf8450cfc5801bef0b990cc0ef9cb39691d06113f2f66495afe83926eb4a4cf6fe68c2279804436ede30edb79d9e417f0711574e26b2559ee8c48c12ad4e1668885cbb8b6aa20e87bba70e5e6e861f509c3f952a79944e169807d8a974c5e065ad9b853c95464cbf814ce6d0d1e0fa3a3a5df6fc5598986720a0f1358608f87dbeae1e74181e613e149c7ebc8859e", 0xbd, 0x2}, {&(0x7f0000000a80)="317d180049562ef4ba8530eacad13770c925c0a396dfe5d17bfb6bc35079ff9a440e67363c15a1d6c7c9ad59e24ba173d105abb55beef8", 0x37, 0xc3}, {&(0x7f0000000ac0)="076da493a19df1c53582408e2cf4780aace6aa4a8c87057e4e1f983b326f059da717d17b0a2043f9ea5805bcee02dc71148572921b26e6d1329c26a5810c6e", 0x3f, 0xcf}], 0x1044000, &(0x7f0000000bc0)={[{@shortname_lower}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsroot={'smackfsroot', 0x3d, '+*\''}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) openat(r9, &(0x7f0000000c40)='./file1\x00', 0x18801, 0x4) r10 = openat(0xffffffffffffff9c, &(0x7f0000000c80)='./file0\x00', 0x81, 0x1) execveat(r10, &(0x7f0000000cc0)='./file1\x00', &(0x7f0000000d40)=[&(0x7f0000000d00)='\x00'], &(0x7f0000000e00)=[&(0x7f0000000d80)='nnonumtail=1', &(0x7f0000000dc0)='nnonumtail=1'], 0x1000) [ 136.083426] loop7: detected capacity change from 0 to 16383 [ 136.128753] loop7: detected capacity change from 0 to 128 10:18:54 executing program 7: fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000000)=']!\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xff, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="1a574815b6185e042d60d885c18d7a134bb837a114917738f256e017f706ecc8bd051a9e88b2a77ce12138806e4a1f45c91f8e62cad166bc2051b5c89328", 0x3e, 0xfffffffffffffffe}], 0x1008002, &(0x7f0000000180)={[{@utf8no}, {@shortname_win95}, {@shortname_lower}, {@rodir}, {@nonumtail}, {@numtail}, {@shortname_win95}], [{@pcr}, {@measure}, {@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x30, 0x61, 0x63, 0x64, 0x34, 0x65, 0x34], 0x2d, [0x62, 0x36, 0x31, 0x63], 0x2d, [0x35, 0x36, 0x63, 0x31], 0x2d, [0x62, 0x15359d50cc9df773, 0x34, 0x57], 0x2d, [0x5c, 0x32, 0x66, 0x36, 0x66, 0x64, 0x35, 0x35]}}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfshat={'smackfshat', 0x3d, ']!\x00'}}, {@appraise_type}, {@subj_type}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000002c0)=0x80, 0x2) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) write$hidraw(r3, &(0x7f0000000340)="39b0a85c1fe20c732238c7bf17723a5aafb211ab9ac530e9d3", 0x19) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0), r2) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x84, r4, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x2}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x3, 0x8, 0x6]}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x39}}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}]}, 0x84}, 0x1, 0x0, 0x0, 0x800}, 0x8010) r5 = ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r5) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, r0, {0x6}}, './file1\x00'}) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r0, &(0x7f0000000580)={0x80000000}) socketpair(0x11, 0x2, 0x1f, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$TIPC_CMD_SET_NODE_ADDR(r7, &(0x7f0000000640)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0}, 0xc0080) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000680)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r8, 0xc0189371, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) r9 = syz_mount_image$vfat(&(0x7f0000000700), &(0x7f0000000740)='./file1\x00', 0x2, 0x6, &(0x7f0000000b00)=[{&(0x7f0000000780)="3af73b17b2f40e227f8c4aaf1db8d70bd2a32e49b5abde2b9a1343b14ef11d4236ebc9e0f79a77580c5194bb36be4aed5b52b782716d639b41306187b5d264cc53916506eedd409caa271c0aeb5cd720fec7aa67eed30f8f508dfe4cc95af5dc6f067faedccf46bb296c89ec9a51a0a89247e1ededc1a7ba0c", 0x79, 0x8000}, {&(0x7f0000000800)="10daa81ce2f6c7fea33447bf2ad690a49c393b7a527de4c6723c3c3a29d1507374af4f4b27ec4823cea64cfd89a66e69f1c340ee381cff632857a67e591ef20ace5dad14ab706ae020ed43f413824cdc9fdb33624bc137b9c7f23ce016a889c76100d567701034ac1e29f88cba12f8b1c3e54df33aa4d06050527064f1f707d96249762e5332dfa5801652a0f3a170dda1", 0x91, 0x3}, {&(0x7f00000008c0)="88dc4cc242558b6ae26a21b427f13e4762eec85ca8d950a28c4866d67f61fe51b300b0a672d7a34570926e1614f427b82df8e6f7db7da6537264df6ac834e025c3aeb07af81588616a3c9d8ed5d1a3371204eb80c266ddb94c46f22870380391274810ec5d0012d2f25d94798c3dac965ad03ed88cdd60529ba9316d65ec3c55a32b03cae220961af740d2b9765eca38d5ee85be12fe318955aed1441feaa50820338f42388a5682db6319e9894dba76c4ef911148e7eebf9cf1843f7516fea18009838251a7053a968a5837772885690217794f1e3afc8fb7217ca6597a", 0xde, 0x2}, {&(0x7f00000009c0)="8b86466cf7712d8d23dd26a8a13e1d4064363ff903260aa03f220ba763f239a2253d96e12326d0e36d1edef5bc10fdf8450cfc5801bef0b990cc0ef9cb39691d06113f2f66495afe83926eb4a4cf6fe68c2279804436ede30edb79d9e417f0711574e26b2559ee8c48c12ad4e1668885cbb8b6aa20e87bba70e5e6e861f509c3f952a79944e169807d8a974c5e065ad9b853c95464cbf814ce6d0d1e0fa3a3a5df6fc5598986720a0f1358608f87dbeae1e74181e613e149c7ebc8859e", 0xbd, 0x2}, {&(0x7f0000000a80)="317d180049562ef4ba8530eacad13770c925c0a396dfe5d17bfb6bc35079ff9a440e67363c15a1d6c7c9ad59e24ba173d105abb55beef8", 0x37, 0xc3}, {&(0x7f0000000ac0)="076da493a19df1c53582408e2cf4780aace6aa4a8c87057e4e1f983b326f059da717d17b0a2043f9ea5805bcee02dc71148572921b26e6d1329c26a5810c6e", 0x3f, 0xcf}], 0x1044000, &(0x7f0000000bc0)={[{@shortname_lower}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsroot={'smackfsroot', 0x3d, '+*\''}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) openat(r9, &(0x7f0000000c40)='./file1\x00', 0x18801, 0x4) r10 = openat(0xffffffffffffff9c, &(0x7f0000000c80)='./file0\x00', 0x81, 0x1) execveat(r10, &(0x7f0000000cc0)='./file1\x00', &(0x7f0000000d40)=[&(0x7f0000000d00)='\x00'], &(0x7f0000000e00)=[&(0x7f0000000d80)='nnonumtail=1', &(0x7f0000000dc0)='nnonumtail=1'], 0x1000) 10:18:54 executing program 5: ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000000)) bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x24040000) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x3, @link='broadcast-link\x00'}}}}, 0x68}}, 0x400d4) link(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000380)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000780)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x7f, "ac74680eaee4c7"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001780)={{0x0, 0x3, 0x9, 0x7, 0x7fffffff, 0x519, 0x7, 0x0, 0x40, 0x8, 0x3f, 0x3f, 0x3f, 0xfffffffffffffffd, 0x5}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002780)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002980)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002b80)={0x81, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "67b0e37f9967b3"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000003b80)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x4, "a46dfcdc0c77a1"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004b80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000004d80)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x2, "0d52c59a9bf452"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000005d80)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x3e, "cf171832716571"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000006d80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000006f80)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1f, "dfb4a050e9ac35"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007f80)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x81, "aaa61064b0763e"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000006cb80)={0x0, [{}, {}, {}, {}, {}, {0x0, r0}, {}, {r1}, {r2}, {r3, r4}, {}, {r5}, {}, {0x0, r6}, {}, {r7, r8}, {}, {}, {r9}, {}, {}, {}, {}, {0x0, r10}, {}, {0x0, r11}, {r12}, {0x0, r13}], 0x26, "d22c612109fee6"}) [ 136.422243] loop7: detected capacity change from 0 to 16383 10:19:08 executing program 4: ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x400}}, '.\x00'}) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040)={0x5, "bc7f48"}, 0x6) r1 = io_uring_setup(0x3c02, &(0x7f0000000080)={0x0, 0x77af, 0x0, 0x1, 0x166, 0x0, r0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x5, 0x1d0}}, './file0\x00'}) accept4$unix(r0, &(0x7f0000000140), &(0x7f00000001c0)=0x6e, 0x0) mknodat$loop(r2, &(0x7f0000000200)='./file0\x00', 0x100, 0x1) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {r3}}, './file0\x00'}) sendmsg$TIPC_CMD_SET_LINK_TOL(r5, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x68, 0x0, 0x200, 0x70bd2d, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0x1, @link='syz0\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4008005}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000054}, 0x40000c4) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x4000010, r5, 0x10000000) syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) io_uring_setup(0x131a, &(0x7f0000000940)={0x0, 0x6a03, 0x8, 0x1, 0x16c, 0x0, r7}) syz_genetlink_get_family_id$smc(&(0x7f00000009c0), r4) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x24, 0x0, 0x8, 0x70bd2a, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x1}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24000001}, 0x44000) 10:19:08 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000850) syz_genetlink_get_family_id$SEG6(&(0x7f0000000180), 0xffffffffffffffff) read$hidraw(0xffffffffffffffff, &(0x7f00000001c0)=""/177, 0xb1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000000280)=""/136, 0x88}, {&(0x7f0000000340)=""/58, 0x3a}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x3, &(0x7f00000013c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}, 0x40) sendmsg$SMC_PNETID_GET(r6, &(0x7f0000001540)={0xfffffffffffffffe, 0x0, &(0x7f0000001500)={&(0x7f0000001480)={0x60, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'nr0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv_slave_1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x60}}, 0x10) r10 = syz_genetlink_get_family_id$smc(&(0x7f00000015c0), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r6, &(0x7f00000016c0)={&(0x7f0000001580), 0xc, &(0x7f0000001680)={&(0x7f0000001600)={0x4c, r10, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000) r11 = syz_genetlink_get_family_id$smc(&(0x7f0000001740), r9) sendmsg$SMC_PNETID_DEL(r4, &(0x7f0000001800)={&(0x7f0000001700), 0xc, &(0x7f00000017c0)={&(0x7f0000001780)={0x20, r11, 0x400, 0x70bd26, 0x25dfdbff, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040004}, 0x4000) sendmsg$TIPC_CMD_GET_LINKS(r6, &(0x7f0000001900)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000018c0)={&(0x7f0000001880)={0x24, r0, 0x100, 0x70bd2b, 0x25dfdbfb, {{}, {}, {0x8, 0x11, 0x81}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0xb101409338bc67e5}, 0x4000000) r12 = syz_genetlink_get_family_id$tipc(&(0x7f0000001980), r6) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000001a40)={&(0x7f0000001940)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001a00)={&(0x7f00000019c0)={0x1c, r12, 0xa08, 0x70bd28, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) clock_getres(0x1, &(0x7f0000001a80)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000001b00)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) syz_genetlink_get_family_id$gtp(&(0x7f0000001ac0), r13) r14 = syz_genetlink_get_family_id$tipc(&(0x7f0000001b80), r6) sendmsg$TIPC_CMD_SHOW_PORTS(r8, &(0x7f0000001c40)={&(0x7f0000001b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001c00)={&(0x7f0000001bc0)={0x1c, r14, 0x8, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x5) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r7, &(0x7f0000001c80)={r8, 0xffffffffffffffff, 0x3f}) 10:19:08 executing program 5: ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000000)) bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x24040000) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x3, @link='broadcast-link\x00'}}}}, 0x68}}, 0x400d4) link(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000380)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000780)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x7f, "ac74680eaee4c7"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001780)={{0x0, 0x3, 0x9, 0x7, 0x7fffffff, 0x519, 0x7, 0x0, 0x40, 0x8, 0x3f, 0x3f, 0x3f, 0xfffffffffffffffd, 0x5}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002780)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002980)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002b80)={0x81, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "67b0e37f9967b3"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000003b80)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x4, "a46dfcdc0c77a1"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004b80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000004d80)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x2, "0d52c59a9bf452"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000005d80)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x3e, "cf171832716571"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000006d80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000006f80)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1f, "dfb4a050e9ac35"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007f80)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x81, "aaa61064b0763e"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000006cb80)={0x0, [{}, {}, {}, {}, {}, {0x0, r0}, {}, {r1}, {r2}, {r3, r4}, {}, {r5}, {}, {0x0, r6}, {}, {r7, r8}, {}, {}, {r9}, {}, {}, {}, {}, {0x0, r10}, {}, {0x0, r11}, {r12}, {0x0, r13}], 0x26, "d22c612109fee6"}) 10:19:08 executing program 6: r0 = memfd_secret(0x80000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x0, 0x400, 0x70bd27, 0x25dfdbff, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r3 = gettid() sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x48, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {{}, {@void, @void, @val={0xc, 0x99, {0xff, 0x75}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x7b}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x73}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r0}, @NL80211_ATTR_PID={0x8, 0x52, r3}]}, 0x48}}, 0x44000) ptrace$setregs(0xf, 0x0, 0x5, &(0x7f00000003c0)="bdd67d59efde8cf926ccf0b712fbd0577bc1c988990bf6a06795764c0463d0ea41a21b9a7335a7b330e53feed0cae6") r4 = gettid() rt_sigqueueinfo(r4, 0x12, &(0x7f0000000400)={0x27, 0x6, 0x6}) r5 = socket(0x1a, 0x800, 0x2) sendmsg$SMC_PNETID_ADD(r5, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x48, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x2000000) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x8080}, 0x4000000) sched_rr_get_interval(r3, &(0x7f00000006c0)) lgetxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)=@known='system.sockprotoname\x00', &(0x7f0000000780)=""/153, 0x99) r6 = getuid() recvmsg$unix(r2, &(0x7f0000000ac0)={&(0x7f0000000880)=@abs, 0x6e, &(0x7f0000000980)=[{&(0x7f0000000900)=""/66, 0x42}], 0x1, &(0x7f00000009c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xd8}, 0x40002000) chown(&(0x7f0000000840)='./file0\x00', r6, r7) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000b00)=0x2, 0x4) ioctl$NS_GET_USERNS(r8, 0xb701, 0x0) 10:19:08 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000240)='htcp\x00', 0x5) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000280)=0x7f, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0}) r1 = inotify_init1(0x40800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000340)={r0, 0x2, r1, 0x8001}) r2 = memfd_secret(0x80000) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000380)={{0x1, 0x1, 0x18, r2, {0x100, 0x10000000}}, './file0\x00'}) ioctl$sock_bt_hci(r3, 0x2002247a, &(0x7f00000003c0)="f97cfacb0a11a31519e7b55d887f5d15f603e0d2e3eb2ac027d5d0b0170ec9012d43c68983e3f4c8806c76d661da13d9d5db6af5f4050fe24907a61dcb74969fca85fcf37b5359adcc3c9d1a") ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000440)=0x4) ioctl$AUTOFS_DEV_IOCTL_VERSION(r3, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18}, './file1\x00'}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000540)="71aa618f1066790b9ca7541b4637fb294ba0770f11958bd3265df874beb7943d8fdd18d4dacc7eb8de52b3da7ea083d35b56c0074821544b4062191ca72b2c5d128f2db5df59ad4df7d10cbc0735db772779866453b28081a22a8f8826a107bdb4f9d868ff331ac455c393d117e3b894a95cad256fcacacb2fd1129cf44944cf07f2d84aae0feac5cbfce71180f01d748d1c1d6d441b01b610a382493dfb77d2d60b37f2656d04218aeda7b3ad916b23ea5fab46ece2dc0edac8f260a30565b5b9cc4f6a", 0xc4}, {&(0x7f0000000640)="ffc85f3b71943fe3526e3145dfe0cdda0ae4c9507ec01b97275e9599527c6338cc1341d439012c2122c79d3fac444f27f9a9fce36dc0235bc09c02b4f8c4c4e331de9353c853cf9e1635a10b75f07d6d289856404d", 0x55}, {&(0x7f00000006c0)="63014dee3bbcf8e3a506f749b91216cc2916b6d52a8a92b5e9200aeb849b675a3f789c82b288899349f5b8d5913aca2423276479db9d58d7b832e923de7bb69b5a85669bcb5076d1db7ff81e5dead29da52924b091ff8889b0985e7fa982d52ca2f47cd32fe42b9f8f3266e60045a27a74947f36ecbb4fb45361dd7aa4a86a2cffb129731cfc054eb7579c18931bfe1490c843366ba4322156849e4617acc27685", 0xa1}], 0x3, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x20, 0x80}, 0x40000) 10:19:08 executing program 7: fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000000)=']!\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xff, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="1a574815b6185e042d60d885c18d7a134bb837a114917738f256e017f706ecc8bd051a9e88b2a77ce12138806e4a1f45c91f8e62cad166bc2051b5c89328", 0x3e, 0xfffffffffffffffe}], 0x1008002, &(0x7f0000000180)={[{@utf8no}, {@shortname_win95}, {@shortname_lower}, {@rodir}, {@nonumtail}, {@numtail}, {@shortname_win95}], [{@pcr}, {@measure}, {@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x30, 0x61, 0x63, 0x64, 0x34, 0x65, 0x34], 0x2d, [0x62, 0x36, 0x31, 0x63], 0x2d, [0x35, 0x36, 0x63, 0x31], 0x2d, [0x62, 0x15359d50cc9df773, 0x34, 0x57], 0x2d, [0x5c, 0x32, 0x66, 0x36, 0x66, 0x64, 0x35, 0x35]}}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfshat={'smackfshat', 0x3d, ']!\x00'}}, {@appraise_type}, {@subj_type}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000002c0)=0x80, 0x2) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) write$hidraw(r3, &(0x7f0000000340)="39b0a85c1fe20c732238c7bf17723a5aafb211ab9ac530e9d3", 0x19) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0), r2) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x84, r4, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x2}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x3, 0x8, 0x6]}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x39}}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}]}, 0x84}, 0x1, 0x0, 0x0, 0x800}, 0x8010) r5 = ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r5) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, r0, {0x6}}, './file1\x00'}) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r0, &(0x7f0000000580)={0x80000000}) socketpair(0x11, 0x2, 0x1f, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$TIPC_CMD_SET_NODE_ADDR(r7, &(0x7f0000000640)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0}, 0xc0080) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000680)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r8, 0xc0189371, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) r9 = syz_mount_image$vfat(&(0x7f0000000700), &(0x7f0000000740)='./file1\x00', 0x2, 0x6, &(0x7f0000000b00)=[{&(0x7f0000000780)="3af73b17b2f40e227f8c4aaf1db8d70bd2a32e49b5abde2b9a1343b14ef11d4236ebc9e0f79a77580c5194bb36be4aed5b52b782716d639b41306187b5d264cc53916506eedd409caa271c0aeb5cd720fec7aa67eed30f8f508dfe4cc95af5dc6f067faedccf46bb296c89ec9a51a0a89247e1ededc1a7ba0c", 0x79, 0x8000}, {&(0x7f0000000800)="10daa81ce2f6c7fea33447bf2ad690a49c393b7a527de4c6723c3c3a29d1507374af4f4b27ec4823cea64cfd89a66e69f1c340ee381cff632857a67e591ef20ace5dad14ab706ae020ed43f413824cdc9fdb33624bc137b9c7f23ce016a889c76100d567701034ac1e29f88cba12f8b1c3e54df33aa4d06050527064f1f707d96249762e5332dfa5801652a0f3a170dda1", 0x91, 0x3}, {&(0x7f00000008c0)="88dc4cc242558b6ae26a21b427f13e4762eec85ca8d950a28c4866d67f61fe51b300b0a672d7a34570926e1614f427b82df8e6f7db7da6537264df6ac834e025c3aeb07af81588616a3c9d8ed5d1a3371204eb80c266ddb94c46f22870380391274810ec5d0012d2f25d94798c3dac965ad03ed88cdd60529ba9316d65ec3c55a32b03cae220961af740d2b9765eca38d5ee85be12fe318955aed1441feaa50820338f42388a5682db6319e9894dba76c4ef911148e7eebf9cf1843f7516fea18009838251a7053a968a5837772885690217794f1e3afc8fb7217ca6597a", 0xde, 0x2}, {&(0x7f00000009c0)="8b86466cf7712d8d23dd26a8a13e1d4064363ff903260aa03f220ba763f239a2253d96e12326d0e36d1edef5bc10fdf8450cfc5801bef0b990cc0ef9cb39691d06113f2f66495afe83926eb4a4cf6fe68c2279804436ede30edb79d9e417f0711574e26b2559ee8c48c12ad4e1668885cbb8b6aa20e87bba70e5e6e861f509c3f952a79944e169807d8a974c5e065ad9b853c95464cbf814ce6d0d1e0fa3a3a5df6fc5598986720a0f1358608f87dbeae1e74181e613e149c7ebc8859e", 0xbd, 0x2}, {&(0x7f0000000a80)="317d180049562ef4ba8530eacad13770c925c0a396dfe5d17bfb6bc35079ff9a440e67363c15a1d6c7c9ad59e24ba173d105abb55beef8", 0x37, 0xc3}, {&(0x7f0000000ac0)="076da493a19df1c53582408e2cf4780aace6aa4a8c87057e4e1f983b326f059da717d17b0a2043f9ea5805bcee02dc71148572921b26e6d1329c26a5810c6e", 0x3f, 0xcf}], 0x1044000, &(0x7f0000000bc0)={[{@shortname_lower}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsroot={'smackfsroot', 0x3d, '+*\''}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) openat(r9, &(0x7f0000000c40)='./file1\x00', 0x18801, 0x4) r10 = openat(0xffffffffffffff9c, &(0x7f0000000c80)='./file0\x00', 0x81, 0x1) execveat(r10, &(0x7f0000000cc0)='./file1\x00', &(0x7f0000000d40)=[&(0x7f0000000d00)='\x00'], &(0x7f0000000e00)=[&(0x7f0000000d80)='nnonumtail=1', &(0x7f0000000dc0)='nnonumtail=1'], 0x1000) 10:19:08 executing program 1: ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8001, 0x1}}, './file0\x00'}) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) r1 = gettid() syz_open_procfs$namespace(r1, &(0x7f0000000040)='ns/ipc\x00') ptrace$peeksig(0x4209, r1, &(0x7f0000000080)={0x7ff, 0x0, 0x1}, &(0x7f00000000c0)=[{}]) ioctl$HIDIOCGRDESC(r0, 0x90044802, &(0x7f0000000140)={0x19, "d477f42664344f7d3bb8d47f61601055e8383704671c6b1454"}) getpriority(0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x10900, 0x88) recvmsg$unix(r2, &(0x7f0000000480)={&(0x7f00000001c0), 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/25, 0x19}, {&(0x7f0000000280)=""/46, 0x2e}], 0x2, &(0x7f0000000300)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x150}, 0x2041) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r6, 0xc0189379, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r8 = memfd_secret(0x80000) accept$unix(r8, 0x0, &(0x7f0000000500)) ioctl$NS_GET_NSTYPE(r3, 0xb703, 0x0) r9 = syz_genetlink_get_family_id$smc(&(0x7f0000000580), r4) sendmsg$SMC_PNETID_DEL(r5, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x34, r9, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) getuid() r10 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0), r2) sendmsg$TIPC_CMD_SET_NETID(r7, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r10, 0x5597dd26b7b66778, 0x70bd27, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x200}}, ["", "", "", ""]}, 0x24}}, 0x4000080) 10:19:08 executing program 0: setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)={0x8, "e3c5e2"}, 0x6) r0 = fsopen(&(0x7f0000000040)='cgroup\x00', 0x8d07077d4dd54d41) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x125180, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, 0x0, 0x800, 0x70bd29, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x6, @link='syz0\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x810}, 0x20000008) r3 = accept4$unix(r2, 0x0, &(0x7f0000000240), 0x800) newfstatat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) mount$cgroup2(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x400, &(0x7f00000003c0)={[{@subsystem='cpu'}, {@memory_recursiveprot}, {@subsystem='pids'}, {@subsystem='hugetlb'}, {}, {@memory_localevents}, {@memory_recursiveprot}, {@memory_recursiveprot}], [{@dont_appraise}, {@obj_role={'obj_role', 0x3d, '!'}}, {@euid_eq={'euid', 0x3d, r4}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'cgroup\x00'}}, {@euid_lt}, {@appraise}, {@subj_user={'subj_user', 0x3d, '\''}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\'}[*'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x34, 0x31, 0x64, 0x32, 0x3d9af854c7cdb0c2, 0x57, 0x64], 0x2d, [0x35, 0x39, 0x36, 0x66], 0x2d, [0x61, 0x31, 0x38, 0x31], 0x2d, [0x32, 0x32, 0x35, 0x36], 0x2d, [0x64, 0x61, 0x64, 0x30, 0x36, 0x38, 0x38, 0x63]}}}]}) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x68, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x196, @media='udp\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40800}, 0x4004000) ptrace$setregs(0xd, 0x0, 0x50, &(0x7f0000000640)="7ff032286d7cb70dc4687c2cb7940b61a91a7a7d2ac1bafcf00b1ddad49e3668e779fdb5c321a7d2649e6ed0467be863cf05eb0af6617c3d27553bcde3d92af8de2e613b9a17f00624f8531eaf0621b4d215b68d170f77f52fa5b77ccf6630353e4a487818ca16802ddbf34456d580b910b88dc8b8122b814fef2a3c9225465f4ce86f31a2d82d490e9d51f98ce8359428eb") sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x7c, 0x0, 0x100, 0x70bd25, 0x25dfdbff, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'hsr0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'team0\x00'}]}, 0x7c}}, 0x4000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000840)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r5, 0xc0189379, &(0x7f0000000880)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) lsetxattr$security_capability(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900), &(0x7f0000000940)=@v1={0x1000000, [{0x80, 0x5}]}, 0xc, 0x3) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x1c, 0x0, 0x8, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a80), r5) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) r8 = syz_genetlink_get_family_id$smc(&(0x7f0000000b40), r5) sendmsg$SMC_PNETID_GET(r7, &(0x7f0000000c40)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000c00)={&(0x7f0000000b80)={0x48, r8, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x40080}, 0x40800) [ 150.218732] loop7: detected capacity change from 0 to 16383 10:19:08 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000240)='htcp\x00', 0x5) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000280)=0x7f, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0}) r1 = inotify_init1(0x40800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000340)={r0, 0x2, r1, 0x8001}) r2 = memfd_secret(0x80000) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000380)={{0x1, 0x1, 0x18, r2, {0x100, 0x10000000}}, './file0\x00'}) ioctl$sock_bt_hci(r3, 0x2002247a, &(0x7f00000003c0)="f97cfacb0a11a31519e7b55d887f5d15f603e0d2e3eb2ac027d5d0b0170ec9012d43c68983e3f4c8806c76d661da13d9d5db6af5f4050fe24907a61dcb74969fca85fcf37b5359adcc3c9d1a") ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000440)=0x4) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000540)="71aa618f1066790b9ca7541b4637fb294ba0770f11958bd3265df874beb7943d8fdd18d4dacc7eb8de52b3da7ea083d35b56c0074821544b4062191ca72b2c5d128f2db5df59ad4df7d10cbc0735db772779866453b28081a22a8f8826a107bdb4f9d868ff331ac455c393d117e3b894a95cad256fcacacb2fd1129cf44944cf07f2d84aae0feac5cbfce71180f01d748d1c1d6d441b01b610a382493dfb77d2d60b37f2656d04218aeda7b3ad916b23ea5fab46ece2dc0edac8f260a30565b5b9cc4f6a", 0xc4}, {&(0x7f0000000640)="ffc85f3b71943fe3526e3145dfe0cdda0ae4c9507ec01b97275e9599527c6338cc1341d439012c2122c79d3fac444f27f9a9fce36dc0235bc09c02b4f8c4c4e331de9353c853cf9e1635a10b75f07d6d289856404d", 0x55}, {&(0x7f00000006c0)="63014dee3bbcf8e3a506f749b91216cc2916b6d52a8a92b5e9200aeb849b675a3f789c82b288899349f5b8d5913aca2423276479db9d58d7b832e923de7bb69b5a85669bcb5076d1db7ff81e5dead29da52924b091ff8889b0985e7fa982d52ca2f47cd32fe42b9f8f3266e60045a27a74947f36ecbb4fb45361dd7aa4a86a2cffb129731cfc054eb7579c18931bfe1490c843366ba4322156849e4617acc27685", 0xa1}], 0x3, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x20, 0x80}, 0x40000) [ 150.278172] loop7: detected capacity change from 0 to 128 10:19:08 executing program 6: r0 = memfd_secret(0x80000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x0, 0x400, 0x70bd27, 0x25dfdbff, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r3 = gettid() sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x48, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {{}, {@void, @void, @val={0xc, 0x99, {0xff, 0x75}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x7b}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x73}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r0}, @NL80211_ATTR_PID={0x8, 0x52, r3}]}, 0x48}}, 0x44000) ptrace$setregs(0xf, 0x0, 0x5, &(0x7f00000003c0)="bdd67d59efde8cf926ccf0b712fbd0577bc1c988990bf6a06795764c0463d0ea41a21b9a7335a7b330e53feed0cae6") r4 = gettid() rt_sigqueueinfo(r4, 0x12, &(0x7f0000000400)={0x27, 0x6, 0x6}) r5 = socket(0x1a, 0x800, 0x2) sendmsg$SMC_PNETID_ADD(r5, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x48, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x2000000) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x8080}, 0x4000000) sched_rr_get_interval(r3, &(0x7f00000006c0)) lgetxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)=@known='system.sockprotoname\x00', &(0x7f0000000780)=""/153, 0x99) r6 = getuid() recvmsg$unix(r2, &(0x7f0000000ac0)={&(0x7f0000000880)=@abs, 0x6e, &(0x7f0000000980)=[{&(0x7f0000000900)=""/66, 0x42}], 0x1, &(0x7f00000009c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xd8}, 0x40002000) chown(&(0x7f0000000840)='./file0\x00', r6, r7) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000b00)=0x2, 0x4) ioctl$NS_GET_USERNS(r8, 0xb701, 0x0) 10:19:08 executing program 5: ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000000)) bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x24040000) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x3, @link='broadcast-link\x00'}}}}, 0x68}}, 0x400d4) link(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000780)={0x0, [], 0x7f, "ac74680eaee4c7"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001780)={{0x0, 0x3, 0x9, 0x7, 0x7fffffff, 0x519, 0x7, 0x0, 0x40, 0x8, 0x3f, 0x3f, 0x3f, 0xfffffffffffffffd, 0x5}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002780)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002980)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002b80)={0x81, [], 0x0, "67b0e37f9967b3"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000003b80)={0x0, [], 0x4, "a46dfcdc0c77a1"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004b80)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000004d80)={0x3, [], 0x2, "0d52c59a9bf452"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000005d80)={0x8, [], 0x3e, "cf171832716571"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000006d80)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000006f80)={0x7, [], 0x1f, "dfb4a050e9ac35"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007f80)={0x2, [], 0x81, "aaa61064b0763e"}) 10:19:08 executing program 7: fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000000)=']!\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xff, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="1a574815b6185e042d60d885c18d7a134bb837a114917738f256e017f706ecc8bd051a9e88b2a77ce12138806e4a1f45c91f8e62cad166bc2051b5c89328", 0x3e, 0xfffffffffffffffe}], 0x1008002, &(0x7f0000000180)={[{@utf8no}, {@shortname_win95}, {@shortname_lower}, {@rodir}, {@nonumtail}, {@numtail}, {@shortname_win95}], [{@pcr}, {@measure}, {@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x30, 0x61, 0x63, 0x64, 0x34, 0x65, 0x34], 0x2d, [0x62, 0x36, 0x31, 0x63], 0x2d, [0x35, 0x36, 0x63, 0x31], 0x2d, [0x62, 0x15359d50cc9df773, 0x34, 0x57], 0x2d, [0x5c, 0x32, 0x66, 0x36, 0x66, 0x64, 0x35, 0x35]}}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfshat={'smackfshat', 0x3d, ']!\x00'}}, {@appraise_type}, {@subj_type}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000002c0)=0x80, 0x2) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) write$hidraw(r3, &(0x7f0000000340)="39b0a85c1fe20c732238c7bf17723a5aafb211ab9ac530e9d3", 0x19) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0), r2) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x84, r4, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x2}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x3, 0x8, 0x6]}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x39}}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}]}, 0x84}, 0x1, 0x0, 0x0, 0x800}, 0x8010) r5 = ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r5) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, r0, {0x6}}, './file1\x00'}) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r0, &(0x7f0000000580)={0x80000000}) socketpair(0x11, 0x2, 0x1f, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$TIPC_CMD_SET_NODE_ADDR(r7, &(0x7f0000000640)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0}, 0xc0080) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000680)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r8, 0xc0189371, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) r9 = syz_mount_image$vfat(&(0x7f0000000700), &(0x7f0000000740)='./file1\x00', 0x2, 0x6, &(0x7f0000000b00)=[{&(0x7f0000000780)="3af73b17b2f40e227f8c4aaf1db8d70bd2a32e49b5abde2b9a1343b14ef11d4236ebc9e0f79a77580c5194bb36be4aed5b52b782716d639b41306187b5d264cc53916506eedd409caa271c0aeb5cd720fec7aa67eed30f8f508dfe4cc95af5dc6f067faedccf46bb296c89ec9a51a0a89247e1ededc1a7ba0c", 0x79, 0x8000}, {&(0x7f0000000800)="10daa81ce2f6c7fea33447bf2ad690a49c393b7a527de4c6723c3c3a29d1507374af4f4b27ec4823cea64cfd89a66e69f1c340ee381cff632857a67e591ef20ace5dad14ab706ae020ed43f413824cdc9fdb33624bc137b9c7f23ce016a889c76100d567701034ac1e29f88cba12f8b1c3e54df33aa4d06050527064f1f707d96249762e5332dfa5801652a0f3a170dda1", 0x91, 0x3}, {&(0x7f00000008c0)="88dc4cc242558b6ae26a21b427f13e4762eec85ca8d950a28c4866d67f61fe51b300b0a672d7a34570926e1614f427b82df8e6f7db7da6537264df6ac834e025c3aeb07af81588616a3c9d8ed5d1a3371204eb80c266ddb94c46f22870380391274810ec5d0012d2f25d94798c3dac965ad03ed88cdd60529ba9316d65ec3c55a32b03cae220961af740d2b9765eca38d5ee85be12fe318955aed1441feaa50820338f42388a5682db6319e9894dba76c4ef911148e7eebf9cf1843f7516fea18009838251a7053a968a5837772885690217794f1e3afc8fb7217ca6597a", 0xde, 0x2}, {&(0x7f00000009c0)="8b86466cf7712d8d23dd26a8a13e1d4064363ff903260aa03f220ba763f239a2253d96e12326d0e36d1edef5bc10fdf8450cfc5801bef0b990cc0ef9cb39691d06113f2f66495afe83926eb4a4cf6fe68c2279804436ede30edb79d9e417f0711574e26b2559ee8c48c12ad4e1668885cbb8b6aa20e87bba70e5e6e861f509c3f952a79944e169807d8a974c5e065ad9b853c95464cbf814ce6d0d1e0fa3a3a5df6fc5598986720a0f1358608f87dbeae1e74181e613e149c7ebc8859e", 0xbd, 0x2}, {&(0x7f0000000a80)="317d180049562ef4ba8530eacad13770c925c0a396dfe5d17bfb6bc35079ff9a440e67363c15a1d6c7c9ad59e24ba173d105abb55beef8", 0x37, 0xc3}, {&(0x7f0000000ac0)="076da493a19df1c53582408e2cf4780aace6aa4a8c87057e4e1f983b326f059da717d17b0a2043f9ea5805bcee02dc71148572921b26e6d1329c26a5810c6e", 0x3f, 0xcf}], 0x1044000, &(0x7f0000000bc0)={[{@shortname_lower}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsroot={'smackfsroot', 0x3d, '+*\''}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) openat(r9, &(0x7f0000000c40)='./file1\x00', 0x18801, 0x4) execveat(0xffffffffffffffff, &(0x7f0000000cc0)='./file1\x00', &(0x7f0000000d40)=[&(0x7f0000000d00)='\x00'], &(0x7f0000000e00)=[&(0x7f0000000d80)='nnonumtail=1', &(0x7f0000000dc0)='nnonumtail=1'], 0x1000) 10:19:08 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000850) syz_genetlink_get_family_id$SEG6(&(0x7f0000000180), 0xffffffffffffffff) read$hidraw(0xffffffffffffffff, &(0x7f00000001c0)=""/177, 0xb1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000000280)=""/136, 0x88}, {&(0x7f0000000340)=""/58, 0x3a}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x3, &(0x7f00000013c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}, 0x40) sendmsg$SMC_PNETID_GET(r6, &(0x7f0000001540)={0xfffffffffffffffe, 0x0, &(0x7f0000001500)={&(0x7f0000001480)={0x60, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'nr0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv_slave_1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x60}}, 0x10) r10 = syz_genetlink_get_family_id$smc(&(0x7f00000015c0), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r6, &(0x7f00000016c0)={&(0x7f0000001580), 0xc, &(0x7f0000001680)={&(0x7f0000001600)={0x4c, r10, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000) r11 = syz_genetlink_get_family_id$smc(&(0x7f0000001740), r9) sendmsg$SMC_PNETID_DEL(r4, &(0x7f0000001800)={&(0x7f0000001700), 0xc, &(0x7f00000017c0)={&(0x7f0000001780)={0x20, r11, 0x400, 0x70bd26, 0x25dfdbff, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040004}, 0x4000) sendmsg$TIPC_CMD_GET_LINKS(r6, &(0x7f0000001900)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000018c0)={&(0x7f0000001880)={0x24, r0, 0x100, 0x70bd2b, 0x25dfdbfb, {{}, {}, {0x8, 0x11, 0x81}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0xb101409338bc67e5}, 0x4000000) r12 = syz_genetlink_get_family_id$tipc(&(0x7f0000001980), r6) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000001a40)={&(0x7f0000001940)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001a00)={&(0x7f00000019c0)={0x1c, r12, 0xa08, 0x70bd28, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) clock_getres(0x1, &(0x7f0000001a80)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000001b00)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) syz_genetlink_get_family_id$gtp(&(0x7f0000001ac0), r13) r14 = syz_genetlink_get_family_id$tipc(&(0x7f0000001b80), r6) sendmsg$TIPC_CMD_SHOW_PORTS(r8, &(0x7f0000001c40)={&(0x7f0000001b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001c00)={&(0x7f0000001bc0)={0x1c, r14, 0x8, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x5) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r7, &(0x7f0000001c80)={r8, 0xffffffffffffffff, 0x3f}) 10:19:08 executing program 4: ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x400}}, '.\x00'}) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040)={0x5, "bc7f48"}, 0x6) r1 = io_uring_setup(0x3c02, &(0x7f0000000080)={0x0, 0x77af, 0x0, 0x1, 0x166, 0x0, r0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x5, 0x1d0}}, './file0\x00'}) accept4$unix(r0, &(0x7f0000000140), &(0x7f00000001c0)=0x6e, 0x0) mknodat$loop(r2, &(0x7f0000000200)='./file0\x00', 0x100, 0x1) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {r3}}, './file0\x00'}) sendmsg$TIPC_CMD_SET_LINK_TOL(r5, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x68, 0x0, 0x200, 0x70bd2d, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0x1, @link='syz0\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4008005}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000054}, 0x40000c4) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x4000010, r5, 0x10000000) syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) io_uring_setup(0x131a, &(0x7f0000000940)={0x0, 0x6a03, 0x8, 0x1, 0x16c, 0x0, r7}) syz_genetlink_get_family_id$smc(&(0x7f00000009c0), r4) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x24, 0x0, 0x8, 0x70bd2a, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x1}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24000001}, 0x44000) 10:19:08 executing program 5: ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000000)) bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x24040000) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x3, @link='broadcast-link\x00'}}}}, 0x68}}, 0x400d4) link(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000780)={0x0, [], 0x7f, "ac74680eaee4c7"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001780)={{0x0, 0x3, 0x9, 0x7, 0x7fffffff, 0x519, 0x7, 0x0, 0x40, 0x8, 0x3f, 0x3f, 0x3f, 0xfffffffffffffffd, 0x5}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002780)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002980)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002b80)={0x81, [], 0x0, "67b0e37f9967b3"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000003b80)={0x0, [], 0x4, "a46dfcdc0c77a1"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004b80)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000004d80)={0x3, [], 0x2, "0d52c59a9bf452"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000005d80)={0x8, [], 0x3e, "cf171832716571"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000006d80)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000006f80)={0x7, [], 0x1f, "dfb4a050e9ac35"}) 10:19:08 executing program 0: setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)={0x8, "e3c5e2"}, 0x6) r0 = fsopen(&(0x7f0000000040)='cgroup\x00', 0x8d07077d4dd54d41) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x125180, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, 0x0, 0x800, 0x70bd29, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x6, @link='syz0\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x810}, 0x20000008) r3 = accept4$unix(r2, 0x0, &(0x7f0000000240), 0x800) newfstatat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) mount$cgroup2(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x400, &(0x7f00000003c0)={[{@subsystem='cpu'}, {@memory_recursiveprot}, {@subsystem='pids'}, {@subsystem='hugetlb'}, {}, {@memory_localevents}, {@memory_recursiveprot}, {@memory_recursiveprot}], [{@dont_appraise}, {@obj_role={'obj_role', 0x3d, '!'}}, {@euid_eq={'euid', 0x3d, r4}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'cgroup\x00'}}, {@euid_lt}, {@appraise}, {@subj_user={'subj_user', 0x3d, '\''}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\'}[*'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x34, 0x31, 0x64, 0x32, 0x3d9af854c7cdb0c2, 0x57, 0x64], 0x2d, [0x35, 0x39, 0x36, 0x66], 0x2d, [0x61, 0x31, 0x38, 0x31], 0x2d, [0x32, 0x32, 0x35, 0x36], 0x2d, [0x64, 0x61, 0x64, 0x30, 0x36, 0x38, 0x38, 0x63]}}}]}) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x68, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x196, @media='udp\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40800}, 0x4004000) ptrace$setregs(0xd, 0x0, 0x50, &(0x7f0000000640)="7ff032286d7cb70dc4687c2cb7940b61a91a7a7d2ac1bafcf00b1ddad49e3668e779fdb5c321a7d2649e6ed0467be863cf05eb0af6617c3d27553bcde3d92af8de2e613b9a17f00624f8531eaf0621b4d215b68d170f77f52fa5b77ccf6630353e4a487818ca16802ddbf34456d580b910b88dc8b8122b814fef2a3c9225465f4ce86f31a2d82d490e9d51f98ce8359428eb") sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x7c, 0x0, 0x100, 0x70bd25, 0x25dfdbff, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'hsr0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'team0\x00'}]}, 0x7c}}, 0x4000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000840)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r5, 0xc0189379, &(0x7f0000000880)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) lsetxattr$security_capability(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900), &(0x7f0000000940)=@v1={0x1000000, [{0x80, 0x5}]}, 0xc, 0x3) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x1c, 0x0, 0x8, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a80), r5) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) r8 = syz_genetlink_get_family_id$smc(&(0x7f0000000b40), r5) sendmsg$SMC_PNETID_GET(r7, &(0x7f0000000c40)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000c00)={&(0x7f0000000b80)={0x48, r8, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x40080}, 0x40800) [ 150.660514] loop7: detected capacity change from 0 to 16383 10:19:08 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000240)='htcp\x00', 0x5) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000280)=0x7f, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0}) r1 = inotify_init1(0x40800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000340)={r0, 0x2, r1, 0x8001}) r2 = memfd_secret(0x80000) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000380)={{0x1, 0x1, 0x18, r2, {0x100, 0x10000000}}, './file0\x00'}) ioctl$sock_bt_hci(r3, 0x2002247a, &(0x7f00000003c0)="f97cfacb0a11a31519e7b55d887f5d15f603e0d2e3eb2ac027d5d0b0170ec9012d43c68983e3f4c8806c76d661da13d9d5db6af5f4050fe24907a61dcb74969fca85fcf37b5359adcc3c9d1a") sendmsg$unix(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000540)="71aa618f1066790b9ca7541b4637fb294ba0770f11958bd3265df874beb7943d8fdd18d4dacc7eb8de52b3da7ea083d35b56c0074821544b4062191ca72b2c5d128f2db5df59ad4df7d10cbc0735db772779866453b28081a22a8f8826a107bdb4f9d868ff331ac455c393d117e3b894a95cad256fcacacb2fd1129cf44944cf07f2d84aae0feac5cbfce71180f01d748d1c1d6d441b01b610a382493dfb77d2d60b37f2656d04218aeda7b3ad916b23ea5fab46ece2dc0edac8f260a30565b5b9cc4f6a", 0xc4}, {&(0x7f0000000640)="ffc85f3b71943fe3526e3145dfe0cdda0ae4c9507ec01b97275e9599527c6338cc1341d439012c2122c79d3fac444f27f9a9fce36dc0235bc09c02b4f8c4c4e331de9353c853cf9e1635a10b75f07d6d289856404d", 0x55}, {&(0x7f00000006c0)="63014dee3bbcf8e3a506f749b91216cc2916b6d52a8a92b5e9200aeb849b675a3f789c82b288899349f5b8d5913aca2423276479db9d58d7b832e923de7bb69b5a85669bcb5076d1db7ff81e5dead29da52924b091ff8889b0985e7fa982d52ca2f47cd32fe42b9f8f3266e60045a27a74947f36ecbb4fb45361dd7aa4a86a2cffb129731cfc054eb7579c18931bfe1490c843366ba4322156849e4617acc27685", 0xa1}], 0x3, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x20, 0x80}, 0x40000) 10:19:19 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000850) syz_genetlink_get_family_id$SEG6(&(0x7f0000000180), 0xffffffffffffffff) read$hidraw(0xffffffffffffffff, &(0x7f00000001c0)=""/177, 0xb1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000000280)=""/136, 0x88}, {&(0x7f0000000340)=""/58, 0x3a}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x3, &(0x7f00000013c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}, 0x40) sendmsg$SMC_PNETID_GET(r6, &(0x7f0000001540)={0xfffffffffffffffe, 0x0, &(0x7f0000001500)={&(0x7f0000001480)={0x60, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'nr0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv_slave_1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x60}}, 0x10) r10 = syz_genetlink_get_family_id$smc(&(0x7f00000015c0), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r6, &(0x7f00000016c0)={&(0x7f0000001580), 0xc, &(0x7f0000001680)={&(0x7f0000001600)={0x4c, r10, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000) r11 = syz_genetlink_get_family_id$smc(&(0x7f0000001740), r9) sendmsg$SMC_PNETID_DEL(r4, &(0x7f0000001800)={&(0x7f0000001700), 0xc, &(0x7f00000017c0)={&(0x7f0000001780)={0x20, r11, 0x400, 0x70bd26, 0x25dfdbff, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040004}, 0x4000) sendmsg$TIPC_CMD_GET_LINKS(r6, &(0x7f0000001900)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000018c0)={&(0x7f0000001880)={0x24, r0, 0x100, 0x70bd2b, 0x25dfdbfb, {{}, {}, {0x8, 0x11, 0x81}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0xb101409338bc67e5}, 0x4000000) r12 = syz_genetlink_get_family_id$tipc(&(0x7f0000001980), r6) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000001a40)={&(0x7f0000001940)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001a00)={&(0x7f00000019c0)={0x1c, r12, 0xa08, 0x70bd28, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) clock_getres(0x1, &(0x7f0000001a80)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000001b00)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) syz_genetlink_get_family_id$gtp(&(0x7f0000001ac0), r13) syz_genetlink_get_family_id$tipc(&(0x7f0000001b80), r6) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r7, &(0x7f0000001c80)={r8, 0xffffffffffffffff, 0x3f}) 10:19:19 executing program 1: ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8001, 0x1}}, './file0\x00'}) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) r1 = gettid() syz_open_procfs$namespace(r1, &(0x7f0000000040)='ns/ipc\x00') ptrace$peeksig(0x4209, r1, &(0x7f0000000080)={0x7ff, 0x0, 0x1}, &(0x7f00000000c0)=[{}]) ioctl$HIDIOCGRDESC(r0, 0x90044802, &(0x7f0000000140)={0x19, "d477f42664344f7d3bb8d47f61601055e8383704671c6b1454"}) getpriority(0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x10900, 0x88) recvmsg$unix(r2, &(0x7f0000000480)={&(0x7f00000001c0), 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/25, 0x19}, {&(0x7f0000000280)=""/46, 0x2e}], 0x2, &(0x7f0000000300)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x150}, 0x2041) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r6, 0xc0189379, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r8 = memfd_secret(0x80000) accept$unix(r8, 0x0, &(0x7f0000000500)) ioctl$NS_GET_NSTYPE(r3, 0xb703, 0x0) r9 = syz_genetlink_get_family_id$smc(&(0x7f0000000580), r4) sendmsg$SMC_PNETID_DEL(r5, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x34, r9, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) getuid() r10 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0), r2) sendmsg$TIPC_CMD_SET_NETID(r7, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r10, 0x5597dd26b7b66778, 0x70bd27, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x200}}, ["", "", "", ""]}, 0x24}}, 0x4000080) 10:19:19 executing program 0: setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)={0x8, "e3c5e2"}, 0x6) r0 = fsopen(&(0x7f0000000040)='cgroup\x00', 0x8d07077d4dd54d41) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x125180, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, 0x0, 0x800, 0x70bd29, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x6, @link='syz0\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x810}, 0x20000008) r3 = accept4$unix(r2, 0x0, &(0x7f0000000240), 0x800) newfstatat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) mount$cgroup2(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x400, &(0x7f00000003c0)={[{@subsystem='cpu'}, {@memory_recursiveprot}, {@subsystem='pids'}, {@subsystem='hugetlb'}, {}, {@memory_localevents}, {@memory_recursiveprot}, {@memory_recursiveprot}], [{@dont_appraise}, {@obj_role={'obj_role', 0x3d, '!'}}, {@euid_eq={'euid', 0x3d, r4}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'cgroup\x00'}}, {@euid_lt}, {@appraise}, {@subj_user={'subj_user', 0x3d, '\''}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\'}[*'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x34, 0x31, 0x64, 0x32, 0x3d9af854c7cdb0c2, 0x57, 0x64], 0x2d, [0x35, 0x39, 0x36, 0x66], 0x2d, [0x61, 0x31, 0x38, 0x31], 0x2d, [0x32, 0x32, 0x35, 0x36], 0x2d, [0x64, 0x61, 0x64, 0x30, 0x36, 0x38, 0x38, 0x63]}}}]}) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x68, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x196, @media='udp\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40800}, 0x4004000) ptrace$setregs(0xd, 0x0, 0x50, &(0x7f0000000640)="7ff032286d7cb70dc4687c2cb7940b61a91a7a7d2ac1bafcf00b1ddad49e3668e779fdb5c321a7d2649e6ed0467be863cf05eb0af6617c3d27553bcde3d92af8de2e613b9a17f00624f8531eaf0621b4d215b68d170f77f52fa5b77ccf6630353e4a487818ca16802ddbf34456d580b910b88dc8b8122b814fef2a3c9225465f4ce86f31a2d82d490e9d51f98ce8359428eb") sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x7c, 0x0, 0x100, 0x70bd25, 0x25dfdbff, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'hsr0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'team0\x00'}]}, 0x7c}}, 0x4000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000840)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r5, 0xc0189379, &(0x7f0000000880)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) lsetxattr$security_capability(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900), &(0x7f0000000940)=@v1={0x1000000, [{0x80, 0x5}]}, 0xc, 0x3) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x1c, 0x0, 0x8, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a80), r5) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) syz_genetlink_get_family_id$smc(&(0x7f0000000b40), r5) 10:19:19 executing program 7: fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000000)=']!\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xff, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="1a574815b6185e042d60d885c18d7a134bb837a114917738f256e017f706ecc8bd051a9e88b2a77ce12138806e4a1f45c91f8e62cad166bc2051b5c89328", 0x3e, 0xfffffffffffffffe}], 0x1008002, &(0x7f0000000180)={[{@utf8no}, {@shortname_win95}, {@shortname_lower}, {@rodir}, {@nonumtail}, {@numtail}, {@shortname_win95}], [{@pcr}, {@measure}, {@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x30, 0x61, 0x63, 0x64, 0x34, 0x65, 0x34], 0x2d, [0x62, 0x36, 0x31, 0x63], 0x2d, [0x35, 0x36, 0x63, 0x31], 0x2d, [0x62, 0x15359d50cc9df773, 0x34, 0x57], 0x2d, [0x5c, 0x32, 0x66, 0x36, 0x66, 0x64, 0x35, 0x35]}}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfshat={'smackfshat', 0x3d, ']!\x00'}}, {@appraise_type}, {@subj_type}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000002c0)=0x80, 0x2) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) write$hidraw(r3, &(0x7f0000000340)="39b0a85c1fe20c732238c7bf17723a5aafb211ab9ac530e9d3", 0x19) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0), r2) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x84, r4, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x2}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x3, 0x8, 0x6]}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x39}}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}]}, 0x84}, 0x1, 0x0, 0x0, 0x800}, 0x8010) r5 = ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r5) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, r0, {0x6}}, './file1\x00'}) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r0, &(0x7f0000000580)={0x80000000}) socketpair(0x11, 0x2, 0x1f, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$TIPC_CMD_SET_NODE_ADDR(r7, &(0x7f0000000640)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0}, 0xc0080) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000680)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r8, 0xc0189371, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) r9 = syz_mount_image$vfat(&(0x7f0000000700), &(0x7f0000000740)='./file1\x00', 0x2, 0x6, &(0x7f0000000b00)=[{&(0x7f0000000780)="3af73b17b2f40e227f8c4aaf1db8d70bd2a32e49b5abde2b9a1343b14ef11d4236ebc9e0f79a77580c5194bb36be4aed5b52b782716d639b41306187b5d264cc53916506eedd409caa271c0aeb5cd720fec7aa67eed30f8f508dfe4cc95af5dc6f067faedccf46bb296c89ec9a51a0a89247e1ededc1a7ba0c", 0x79, 0x8000}, {&(0x7f0000000800)="10daa81ce2f6c7fea33447bf2ad690a49c393b7a527de4c6723c3c3a29d1507374af4f4b27ec4823cea64cfd89a66e69f1c340ee381cff632857a67e591ef20ace5dad14ab706ae020ed43f413824cdc9fdb33624bc137b9c7f23ce016a889c76100d567701034ac1e29f88cba12f8b1c3e54df33aa4d06050527064f1f707d96249762e5332dfa5801652a0f3a170dda1", 0x91, 0x3}, {&(0x7f00000008c0)="88dc4cc242558b6ae26a21b427f13e4762eec85ca8d950a28c4866d67f61fe51b300b0a672d7a34570926e1614f427b82df8e6f7db7da6537264df6ac834e025c3aeb07af81588616a3c9d8ed5d1a3371204eb80c266ddb94c46f22870380391274810ec5d0012d2f25d94798c3dac965ad03ed88cdd60529ba9316d65ec3c55a32b03cae220961af740d2b9765eca38d5ee85be12fe318955aed1441feaa50820338f42388a5682db6319e9894dba76c4ef911148e7eebf9cf1843f7516fea18009838251a7053a968a5837772885690217794f1e3afc8fb7217ca6597a", 0xde, 0x2}, {&(0x7f00000009c0)="8b86466cf7712d8d23dd26a8a13e1d4064363ff903260aa03f220ba763f239a2253d96e12326d0e36d1edef5bc10fdf8450cfc5801bef0b990cc0ef9cb39691d06113f2f66495afe83926eb4a4cf6fe68c2279804436ede30edb79d9e417f0711574e26b2559ee8c48c12ad4e1668885cbb8b6aa20e87bba70e5e6e861f509c3f952a79944e169807d8a974c5e065ad9b853c95464cbf814ce6d0d1e0fa3a3a5df6fc5598986720a0f1358608f87dbeae1e74181e613e149c7ebc8859e", 0xbd, 0x2}, {&(0x7f0000000a80)="317d180049562ef4ba8530eacad13770c925c0a396dfe5d17bfb6bc35079ff9a440e67363c15a1d6c7c9ad59e24ba173d105abb55beef8", 0x37, 0xc3}, {&(0x7f0000000ac0)="076da493a19df1c53582408e2cf4780aace6aa4a8c87057e4e1f983b326f059da717d17b0a2043f9ea5805bcee02dc71148572921b26e6d1329c26a5810c6e", 0x3f, 0xcf}], 0x1044000, &(0x7f0000000bc0)={[{@shortname_lower}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsroot={'smackfsroot', 0x3d, '+*\''}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) openat(r9, &(0x7f0000000c40)='./file1\x00', 0x18801, 0x4) execveat(0xffffffffffffffff, &(0x7f0000000cc0)='./file1\x00', &(0x7f0000000d40)=[&(0x7f0000000d00)='\x00'], &(0x7f0000000e00)=[&(0x7f0000000d80)='nnonumtail=1', &(0x7f0000000dc0)='nnonumtail=1'], 0x1000) 10:19:19 executing program 6: r0 = memfd_secret(0x80000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x0, 0x400, 0x70bd27, 0x25dfdbff, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r3 = gettid() sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x48, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {{}, {@void, @void, @val={0xc, 0x99, {0xff, 0x75}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x7b}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x73}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r0}, @NL80211_ATTR_PID={0x8, 0x52, r3}]}, 0x48}}, 0x44000) ptrace$setregs(0xf, 0x0, 0x5, &(0x7f00000003c0)="bdd67d59efde8cf926ccf0b712fbd0577bc1c988990bf6a06795764c0463d0ea41a21b9a7335a7b330e53feed0cae6") r4 = gettid() rt_sigqueueinfo(r4, 0x12, &(0x7f0000000400)={0x27, 0x6, 0x6}) r5 = socket(0x1a, 0x800, 0x2) sendmsg$SMC_PNETID_ADD(r5, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x48, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x2000000) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x8080}, 0x4000000) sched_rr_get_interval(r3, &(0x7f00000006c0)) lgetxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)=@known='system.sockprotoname\x00', &(0x7f0000000780)=""/153, 0x99) r6 = getuid() recvmsg$unix(r2, &(0x7f0000000ac0)={&(0x7f0000000880)=@abs, 0x6e, &(0x7f0000000980)=[{&(0x7f0000000900)=""/66, 0x42}], 0x1, &(0x7f00000009c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xd8}, 0x40002000) chown(&(0x7f0000000840)='./file0\x00', r6, r7) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000b00)=0x2, 0x4) 10:19:19 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000240)='htcp\x00', 0x5) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000280)=0x7f, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0}) r1 = inotify_init1(0x40800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000340)={r0, 0x2, r1, 0x8001}) r2 = memfd_secret(0x80000) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000380)={{0x1, 0x1, 0x18, r2, {0x100, 0x10000000}}, './file0\x00'}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000540)="71aa618f1066790b9ca7541b4637fb294ba0770f11958bd3265df874beb7943d8fdd18d4dacc7eb8de52b3da7ea083d35b56c0074821544b4062191ca72b2c5d128f2db5df59ad4df7d10cbc0735db772779866453b28081a22a8f8826a107bdb4f9d868ff331ac455c393d117e3b894a95cad256fcacacb2fd1129cf44944cf07f2d84aae0feac5cbfce71180f01d748d1c1d6d441b01b610a382493dfb77d2d60b37f2656d04218aeda7b3ad916b23ea5fab46ece2dc0edac8f260a30565b5b9cc4f6a", 0xc4}, {&(0x7f0000000640)="ffc85f3b71943fe3526e3145dfe0cdda0ae4c9507ec01b97275e9599527c6338cc1341d439012c2122c79d3fac444f27f9a9fce36dc0235bc09c02b4f8c4c4e331de9353c853cf9e1635a10b75f07d6d289856404d", 0x55}, {&(0x7f00000006c0)="63014dee3bbcf8e3a506f749b91216cc2916b6d52a8a92b5e9200aeb849b675a3f789c82b288899349f5b8d5913aca2423276479db9d58d7b832e923de7bb69b5a85669bcb5076d1db7ff81e5dead29da52924b091ff8889b0985e7fa982d52ca2f47cd32fe42b9f8f3266e60045a27a74947f36ecbb4fb45361dd7aa4a86a2cffb129731cfc054eb7579c18931bfe1490c843366ba4322156849e4617acc27685", 0xa1}], 0x3, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x20, 0x80}, 0x40000) 10:19:19 executing program 4: ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x400}}, '.\x00'}) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040)={0x5, "bc7f48"}, 0x6) r1 = io_uring_setup(0x3c02, &(0x7f0000000080)={0x0, 0x77af, 0x0, 0x1, 0x166, 0x0, r0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x5, 0x1d0}}, './file0\x00'}) accept4$unix(r0, &(0x7f0000000140), &(0x7f00000001c0)=0x6e, 0x0) mknodat$loop(r2, &(0x7f0000000200)='./file0\x00', 0x100, 0x1) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {r3}}, './file0\x00'}) sendmsg$TIPC_CMD_SET_LINK_TOL(r5, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x68, 0x0, 0x200, 0x70bd2d, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0x1, @link='syz0\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4008005}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000054}, 0x40000c4) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x4000010, r5, 0x10000000) syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) io_uring_setup(0x131a, &(0x7f0000000940)={0x0, 0x6a03, 0x8, 0x1, 0x16c, 0x0, r7}) syz_genetlink_get_family_id$smc(&(0x7f00000009c0), r4) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) 10:19:19 executing program 5: ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000000)) bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x24040000) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x3, @link='broadcast-link\x00'}}}}, 0x68}}, 0x400d4) link(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000780)={0x0, [], 0x7f, "ac74680eaee4c7"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001780)={{0x0, 0x3, 0x9, 0x7, 0x7fffffff, 0x519, 0x7, 0x0, 0x40, 0x8, 0x3f, 0x3f, 0x3f, 0xfffffffffffffffd, 0x5}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002780)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002980)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002b80)={0x81, [], 0x0, "67b0e37f9967b3"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000003b80)={0x0, [], 0x4, "a46dfcdc0c77a1"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004b80)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000004d80)={0x3, [], 0x2, "0d52c59a9bf452"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000005d80)={0x8, [], 0x3e, "cf171832716571"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000006d80)) [ 161.814146] loop7: detected capacity change from 0 to 16383 [ 161.881461] loop7: detected capacity change from 0 to 128 10:19:35 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000240)='htcp\x00', 0x5) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000280)=0x7f, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0}) r1 = inotify_init1(0x40800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000340)={r0, 0x2, r1, 0x8001}) memfd_secret(0x80000) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000540)="71aa618f1066790b9ca7541b4637fb294ba0770f11958bd3265df874beb7943d8fdd18d4dacc7eb8de52b3da7ea083d35b56c0074821544b4062191ca72b2c5d128f2db5df59ad4df7d10cbc0735db772779866453b28081a22a8f8826a107bdb4f9d868ff331ac455c393d117e3b894a95cad256fcacacb2fd1129cf44944cf07f2d84aae0feac5cbfce71180f01d748d1c1d6d441b01b610a382493dfb77d2d60b37f2656d04218aeda7b3ad916b23ea5fab46ece2dc0edac8f260a30565b5b9cc4f6a", 0xc4}, {&(0x7f0000000640)="ffc85f3b71943fe3526e3145dfe0cdda0ae4c9507ec01b97275e9599527c6338cc1341d439012c2122c79d3fac444f27f9a9fce36dc0235bc09c02b4f8c4c4e331de9353c853cf9e1635a10b75f07d6d289856404d", 0x55}, {&(0x7f00000006c0)="63014dee3bbcf8e3a506f749b91216cc2916b6d52a8a92b5e9200aeb849b675a3f789c82b288899349f5b8d5913aca2423276479db9d58d7b832e923de7bb69b5a85669bcb5076d1db7ff81e5dead29da52924b091ff8889b0985e7fa982d52ca2f47cd32fe42b9f8f3266e60045a27a74947f36ecbb4fb45361dd7aa4a86a2cffb129731cfc054eb7579c18931bfe1490c843366ba4322156849e4617acc27685", 0xa1}], 0x3, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x20, 0x80}, 0x40000) 10:19:35 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000850) syz_genetlink_get_family_id$SEG6(&(0x7f0000000180), 0xffffffffffffffff) read$hidraw(0xffffffffffffffff, &(0x7f00000001c0)=""/177, 0xb1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000000280)=""/136, 0x88}, {&(0x7f0000000340)=""/58, 0x3a}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x3, &(0x7f00000013c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}, 0x40) sendmsg$SMC_PNETID_GET(r6, &(0x7f0000001540)={0xfffffffffffffffe, 0x0, &(0x7f0000001500)={&(0x7f0000001480)={0x60, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'nr0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv_slave_1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x60}}, 0x10) r10 = syz_genetlink_get_family_id$smc(&(0x7f00000015c0), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r6, &(0x7f00000016c0)={&(0x7f0000001580), 0xc, &(0x7f0000001680)={&(0x7f0000001600)={0x4c, r10, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000) r11 = syz_genetlink_get_family_id$smc(&(0x7f0000001740), r9) sendmsg$SMC_PNETID_DEL(r4, &(0x7f0000001800)={&(0x7f0000001700), 0xc, &(0x7f00000017c0)={&(0x7f0000001780)={0x20, r11, 0x400, 0x70bd26, 0x25dfdbff, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040004}, 0x4000) sendmsg$TIPC_CMD_GET_LINKS(r6, &(0x7f0000001900)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000018c0)={&(0x7f0000001880)={0x24, r0, 0x100, 0x70bd2b, 0x25dfdbfb, {{}, {}, {0x8, 0x11, 0x81}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0xb101409338bc67e5}, 0x4000000) r12 = syz_genetlink_get_family_id$tipc(&(0x7f0000001980), r6) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000001a40)={&(0x7f0000001940)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001a00)={&(0x7f00000019c0)={0x1c, r12, 0xa08, 0x70bd28, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) clock_getres(0x1, &(0x7f0000001a80)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000001b00)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) syz_genetlink_get_family_id$gtp(&(0x7f0000001ac0), r13) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r7, &(0x7f0000001c80)={r8, 0xffffffffffffffff, 0x3f}) 10:19:35 executing program 7: fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000000)=']!\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xff, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="1a574815b6185e042d60d885c18d7a134bb837a114917738f256e017f706ecc8bd051a9e88b2a77ce12138806e4a1f45c91f8e62cad166bc2051b5c89328", 0x3e, 0xfffffffffffffffe}], 0x1008002, &(0x7f0000000180)={[{@utf8no}, {@shortname_win95}, {@shortname_lower}, {@rodir}, {@nonumtail}, {@numtail}, {@shortname_win95}], [{@pcr}, {@measure}, {@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x30, 0x61, 0x63, 0x64, 0x34, 0x65, 0x34], 0x2d, [0x62, 0x36, 0x31, 0x63], 0x2d, [0x35, 0x36, 0x63, 0x31], 0x2d, [0x62, 0x15359d50cc9df773, 0x34, 0x57], 0x2d, [0x5c, 0x32, 0x66, 0x36, 0x66, 0x64, 0x35, 0x35]}}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfshat={'smackfshat', 0x3d, ']!\x00'}}, {@appraise_type}, {@subj_type}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000002c0)=0x80, 0x2) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) write$hidraw(r3, &(0x7f0000000340)="39b0a85c1fe20c732238c7bf17723a5aafb211ab9ac530e9d3", 0x19) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0), r2) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x84, r4, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x2}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x3, 0x8, 0x6]}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x39}}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}]}, 0x84}, 0x1, 0x0, 0x0, 0x800}, 0x8010) r5 = ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r5) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, r0, {0x6}}, './file1\x00'}) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r0, &(0x7f0000000580)={0x80000000}) socketpair(0x11, 0x2, 0x1f, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$TIPC_CMD_SET_NODE_ADDR(r7, &(0x7f0000000640)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0}, 0xc0080) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000680)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r8, 0xc0189371, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) r9 = syz_mount_image$vfat(&(0x7f0000000700), &(0x7f0000000740)='./file1\x00', 0x2, 0x6, &(0x7f0000000b00)=[{&(0x7f0000000780)="3af73b17b2f40e227f8c4aaf1db8d70bd2a32e49b5abde2b9a1343b14ef11d4236ebc9e0f79a77580c5194bb36be4aed5b52b782716d639b41306187b5d264cc53916506eedd409caa271c0aeb5cd720fec7aa67eed30f8f508dfe4cc95af5dc6f067faedccf46bb296c89ec9a51a0a89247e1ededc1a7ba0c", 0x79, 0x8000}, {&(0x7f0000000800)="10daa81ce2f6c7fea33447bf2ad690a49c393b7a527de4c6723c3c3a29d1507374af4f4b27ec4823cea64cfd89a66e69f1c340ee381cff632857a67e591ef20ace5dad14ab706ae020ed43f413824cdc9fdb33624bc137b9c7f23ce016a889c76100d567701034ac1e29f88cba12f8b1c3e54df33aa4d06050527064f1f707d96249762e5332dfa5801652a0f3a170dda1", 0x91, 0x3}, {&(0x7f00000008c0)="88dc4cc242558b6ae26a21b427f13e4762eec85ca8d950a28c4866d67f61fe51b300b0a672d7a34570926e1614f427b82df8e6f7db7da6537264df6ac834e025c3aeb07af81588616a3c9d8ed5d1a3371204eb80c266ddb94c46f22870380391274810ec5d0012d2f25d94798c3dac965ad03ed88cdd60529ba9316d65ec3c55a32b03cae220961af740d2b9765eca38d5ee85be12fe318955aed1441feaa50820338f42388a5682db6319e9894dba76c4ef911148e7eebf9cf1843f7516fea18009838251a7053a968a5837772885690217794f1e3afc8fb7217ca6597a", 0xde, 0x2}, {&(0x7f00000009c0)="8b86466cf7712d8d23dd26a8a13e1d4064363ff903260aa03f220ba763f239a2253d96e12326d0e36d1edef5bc10fdf8450cfc5801bef0b990cc0ef9cb39691d06113f2f66495afe83926eb4a4cf6fe68c2279804436ede30edb79d9e417f0711574e26b2559ee8c48c12ad4e1668885cbb8b6aa20e87bba70e5e6e861f509c3f952a79944e169807d8a974c5e065ad9b853c95464cbf814ce6d0d1e0fa3a3a5df6fc5598986720a0f1358608f87dbeae1e74181e613e149c7ebc8859e", 0xbd, 0x2}, {&(0x7f0000000a80)="317d180049562ef4ba8530eacad13770c925c0a396dfe5d17bfb6bc35079ff9a440e67363c15a1d6c7c9ad59e24ba173d105abb55beef8", 0x37, 0xc3}, {&(0x7f0000000ac0)="076da493a19df1c53582408e2cf4780aace6aa4a8c87057e4e1f983b326f059da717d17b0a2043f9ea5805bcee02dc71148572921b26e6d1329c26a5810c6e", 0x3f, 0xcf}], 0x1044000, &(0x7f0000000bc0)={[{@shortname_lower}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsroot={'smackfsroot', 0x3d, '+*\''}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) openat(r9, &(0x7f0000000c40)='./file1\x00', 0x18801, 0x4) execveat(0xffffffffffffffff, &(0x7f0000000cc0)='./file1\x00', &(0x7f0000000d40)=[&(0x7f0000000d00)='\x00'], &(0x7f0000000e00)=[&(0x7f0000000d80)='nnonumtail=1', &(0x7f0000000dc0)='nnonumtail=1'], 0x1000) 10:19:35 executing program 0: setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)={0x8, "e3c5e2"}, 0x6) r0 = fsopen(&(0x7f0000000040)='cgroup\x00', 0x8d07077d4dd54d41) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x125180, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, 0x0, 0x800, 0x70bd29, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x6, @link='syz0\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x810}, 0x20000008) r3 = accept4$unix(r2, 0x0, &(0x7f0000000240), 0x800) newfstatat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) mount$cgroup2(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x400, &(0x7f00000003c0)={[{@subsystem='cpu'}, {@memory_recursiveprot}, {@subsystem='pids'}, {@subsystem='hugetlb'}, {}, {@memory_localevents}, {@memory_recursiveprot}, {@memory_recursiveprot}], [{@dont_appraise}, {@obj_role={'obj_role', 0x3d, '!'}}, {@euid_eq={'euid', 0x3d, r4}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'cgroup\x00'}}, {@euid_lt}, {@appraise}, {@subj_user={'subj_user', 0x3d, '\''}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\'}[*'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x34, 0x31, 0x64, 0x32, 0x3d9af854c7cdb0c2, 0x57, 0x64], 0x2d, [0x35, 0x39, 0x36, 0x66], 0x2d, [0x61, 0x31, 0x38, 0x31], 0x2d, [0x32, 0x32, 0x35, 0x36], 0x2d, [0x64, 0x61, 0x64, 0x30, 0x36, 0x38, 0x38, 0x63]}}}]}) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x68, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x196, @media='udp\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40800}, 0x4004000) ptrace$setregs(0xd, 0x0, 0x50, &(0x7f0000000640)="7ff032286d7cb70dc4687c2cb7940b61a91a7a7d2ac1bafcf00b1ddad49e3668e779fdb5c321a7d2649e6ed0467be863cf05eb0af6617c3d27553bcde3d92af8de2e613b9a17f00624f8531eaf0621b4d215b68d170f77f52fa5b77ccf6630353e4a487818ca16802ddbf34456d580b910b88dc8b8122b814fef2a3c9225465f4ce86f31a2d82d490e9d51f98ce8359428eb") sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x7c, 0x0, 0x100, 0x70bd25, 0x25dfdbff, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'hsr0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'team0\x00'}]}, 0x7c}}, 0x4000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000840)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r5, 0xc0189379, &(0x7f0000000880)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) lsetxattr$security_capability(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900), &(0x7f0000000940)=@v1={0x1000000, [{0x80, 0x5}]}, 0xc, 0x3) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x1c, 0x0, 0x8, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a80), r5) syz_genetlink_get_family_id$smc(&(0x7f0000000b40), r5) 10:19:35 executing program 4: ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x400}}, '.\x00'}) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040)={0x5, "bc7f48"}, 0x6) r1 = io_uring_setup(0x3c02, &(0x7f0000000080)={0x0, 0x77af, 0x0, 0x1, 0x166, 0x0, r0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x5, 0x1d0}}, './file0\x00'}) accept4$unix(r0, &(0x7f0000000140), &(0x7f00000001c0)=0x6e, 0x0) mknodat$loop(r2, &(0x7f0000000200)='./file0\x00', 0x100, 0x1) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {r3}}, './file0\x00'}) sendmsg$TIPC_CMD_SET_LINK_TOL(r5, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x68, 0x0, 0x200, 0x70bd2d, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0x1, @link='syz0\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4008005}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000054}, 0x40000c4) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x4000010, r5, 0x10000000) syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) io_uring_setup(0x131a, &(0x7f0000000940)={0x0, 0x6a03, 0x8, 0x1, 0x16c, 0x0, r7}) syz_genetlink_get_family_id$smc(&(0x7f00000009c0), r4) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) [ 177.147500] loop7: detected capacity change from 0 to 16383 [ 177.177823] loop7: detected capacity change from 0 to 128 10:19:35 executing program 6: r0 = memfd_secret(0x80000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x0, 0x400, 0x70bd27, 0x25dfdbff, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r3 = gettid() sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x48, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {{}, {@void, @void, @val={0xc, 0x99, {0xff, 0x75}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x7b}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x73}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r0}, @NL80211_ATTR_PID={0x8, 0x52, r3}]}, 0x48}}, 0x44000) ptrace$setregs(0xf, 0x0, 0x5, &(0x7f00000003c0)="bdd67d59efde8cf926ccf0b712fbd0577bc1c988990bf6a06795764c0463d0ea41a21b9a7335a7b330e53feed0cae6") r4 = gettid() rt_sigqueueinfo(r4, 0x12, &(0x7f0000000400)={0x27, 0x6, 0x6}) r5 = socket(0x1a, 0x800, 0x2) sendmsg$SMC_PNETID_ADD(r5, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x48, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x2000000) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x8080}, 0x4000000) sched_rr_get_interval(r3, &(0x7f00000006c0)) lgetxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)=@known='system.sockprotoname\x00', &(0x7f0000000780)=""/153, 0x99) r6 = getuid() recvmsg$unix(r2, &(0x7f0000000ac0)={&(0x7f0000000880)=@abs, 0x6e, &(0x7f0000000980)=[{&(0x7f0000000900)=""/66, 0x42}], 0x1, &(0x7f00000009c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xd8}, 0x40002000) chown(&(0x7f0000000840)='./file0\x00', r6, r7) 10:19:35 executing program 1: ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8001, 0x1}}, './file0\x00'}) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) r1 = gettid() syz_open_procfs$namespace(r1, &(0x7f0000000040)='ns/ipc\x00') ptrace$peeksig(0x4209, r1, &(0x7f0000000080)={0x7ff, 0x0, 0x1}, &(0x7f00000000c0)=[{}]) ioctl$HIDIOCGRDESC(r0, 0x90044802, &(0x7f0000000140)={0x19, "d477f42664344f7d3bb8d47f61601055e8383704671c6b1454"}) getpriority(0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x10900, 0x88) recvmsg$unix(r2, &(0x7f0000000480)={&(0x7f00000001c0), 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/25, 0x19}, {&(0x7f0000000280)=""/46, 0x2e}], 0x2, &(0x7f0000000300)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x150}, 0x2041) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r6, 0xc0189379, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r7 = memfd_secret(0x80000) accept$unix(r7, 0x0, &(0x7f0000000500)) ioctl$NS_GET_NSTYPE(r3, 0xb703, 0x0) r8 = syz_genetlink_get_family_id$smc(&(0x7f0000000580), r4) sendmsg$SMC_PNETID_DEL(r5, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x34, r8, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) getuid() syz_genetlink_get_family_id$tipc(&(0x7f00000006c0), r2) 10:19:35 executing program 5: ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000000)) bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x24040000) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x3, @link='broadcast-link\x00'}}}}, 0x68}}, 0x400d4) link(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000780)={0x0, [], 0x7f, "ac74680eaee4c7"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001780)={{0x0, 0x3, 0x9, 0x7, 0x7fffffff, 0x519, 0x7, 0x0, 0x40, 0x8, 0x3f, 0x3f, 0x3f, 0xfffffffffffffffd, 0x5}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002780)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002980)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002b80)={0x81, [], 0x0, "67b0e37f9967b3"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000003b80)={0x0, [], 0x4, "a46dfcdc0c77a1"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004b80)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000004d80)={0x3, [], 0x2, "0d52c59a9bf452"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000005d80)={0x8, [], 0x3e, "cf171832716571"}) 10:19:35 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000240)='htcp\x00', 0x5) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000280)=0x7f, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0}) r1 = inotify_init1(0x40800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000340)={r0, 0x2, r1, 0x8001}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000540)="71aa618f1066790b9ca7541b4637fb294ba0770f11958bd3265df874beb7943d8fdd18d4dacc7eb8de52b3da7ea083d35b56c0074821544b4062191ca72b2c5d128f2db5df59ad4df7d10cbc0735db772779866453b28081a22a8f8826a107bdb4f9d868ff331ac455c393d117e3b894a95cad256fcacacb2fd1129cf44944cf07f2d84aae0feac5cbfce71180f01d748d1c1d6d441b01b610a382493dfb77d2d60b37f2656d04218aeda7b3ad916b23ea5fab46ece2dc0edac8f260a30565b5b9cc4f6a", 0xc4}, {&(0x7f0000000640)="ffc85f3b71943fe3526e3145dfe0cdda0ae4c9507ec01b97275e9599527c6338cc1341d439012c2122c79d3fac444f27f9a9fce36dc0235bc09c02b4f8c4c4e331de9353c853cf9e1635a10b75f07d6d289856404d", 0x55}, {&(0x7f00000006c0)="63014dee3bbcf8e3a506f749b91216cc2916b6d52a8a92b5e9200aeb849b675a3f789c82b288899349f5b8d5913aca2423276479db9d58d7b832e923de7bb69b5a85669bcb5076d1db7ff81e5dead29da52924b091ff8889b0985e7fa982d52ca2f47cd32fe42b9f8f3266e60045a27a74947f36ecbb4fb45361dd7aa4a86a2cffb129731cfc054eb7579c18931bfe1490c843366ba4322156849e4617acc27685", 0xa1}], 0x3, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x20, 0x80}, 0x40000) 10:19:35 executing program 7: fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000000)=']!\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xff, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="1a574815b6185e042d60d885c18d7a134bb837a114917738f256e017f706ecc8bd051a9e88b2a77ce12138806e4a1f45c91f8e62cad166bc2051b5c89328", 0x3e, 0xfffffffffffffffe}], 0x1008002, &(0x7f0000000180)={[{@utf8no}, {@shortname_win95}, {@shortname_lower}, {@rodir}, {@nonumtail}, {@numtail}, {@shortname_win95}], [{@pcr}, {@measure}, {@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x30, 0x61, 0x63, 0x64, 0x34, 0x65, 0x34], 0x2d, [0x62, 0x36, 0x31, 0x63], 0x2d, [0x35, 0x36, 0x63, 0x31], 0x2d, [0x62, 0x15359d50cc9df773, 0x34, 0x57], 0x2d, [0x5c, 0x32, 0x66, 0x36, 0x66, 0x64, 0x35, 0x35]}}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfshat={'smackfshat', 0x3d, ']!\x00'}}, {@appraise_type}, {@subj_type}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000002c0)=0x80, 0x2) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) write$hidraw(r3, &(0x7f0000000340)="39b0a85c1fe20c732238c7bf17723a5aafb211ab9ac530e9d3", 0x19) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0), r2) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x84, r4, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x2}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x3, 0x8, 0x6]}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x39}}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}]}, 0x84}, 0x1, 0x0, 0x0, 0x800}, 0x8010) r5 = ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r5) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, r0, {0x6}}, './file1\x00'}) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r0, &(0x7f0000000580)={0x80000000}) socketpair(0x11, 0x2, 0x1f, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$TIPC_CMD_SET_NODE_ADDR(r7, &(0x7f0000000640)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0}, 0xc0080) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000680)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r8, 0xc0189371, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) syz_mount_image$vfat(&(0x7f0000000700), &(0x7f0000000740)='./file1\x00', 0x2, 0x6, &(0x7f0000000b00)=[{&(0x7f0000000780)="3af73b17b2f40e227f8c4aaf1db8d70bd2a32e49b5abde2b9a1343b14ef11d4236ebc9e0f79a77580c5194bb36be4aed5b52b782716d639b41306187b5d264cc53916506eedd409caa271c0aeb5cd720fec7aa67eed30f8f508dfe4cc95af5dc6f067faedccf46bb296c89ec9a51a0a89247e1ededc1a7ba0c", 0x79, 0x8000}, {&(0x7f0000000800)="10daa81ce2f6c7fea33447bf2ad690a49c393b7a527de4c6723c3c3a29d1507374af4f4b27ec4823cea64cfd89a66e69f1c340ee381cff632857a67e591ef20ace5dad14ab706ae020ed43f413824cdc9fdb33624bc137b9c7f23ce016a889c76100d567701034ac1e29f88cba12f8b1c3e54df33aa4d06050527064f1f707d96249762e5332dfa5801652a0f3a170dda1", 0x91, 0x3}, {&(0x7f00000008c0)="88dc4cc242558b6ae26a21b427f13e4762eec85ca8d950a28c4866d67f61fe51b300b0a672d7a34570926e1614f427b82df8e6f7db7da6537264df6ac834e025c3aeb07af81588616a3c9d8ed5d1a3371204eb80c266ddb94c46f22870380391274810ec5d0012d2f25d94798c3dac965ad03ed88cdd60529ba9316d65ec3c55a32b03cae220961af740d2b9765eca38d5ee85be12fe318955aed1441feaa50820338f42388a5682db6319e9894dba76c4ef911148e7eebf9cf1843f7516fea18009838251a7053a968a5837772885690217794f1e3afc8fb7217ca6597a", 0xde, 0x2}, {&(0x7f00000009c0)="8b86466cf7712d8d23dd26a8a13e1d4064363ff903260aa03f220ba763f239a2253d96e12326d0e36d1edef5bc10fdf8450cfc5801bef0b990cc0ef9cb39691d06113f2f66495afe83926eb4a4cf6fe68c2279804436ede30edb79d9e417f0711574e26b2559ee8c48c12ad4e1668885cbb8b6aa20e87bba70e5e6e861f509c3f952a79944e169807d8a974c5e065ad9b853c95464cbf814ce6d0d1e0fa3a3a5df6fc5598986720a0f1358608f87dbeae1e74181e613e149c7ebc8859e", 0xbd, 0x2}, {&(0x7f0000000a80)="317d180049562ef4ba8530eacad13770c925c0a396dfe5d17bfb6bc35079ff9a440e67363c15a1d6c7c9ad59e24ba173d105abb55beef8", 0x37, 0xc3}, {&(0x7f0000000ac0)="076da493a19df1c53582408e2cf4780aace6aa4a8c87057e4e1f983b326f059da717d17b0a2043f9ea5805bcee02dc71148572921b26e6d1329c26a5810c6e", 0x3f, 0xcf}], 0x1044000, &(0x7f0000000bc0)={[{@shortname_lower}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsroot={'smackfsroot', 0x3d, '+*\''}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) r9 = openat(0xffffffffffffff9c, &(0x7f0000000c80)='./file0\x00', 0x81, 0x1) execveat(r9, &(0x7f0000000cc0)='./file1\x00', &(0x7f0000000d40)=[&(0x7f0000000d00)='\x00'], &(0x7f0000000e00)=[&(0x7f0000000d80)='nnonumtail=1', &(0x7f0000000dc0)='nnonumtail=1'], 0x1000) 10:19:35 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000240)='htcp\x00', 0x5) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000280)=0x7f, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)) inotify_init1(0x40800) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000540)="71aa618f1066790b9ca7541b4637fb294ba0770f11958bd3265df874beb7943d8fdd18d4dacc7eb8de52b3da7ea083d35b56c0074821544b4062191ca72b2c5d128f2db5df59ad4df7d10cbc0735db772779866453b28081a22a8f8826a107bdb4f9d868ff331ac455c393d117e3b894a95cad256fcacacb2fd1129cf44944cf07f2d84aae0feac5cbfce71180f01d748d1c1d6d441b01b610a382493dfb77d2d60b37f2656d04218aeda7b3ad916b23ea5fab46ece2dc0edac8f260a30565b5b9cc4f6a", 0xc4}, {&(0x7f0000000640)="ffc85f3b71943fe3526e3145dfe0cdda0ae4c9507ec01b97275e9599527c6338cc1341d439012c2122c79d3fac444f27f9a9fce36dc0235bc09c02b4f8c4c4e331de9353c853cf9e1635a10b75f07d6d289856404d", 0x55}, {&(0x7f00000006c0)="63014dee3bbcf8e3a506f749b91216cc2916b6d52a8a92b5e9200aeb849b675a3f789c82b288899349f5b8d5913aca2423276479db9d58d7b832e923de7bb69b5a85669bcb5076d1db7ff81e5dead29da52924b091ff8889b0985e7fa982d52ca2f47cd32fe42b9f8f3266e60045a27a74947f36ecbb4fb45361dd7aa4a86a2cffb129731cfc054eb7579c18931bfe1490c843366ba4322156849e4617acc27685", 0xa1}], 0x3, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x20, 0x80}, 0x40000) 10:19:35 executing program 5: ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000000)) bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x24040000) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x3, @link='broadcast-link\x00'}}}}, 0x68}}, 0x400d4) link(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000780)={0x0, [], 0x7f, "ac74680eaee4c7"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001780)={{0x0, 0x3, 0x9, 0x7, 0x7fffffff, 0x519, 0x7, 0x0, 0x40, 0x8, 0x3f, 0x3f, 0x3f, 0xfffffffffffffffd, 0x5}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002780)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002980)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002b80)={0x81, [], 0x0, "67b0e37f9967b3"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000003b80)={0x0, [], 0x4, "a46dfcdc0c77a1"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004b80)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000004d80)={0x3, [], 0x2, "0d52c59a9bf452"}) [ 177.459999] loop7: detected capacity change from 0 to 16383 10:19:35 executing program 6: r0 = memfd_secret(0x80000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x0, 0x400, 0x70bd27, 0x25dfdbff, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r3 = gettid() sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x48, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {{}, {@void, @void, @val={0xc, 0x99, {0xff, 0x75}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x7b}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x73}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r0}, @NL80211_ATTR_PID={0x8, 0x52, r3}]}, 0x48}}, 0x44000) ptrace$setregs(0xf, 0x0, 0x5, &(0x7f00000003c0)="bdd67d59efde8cf926ccf0b712fbd0577bc1c988990bf6a06795764c0463d0ea41a21b9a7335a7b330e53feed0cae6") r4 = gettid() rt_sigqueueinfo(r4, 0x12, &(0x7f0000000400)={0x27, 0x6, 0x6}) r5 = socket(0x1a, 0x800, 0x2) sendmsg$SMC_PNETID_ADD(r5, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x48, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x2000000) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x8080}, 0x4000000) sched_rr_get_interval(r3, &(0x7f00000006c0)) lgetxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)=@known='system.sockprotoname\x00', &(0x7f0000000780)=""/153, 0x99) r6 = getuid() chown(&(0x7f0000000840)='./file0\x00', r6, 0x0) 10:19:35 executing program 4: ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x400}}, '.\x00'}) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040)={0x5, "bc7f48"}, 0x6) r1 = io_uring_setup(0x3c02, &(0x7f0000000080)={0x0, 0x77af, 0x0, 0x1, 0x166, 0x0, r0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x5, 0x1d0}}, './file0\x00'}) accept4$unix(r0, &(0x7f0000000140), &(0x7f00000001c0)=0x6e, 0x0) mknodat$loop(r2, &(0x7f0000000200)='./file0\x00', 0x100, 0x1) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {r3}}, './file0\x00'}) sendmsg$TIPC_CMD_SET_LINK_TOL(r5, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x68, 0x0, 0x200, 0x70bd2d, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0x1, @link='syz0\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4008005}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000054}, 0x40000c4) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x4000010, r5, 0x10000000) syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) io_uring_setup(0x131a, &(0x7f0000000940)={0x0, 0x6a03, 0x8, 0x1, 0x16c, 0x0, r7}) syz_genetlink_get_family_id$smc(&(0x7f00000009c0), r4) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) 10:19:35 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000240)='htcp\x00', 0x5) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000280)=0x7f, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000540)="71aa618f1066790b9ca7541b4637fb294ba0770f11958bd3265df874beb7943d8fdd18d4dacc7eb8de52b3da7ea083d35b56c0074821544b4062191ca72b2c5d128f2db5df59ad4df7d10cbc0735db772779866453b28081a22a8f8826a107bdb4f9d868ff331ac455c393d117e3b894a95cad256fcacacb2fd1129cf44944cf07f2d84aae0feac5cbfce71180f01d748d1c1d6d441b01b610a382493dfb77d2d60b37f2656d04218aeda7b3ad916b23ea5fab46ece2dc0edac8f260a30565b5b9cc4f6a", 0xc4}, {&(0x7f0000000640)="ffc85f3b71943fe3526e3145dfe0cdda0ae4c9507ec01b97275e9599527c6338cc1341d439012c2122c79d3fac444f27f9a9fce36dc0235bc09c02b4f8c4c4e331de9353c853cf9e1635a10b75f07d6d289856404d", 0x55}, {&(0x7f00000006c0)="63014dee3bbcf8e3a506f749b91216cc2916b6d52a8a92b5e9200aeb849b675a3f789c82b288899349f5b8d5913aca2423276479db9d58d7b832e923de7bb69b5a85669bcb5076d1db7ff81e5dead29da52924b091ff8889b0985e7fa982d52ca2f47cd32fe42b9f8f3266e60045a27a74947f36ecbb4fb45361dd7aa4a86a2cffb129731cfc054eb7579c18931bfe1490c843366ba4322156849e4617acc27685", 0xa1}], 0x3, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x20, 0x80}, 0x40000) 10:19:35 executing program 1: ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8001, 0x1}}, './file0\x00'}) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) r1 = gettid() syz_open_procfs$namespace(r1, &(0x7f0000000040)='ns/ipc\x00') ptrace$peeksig(0x4209, r1, &(0x7f0000000080)={0x7ff, 0x0, 0x1}, &(0x7f00000000c0)=[{}]) ioctl$HIDIOCGRDESC(r0, 0x90044802, &(0x7f0000000140)={0x19, "d477f42664344f7d3bb8d47f61601055e8383704671c6b1454"}) getpriority(0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x10900, 0x88) recvmsg$unix(r2, &(0x7f0000000480)={&(0x7f00000001c0), 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/25, 0x19}, {&(0x7f0000000280)=""/46, 0x2e}], 0x2, &(0x7f0000000300)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x150}, 0x2041) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r6, 0xc0189379, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r7 = memfd_secret(0x80000) accept$unix(r7, 0x0, &(0x7f0000000500)) ioctl$NS_GET_NSTYPE(r3, 0xb703, 0x0) r8 = syz_genetlink_get_family_id$smc(&(0x7f0000000580), r4) sendmsg$SMC_PNETID_DEL(r5, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x34, r8, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f00000006c0), r2) 10:19:35 executing program 7: fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000000)=']!\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xff, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="1a574815b6185e042d60d885c18d7a134bb837a114917738f256e017f706ecc8bd051a9e88b2a77ce12138806e4a1f45c91f8e62cad166bc2051b5c89328", 0x3e, 0xfffffffffffffffe}], 0x1008002, &(0x7f0000000180)={[{@utf8no}, {@shortname_win95}, {@shortname_lower}, {@rodir}, {@nonumtail}, {@numtail}, {@shortname_win95}], [{@pcr}, {@measure}, {@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x30, 0x61, 0x63, 0x64, 0x34, 0x65, 0x34], 0x2d, [0x62, 0x36, 0x31, 0x63], 0x2d, [0x35, 0x36, 0x63, 0x31], 0x2d, [0x62, 0x15359d50cc9df773, 0x34, 0x57], 0x2d, [0x5c, 0x32, 0x66, 0x36, 0x66, 0x64, 0x35, 0x35]}}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfshat={'smackfshat', 0x3d, ']!\x00'}}, {@appraise_type}, {@subj_type}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000002c0)=0x80, 0x2) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) write$hidraw(r3, &(0x7f0000000340)="39b0a85c1fe20c732238c7bf17723a5aafb211ab9ac530e9d3", 0x19) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0), r2) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x84, r4, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x2}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x3, 0x8, 0x6]}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x39}}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}]}, 0x84}, 0x1, 0x0, 0x0, 0x800}, 0x8010) r5 = ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r5) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, r0, {0x6}}, './file1\x00'}) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r0, &(0x7f0000000580)={0x80000000}) socketpair(0x11, 0x2, 0x1f, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$TIPC_CMD_SET_NODE_ADDR(r7, &(0x7f0000000640)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0}, 0xc0080) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000680)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r8, 0xc0189371, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) syz_mount_image$vfat(&(0x7f0000000700), &(0x7f0000000740)='./file1\x00', 0x2, 0x6, &(0x7f0000000b00)=[{&(0x7f0000000780)="3af73b17b2f40e227f8c4aaf1db8d70bd2a32e49b5abde2b9a1343b14ef11d4236ebc9e0f79a77580c5194bb36be4aed5b52b782716d639b41306187b5d264cc53916506eedd409caa271c0aeb5cd720fec7aa67eed30f8f508dfe4cc95af5dc6f067faedccf46bb296c89ec9a51a0a89247e1ededc1a7ba0c", 0x79, 0x8000}, {&(0x7f0000000800)="10daa81ce2f6c7fea33447bf2ad690a49c393b7a527de4c6723c3c3a29d1507374af4f4b27ec4823cea64cfd89a66e69f1c340ee381cff632857a67e591ef20ace5dad14ab706ae020ed43f413824cdc9fdb33624bc137b9c7f23ce016a889c76100d567701034ac1e29f88cba12f8b1c3e54df33aa4d06050527064f1f707d96249762e5332dfa5801652a0f3a170dda1", 0x91, 0x3}, {&(0x7f00000008c0)="88dc4cc242558b6ae26a21b427f13e4762eec85ca8d950a28c4866d67f61fe51b300b0a672d7a34570926e1614f427b82df8e6f7db7da6537264df6ac834e025c3aeb07af81588616a3c9d8ed5d1a3371204eb80c266ddb94c46f22870380391274810ec5d0012d2f25d94798c3dac965ad03ed88cdd60529ba9316d65ec3c55a32b03cae220961af740d2b9765eca38d5ee85be12fe318955aed1441feaa50820338f42388a5682db6319e9894dba76c4ef911148e7eebf9cf1843f7516fea18009838251a7053a968a5837772885690217794f1e3afc8fb7217ca6597a", 0xde, 0x2}, {&(0x7f00000009c0)="8b86466cf7712d8d23dd26a8a13e1d4064363ff903260aa03f220ba763f239a2253d96e12326d0e36d1edef5bc10fdf8450cfc5801bef0b990cc0ef9cb39691d06113f2f66495afe83926eb4a4cf6fe68c2279804436ede30edb79d9e417f0711574e26b2559ee8c48c12ad4e1668885cbb8b6aa20e87bba70e5e6e861f509c3f952a79944e169807d8a974c5e065ad9b853c95464cbf814ce6d0d1e0fa3a3a5df6fc5598986720a0f1358608f87dbeae1e74181e613e149c7ebc8859e", 0xbd, 0x2}, {&(0x7f0000000a80)="317d180049562ef4ba8530eacad13770c925c0a396dfe5d17bfb6bc35079ff9a440e67363c15a1d6c7c9ad59e24ba173d105abb55beef8", 0x37, 0xc3}, {&(0x7f0000000ac0)="076da493a19df1c53582408e2cf4780aace6aa4a8c87057e4e1f983b326f059da717d17b0a2043f9ea5805bcee02dc71148572921b26e6d1329c26a5810c6e", 0x3f, 0xcf}], 0x1044000, &(0x7f0000000bc0)={[{@shortname_lower}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsroot={'smackfsroot', 0x3d, '+*\''}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) r9 = openat(0xffffffffffffff9c, &(0x7f0000000c80)='./file0\x00', 0x81, 0x1) execveat(r9, &(0x7f0000000cc0)='./file1\x00', &(0x7f0000000d40)=[&(0x7f0000000d00)='\x00'], &(0x7f0000000e00)=[&(0x7f0000000d80)='nnonumtail=1', &(0x7f0000000dc0)='nnonumtail=1'], 0x1000) 10:19:35 executing program 5: ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000000)) bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x24040000) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x3, @link='broadcast-link\x00'}}}}, 0x68}}, 0x400d4) link(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000780)={0x0, [], 0x7f, "ac74680eaee4c7"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001780)={{0x0, 0x3, 0x9, 0x7, 0x7fffffff, 0x519, 0x7, 0x0, 0x40, 0x8, 0x3f, 0x3f, 0x3f, 0xfffffffffffffffd, 0x5}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002780)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002980)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002b80)={0x81, [], 0x0, "67b0e37f9967b3"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000003b80)={0x0, [], 0x4, "a46dfcdc0c77a1"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000004b80)) [ 177.734863] loop7: detected capacity change from 0 to 16383 10:19:35 executing program 6: r0 = memfd_secret(0x80000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x0, 0x400, 0x70bd27, 0x25dfdbff, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r3 = gettid() sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x48, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {{}, {@void, @void, @val={0xc, 0x99, {0xff, 0x75}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x7b}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x73}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r0}, @NL80211_ATTR_PID={0x8, 0x52, r3}]}, 0x48}}, 0x44000) ptrace$setregs(0xf, 0x0, 0x5, &(0x7f00000003c0)="bdd67d59efde8cf926ccf0b712fbd0577bc1c988990bf6a06795764c0463d0ea41a21b9a7335a7b330e53feed0cae6") r4 = gettid() rt_sigqueueinfo(r4, 0x12, &(0x7f0000000400)={0x27, 0x6, 0x6}) r5 = socket(0x1a, 0x800, 0x2) sendmsg$SMC_PNETID_ADD(r5, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x48, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x2000000) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x8080}, 0x4000000) sched_rr_get_interval(r3, &(0x7f00000006c0)) lgetxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)=@known='system.sockprotoname\x00', &(0x7f0000000780)=""/153, 0x99) chown(&(0x7f0000000840)='./file0\x00', 0x0, 0x0) [ 177.775658] loop7: detected capacity change from 0 to 128 10:19:35 executing program 5: ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000000)) bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x24040000) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x3, @link='broadcast-link\x00'}}}}, 0x68}}, 0x400d4) link(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000780)={0x0, [], 0x7f, "ac74680eaee4c7"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001780)={{0x0, 0x3, 0x9, 0x7, 0x7fffffff, 0x519, 0x7, 0x0, 0x40, 0x8, 0x3f, 0x3f, 0x3f, 0xfffffffffffffffd, 0x5}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002780)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002980)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002b80)={0x81, [], 0x0, "67b0e37f9967b3"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000003b80)={0x0, [], 0x4, "a46dfcdc0c77a1"}) 10:19:35 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000240)='htcp\x00', 0x5) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000280)=0x7f, 0x2) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000540)="71aa618f1066790b9ca7541b4637fb294ba0770f11958bd3265df874beb7943d8fdd18d4dacc7eb8de52b3da7ea083d35b56c0074821544b4062191ca72b2c5d128f2db5df59ad4df7d10cbc0735db772779866453b28081a22a8f8826a107bdb4f9d868ff331ac455c393d117e3b894a95cad256fcacacb2fd1129cf44944cf07f2d84aae0feac5cbfce71180f01d748d1c1d6d441b01b610a382493dfb77d2d60b37f2656d04218aeda7b3ad916b23ea5fab46ece2dc0edac8f260a30565b5b9cc4f6a", 0xc4}, {&(0x7f0000000640)="ffc85f3b71943fe3526e3145dfe0cdda0ae4c9507ec01b97275e9599527c6338cc1341d439012c2122c79d3fac444f27f9a9fce36dc0235bc09c02b4f8c4c4e331de9353c853cf9e1635a10b75f07d6d289856404d", 0x55}, {&(0x7f00000006c0)="63014dee3bbcf8e3a506f749b91216cc2916b6d52a8a92b5e9200aeb849b675a3f789c82b288899349f5b8d5913aca2423276479db9d58d7b832e923de7bb69b5a85669bcb5076d1db7ff81e5dead29da52924b091ff8889b0985e7fa982d52ca2f47cd32fe42b9f8f3266e60045a27a74947f36ecbb4fb45361dd7aa4a86a2cffb129731cfc054eb7579c18931bfe1490c843366ba4322156849e4617acc27685", 0xa1}], 0x3, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x20, 0x80}, 0x40000) 10:19:35 executing program 0: setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)={0x8, "e3c5e2"}, 0x6) r0 = fsopen(&(0x7f0000000040)='cgroup\x00', 0x8d07077d4dd54d41) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x125180, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, 0x0, 0x800, 0x70bd29, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x6, @link='syz0\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x810}, 0x20000008) r3 = accept4$unix(r2, 0x0, &(0x7f0000000240), 0x800) newfstatat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) mount$cgroup2(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x400, &(0x7f00000003c0)={[{@subsystem='cpu'}, {@memory_recursiveprot}, {@subsystem='pids'}, {@subsystem='hugetlb'}, {}, {@memory_localevents}, {@memory_recursiveprot}, {@memory_recursiveprot}], [{@dont_appraise}, {@obj_role={'obj_role', 0x3d, '!'}}, {@euid_eq={'euid', 0x3d, r4}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'cgroup\x00'}}, {@euid_lt}, {@appraise}, {@subj_user={'subj_user', 0x3d, '\''}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\'}[*'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x34, 0x31, 0x64, 0x32, 0x3d9af854c7cdb0c2, 0x57, 0x64], 0x2d, [0x35, 0x39, 0x36, 0x66], 0x2d, [0x61, 0x31, 0x38, 0x31], 0x2d, [0x32, 0x32, 0x35, 0x36], 0x2d, [0x64, 0x61, 0x64, 0x30, 0x36, 0x38, 0x38, 0x63]}}}]}) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x68, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x196, @media='udp\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40800}, 0x4004000) ptrace$setregs(0xd, 0x0, 0x50, &(0x7f0000000640)="7ff032286d7cb70dc4687c2cb7940b61a91a7a7d2ac1bafcf00b1ddad49e3668e779fdb5c321a7d2649e6ed0467be863cf05eb0af6617c3d27553bcde3d92af8de2e613b9a17f00624f8531eaf0621b4d215b68d170f77f52fa5b77ccf6630353e4a487818ca16802ddbf34456d580b910b88dc8b8122b814fef2a3c9225465f4ce86f31a2d82d490e9d51f98ce8359428eb") sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x7c, 0x0, 0x100, 0x70bd25, 0x25dfdbff, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'hsr0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'team0\x00'}]}, 0x7c}}, 0x4000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000840)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r5, 0xc0189379, &(0x7f0000000880)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) lsetxattr$security_capability(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900), &(0x7f0000000940)=@v1={0x1000000, [{0x80, 0x5}]}, 0xc, 0x3) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x1c, 0x0, 0x8, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000b40), r5) 10:19:35 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000850) syz_genetlink_get_family_id$SEG6(&(0x7f0000000180), 0xffffffffffffffff) read$hidraw(0xffffffffffffffff, &(0x7f00000001c0)=""/177, 0xb1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000000280)=""/136, 0x88}, {&(0x7f0000000340)=""/58, 0x3a}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x3, &(0x7f00000013c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}, 0x40) sendmsg$SMC_PNETID_GET(r6, &(0x7f0000001540)={0xfffffffffffffffe, 0x0, &(0x7f0000001500)={&(0x7f0000001480)={0x60, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'nr0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv_slave_1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x60}}, 0x10) r10 = syz_genetlink_get_family_id$smc(&(0x7f00000015c0), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r6, &(0x7f00000016c0)={&(0x7f0000001580), 0xc, &(0x7f0000001680)={&(0x7f0000001600)={0x4c, r10, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000) r11 = syz_genetlink_get_family_id$smc(&(0x7f0000001740), r9) sendmsg$SMC_PNETID_DEL(r4, &(0x7f0000001800)={&(0x7f0000001700), 0xc, &(0x7f00000017c0)={&(0x7f0000001780)={0x20, r11, 0x400, 0x70bd26, 0x25dfdbff, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040004}, 0x4000) sendmsg$TIPC_CMD_GET_LINKS(r6, &(0x7f0000001900)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000018c0)={&(0x7f0000001880)={0x24, r0, 0x100, 0x70bd2b, 0x25dfdbfb, {{}, {}, {0x8, 0x11, 0x81}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0xb101409338bc67e5}, 0x4000000) r12 = syz_genetlink_get_family_id$tipc(&(0x7f0000001980), r6) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000001a40)={&(0x7f0000001940)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001a00)={&(0x7f00000019c0)={0x1c, r12, 0xa08, 0x70bd28, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) clock_getres(0x1, &(0x7f0000001a80)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000001b00)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r7, &(0x7f0000001c80)={r8, 0xffffffffffffffff, 0x3f}) 10:19:35 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000240)='htcp\x00', 0x5) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000540)="71aa618f1066790b9ca7541b4637fb294ba0770f11958bd3265df874beb7943d8fdd18d4dacc7eb8de52b3da7ea083d35b56c0074821544b4062191ca72b2c5d128f2db5df59ad4df7d10cbc0735db772779866453b28081a22a8f8826a107bdb4f9d868ff331ac455c393d117e3b894a95cad256fcacacb2fd1129cf44944cf07f2d84aae0feac5cbfce71180f01d748d1c1d6d441b01b610a382493dfb77d2d60b37f2656d04218aeda7b3ad916b23ea5fab46ece2dc0edac8f260a30565b5b9cc4f6a", 0xc4}, {&(0x7f0000000640)="ffc85f3b71943fe3526e3145dfe0cdda0ae4c9507ec01b97275e9599527c6338cc1341d439012c2122c79d3fac444f27f9a9fce36dc0235bc09c02b4f8c4c4e331de9353c853cf9e1635a10b75f07d6d289856404d", 0x55}, {&(0x7f00000006c0)="63014dee3bbcf8e3a506f749b91216cc2916b6d52a8a92b5e9200aeb849b675a3f789c82b288899349f5b8d5913aca2423276479db9d58d7b832e923de7bb69b5a85669bcb5076d1db7ff81e5dead29da52924b091ff8889b0985e7fa982d52ca2f47cd32fe42b9f8f3266e60045a27a74947f36ecbb4fb45361dd7aa4a86a2cffb129731cfc054eb7579c18931bfe1490c843366ba4322156849e4617acc27685", 0xa1}], 0x3, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x20, 0x80}, 0x40000) 10:19:35 executing program 5: ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000000)) bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x24040000) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x3, @link='broadcast-link\x00'}}}}, 0x68}}, 0x400d4) link(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000780)={0x0, [], 0x7f, "ac74680eaee4c7"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001780)={{0x0, 0x3, 0x9, 0x7, 0x7fffffff, 0x519, 0x7, 0x0, 0x40, 0x8, 0x3f, 0x3f, 0x3f, 0xfffffffffffffffd, 0x5}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002780)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002980)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002b80)={0x81, [], 0x0, "67b0e37f9967b3"}) 10:19:35 executing program 7: fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000000)=']!\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xff, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="1a574815b6185e042d60d885c18d7a134bb837a114917738f256e017f706ecc8bd051a9e88b2a77ce12138806e4a1f45c91f8e62cad166bc2051b5c89328", 0x3e, 0xfffffffffffffffe}], 0x1008002, &(0x7f0000000180)={[{@utf8no}, {@shortname_win95}, {@shortname_lower}, {@rodir}, {@nonumtail}, {@numtail}, {@shortname_win95}], [{@pcr}, {@measure}, {@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x30, 0x61, 0x63, 0x64, 0x34, 0x65, 0x34], 0x2d, [0x62, 0x36, 0x31, 0x63], 0x2d, [0x35, 0x36, 0x63, 0x31], 0x2d, [0x62, 0x15359d50cc9df773, 0x34, 0x57], 0x2d, [0x5c, 0x32, 0x66, 0x36, 0x66, 0x64, 0x35, 0x35]}}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfshat={'smackfshat', 0x3d, ']!\x00'}}, {@appraise_type}, {@subj_type}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000002c0)=0x80, 0x2) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) write$hidraw(r3, &(0x7f0000000340)="39b0a85c1fe20c732238c7bf17723a5aafb211ab9ac530e9d3", 0x19) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0), r2) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x84, r4, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x2}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x3, 0x8, 0x6]}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x39}}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}]}, 0x84}, 0x1, 0x0, 0x0, 0x800}, 0x8010) r5 = ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r5) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, r0, {0x6}}, './file1\x00'}) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r0, &(0x7f0000000580)={0x80000000}) socketpair(0x11, 0x2, 0x1f, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$TIPC_CMD_SET_NODE_ADDR(r7, &(0x7f0000000640)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0}, 0xc0080) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000680)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r8, 0xc0189371, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) r9 = openat(0xffffffffffffff9c, &(0x7f0000000c80)='./file0\x00', 0x81, 0x1) execveat(r9, &(0x7f0000000cc0)='./file1\x00', &(0x7f0000000d40)=[&(0x7f0000000d00)='\x00'], &(0x7f0000000e00)=[&(0x7f0000000d80)='nnonumtail=1', &(0x7f0000000dc0)='nnonumtail=1'], 0x1000) 10:19:36 executing program 1: ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8001, 0x1}}, './file0\x00'}) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) r1 = gettid() syz_open_procfs$namespace(r1, &(0x7f0000000040)='ns/ipc\x00') ptrace$peeksig(0x4209, r1, &(0x7f0000000080)={0x7ff, 0x0, 0x1}, &(0x7f00000000c0)=[{}]) ioctl$HIDIOCGRDESC(r0, 0x90044802, &(0x7f0000000140)={0x19, "d477f42664344f7d3bb8d47f61601055e8383704671c6b1454"}) getpriority(0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x10900, 0x88) recvmsg$unix(r2, &(0x7f0000000480)={&(0x7f00000001c0), 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/25, 0x19}, {&(0x7f0000000280)=""/46, 0x2e}], 0x2, &(0x7f0000000300)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x150}, 0x2041) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r5, 0xc0189379, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r6 = memfd_secret(0x80000) accept$unix(r6, 0x0, &(0x7f0000000500)) ioctl$NS_GET_NSTYPE(r3, 0xb703, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000580), r4) syz_genetlink_get_family_id$tipc(&(0x7f00000006c0), r2) [ 177.987426] loop7: detected capacity change from 0 to 16383 [ 187.844109] Bluetooth: hci5: command 0x0406 tx timeout [ 187.844410] INFO: task rcu_gp:3 blocked for more than 143 seconds. [ 187.844955] Bluetooth: hci0: command 0x0406 tx timeout [ 187.845951] Not tainted 6.0.0-rc7-next-20220930 #1 [ 187.846700] Bluetooth: hci2: command 0x0406 tx timeout [ 187.847386] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 187.847398] task:rcu_gp state:I [ 187.848189] Bluetooth: hci1: command 0x0406 tx timeout [ 187.849608] stack:30328 pid:3 ppid:2 flags:0x00004000 [ 187.851044] Bluetooth: hci3: command 0x0406 tx timeout [ 187.851850] Call Trace: [ 187.852781] Bluetooth: hci7: command 0x0406 tx timeout [ 187.853545] [ 187.853567] __schedule+0x893/0x2470 [ 187.853988] Bluetooth: hci6: command 0x0406 tx timeout [ 187.854663] ? io_schedule_timeout+0x150/0x150 [ 187.856956] ? do_raw_spin_lock+0x121/0x260 [ 187.857602] ? rwlock_bug.part.0+0x90/0x90 [ 187.858228] schedule+0xda/0x1b0 [ 187.858716] rescuer_thread+0x851/0xdb0 [ 187.859302] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 187.860030] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 187.860790] ? lockdep_hardirqs_on+0x79/0x100 [ 187.861461] ? worker_thread+0x1260/0x1260 [ 187.862116] kthread+0x2ed/0x3a0 [ 187.862617] ? kthread_complete_and_exit+0x40/0x40 [ 187.863365] ret_from_fork+0x22/0x30 [ 187.863934] [ 187.864296] INFO: task rcu_par_gp:4 blocked for more than 143 seconds. [ 187.865266] Not tainted 6.0.0-rc7-next-20220930 #1 [ 187.866053] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 187.867176] task:rcu_par_gp state:I stack:30944 pid:4 ppid:2 flags:0x00004000 [ 187.868404] Call Trace: [ 187.868811] [ 187.869177] __schedule+0x893/0x2470 [ 187.869735] ? io_schedule_timeout+0x150/0x150 [ 187.870427] ? do_raw_spin_lock+0x121/0x260 [ 187.871082] ? rwlock_bug.part.0+0x90/0x90 [ 187.871713] schedule+0xda/0x1b0 [ 187.872232] rescuer_thread+0x851/0xdb0 [ 187.872845] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 187.873590] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 187.874345] ? lockdep_hardirqs_on+0x79/0x100 [ 187.875044] ? worker_thread+0x1260/0x1260 [ 187.875667] kthread+0x2ed/0x3a0 [ 187.876198] ? kthread_complete_and_exit+0x40/0x40 [ 187.876938] ret_from_fork+0x22/0x30 [ 187.877532] [ 187.877875] INFO: task slub_flushwq:5 blocked for more than 143 seconds. [ 187.878826] Not tainted 6.0.0-rc7-next-20220930 #1 [ 187.879601] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 187.880729] task:slub_flushwq state:I stack:30944 pid:5 ppid:2 flags:0x00004000 [ 187.881931] Call Trace: [ 187.882321] [ 187.882663] __schedule+0x893/0x2470 [ 187.883246] ? io_schedule_timeout+0x150/0x150 [ 187.883921] ? do_raw_spin_lock+0x121/0x260 [ 187.884585] ? rwlock_bug.part.0+0x90/0x90 [ 187.885242] schedule+0xda/0x1b0 [ 187.885753] rescuer_thread+0x851/0xdb0 [ 187.886368] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 187.887118] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 187.887849] ? lockdep_hardirqs_on+0x79/0x100 [ 187.888552] ? worker_thread+0x1260/0x1260 [ 187.889188] kthread+0x2ed/0x3a0 [ 187.889676] ? kthread_complete_and_exit+0x40/0x40 [ 187.890404] ret_from_fork+0x22/0x30 [ 187.890956] [ 187.891319] INFO: task netns:6 blocked for more than 143 seconds. [ 187.892185] Not tainted 6.0.0-rc7-next-20220930 #1 [ 187.892925] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 187.893992] task:netns state:I stack:30944 pid:6 ppid:2 flags:0x00004000 [ 187.895167] Call Trace: [ 187.895532] [ 187.895877] __schedule+0x893/0x2470 [ 187.896493] ? io_schedule_timeout+0x150/0x150 [ 187.897178] ? do_raw_spin_lock+0x121/0x260 [ 187.897794] ? rwlock_bug.part.0+0x90/0x90 [ 187.898451] schedule+0xda/0x1b0 [ 187.898953] rescuer_thread+0x851/0xdb0 [ 187.899554] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 187.900289] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 187.901037] ? lockdep_hardirqs_on+0x79/0x100 [ 187.901681] ? worker_thread+0x1260/0x1260 [ 187.902324] kthread+0x2ed/0x3a0 [ 187.902822] ? kthread_complete_and_exit+0x40/0x40 [ 187.903538] ret_from_fork+0x22/0x30 [ 187.904119] [ 187.904460] INFO: task kworker/0:0:7 blocked for more than 143 seconds. [ 187.905414] Not tainted 6.0.0-rc7-next-20220930 #1 [ 187.906168] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 187.907236] task:kworker/0:0 state:I stack:29592 pid:7 ppid:2 flags:0x00004000 [ 187.908400] Workqueue: 0x0 (ata_sff) [ 187.908992] Call Trace: [ 187.909362] [ 187.909691] __schedule+0x893/0x2470 [ 187.910265] ? io_schedule_timeout+0x150/0x150 [ 187.910910] ? do_raw_spin_lock+0x121/0x260 [ 187.911563] schedule+0xda/0x1b0 [ 187.912082] worker_thread+0x15f/0x1260 [ 187.912688] ? process_one_work+0x16a0/0x16a0 [ 187.913356] kthread+0x2ed/0x3a0 [ 187.913843] ? kthread_complete_and_exit+0x40/0x40 [ 187.914567] ret_from_fork+0x22/0x30 [ 187.915149] [ 187.915486] INFO: task kworker/0:0H:8 blocked for more than 143 seconds. [ 187.916422] Not tainted 6.0.0-rc7-next-20220930 #1 [ 187.917198] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 187.918257] task:kworker/0:0H state:I stack:28952 pid:8 ppid:2 flags:0x00004000 [ 187.919422] Workqueue: 0x0 (kblockd) [ 187.919986] Call Trace: [ 187.920351] [ 187.920689] __schedule+0x893/0x2470 [ 187.921264] ? io_schedule_timeout+0x150/0x150 [ 187.921929] schedule+0xda/0x1b0 [ 187.922449] worker_thread+0x15f/0x1260 [ 187.923063] ? process_one_work+0x16a0/0x16a0 [ 187.923711] kthread+0x2ed/0x3a0 [ 187.924230] ? kthread_complete_and_exit+0x40/0x40 [ 187.924940] ret_from_fork+0x22/0x30 [ 187.925528] [ 187.925867] INFO: task mm_percpu_wq:10 blocked for more than 143 seconds. [ 187.926808] Not tainted 6.0.0-rc7-next-20220930 #1 [ 187.927562] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 187.928650] task:mm_percpu_wq state:I stack:30944 pid:10 ppid:2 flags:0x00004000 [ 187.929815] Call Trace: [ 187.930205] [ 187.930537] __schedule+0x893/0x2470 [ 187.931113] ? io_schedule_timeout+0x150/0x150 [ 187.931760] ? do_raw_spin_lock+0x121/0x260 [ 187.932398] ? rwlock_bug.part.0+0x90/0x90 [ 187.933052] schedule+0xda/0x1b0 [ 187.933550] rescuer_thread+0x851/0xdb0 [ 187.934149] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 187.934854] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 187.935583] ? lockdep_hardirqs_on+0x79/0x100 [ 187.936244] ? worker_thread+0x1260/0x1260 [ 187.936874] kthread+0x2ed/0x3a0 [ 187.937392] ? kthread_complete_and_exit+0x40/0x40 [ 187.938148] ret_from_fork+0x22/0x30 [ 187.938708] [ 187.939066] INFO: task rcu_tasks_kthre:11 blocked for more than 143 seconds. [ 187.940046] Not tainted 6.0.0-rc7-next-20220930 #1 [ 187.940784] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 187.941861] task:rcu_tasks_kthre state:I stack:29272 pid:11 ppid:2 flags:0x00004000 [ 187.943030] Call Trace: [ 187.943393] [ 187.943724] __schedule+0x893/0x2470 [ 187.944298] ? io_schedule_timeout+0x150/0x150 [ 187.944995] ? mark_held_locks+0x9e/0xe0 [ 187.945586] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 187.946322] schedule+0xda/0x1b0 [ 187.946814] rcu_tasks_one_gp+0x3db/0xc10 [ 187.947459] rcu_tasks_kthread+0x80/0xa0 [ 187.948082] ? rcu_tasks_postscan+0x10/0x10 [ 187.948713] kthread+0x2ed/0x3a0 [ 187.949230] ? kthread_complete_and_exit+0x40/0x40 [ 187.949927] ret_from_fork+0x22/0x30 [ 187.950504] [ 187.982863] INFO: task kworker/0:1:12 blocked for more than 143 seconds. [ 187.984324] Not tainted 6.0.0-rc7-next-20220930 #1 [ 187.985128] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 187.986199] task:kworker/0:1 state:I stack:26832 pid:12 ppid:2 flags:0x00004000 [ 187.987370] Workqueue: 0x0 (cgroup_destroy) [ 187.988031] Call Trace: [ 187.988396] [ 187.988738] __schedule+0x893/0x2470 [ 187.989314] ? io_schedule_timeout+0x150/0x150 [ 187.989994] ? rwlock_bug.part.0+0x90/0x90 [ 187.990613] schedule+0xda/0x1b0 [ 187.991137] worker_thread+0x15f/0x1260 [ 187.991723] ? __kthread_parkme+0x15a/0x220 [ 187.992351] ? process_one_work+0x16a0/0x16a0 [ 187.993055] kthread+0x2ed/0x3a0 [ 187.993546] ? kthread_complete_and_exit+0x40/0x40 [ 187.994270] ret_from_fork+0x22/0x30 [ 187.994821] [ 187.995180] INFO: task kworker/1:0H:21 blocked for more than 143 seconds. [ 187.996115] Not tainted 6.0.0-rc7-next-20220930 #1 [ 187.996856] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 187.997915] task:kworker/1:0H state:I stack:29760 pid:21 ppid:2 flags:0x00004000 [ 187.999098] Workqueue: 0x0 (events_highpri) [ 187.999719] Call Trace: [ 188.000110] [ 188.000438] __schedule+0x893/0x2470 [ 188.001035] ? io_schedule_timeout+0x150/0x150 [ 188.001709] schedule+0xda/0x1b0 [ 188.002228] worker_thread+0x15f/0x1260 [ 188.002822] ? process_one_work+0x16a0/0x16a0 [ 188.003484] kthread+0x2ed/0x3a0 [ 188.003995] ? kthread_complete_and_exit+0x40/0x40 [ 188.004705] ret_from_fork+0x22/0x30 [ 188.005286] [ 188.005680] [ 188.005680] Showing all locks held in the system: [ 188.006545] 1 lock held by rcu_tasks_kthre/11: [ 188.007194] #0: ffffffff85406850 (rcu_tasks.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x26/0xc10 [ 188.008584] 1 lock held by khungtaskd/25: [ 188.009181] #0: ffffffff85407320 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 [ 188.010471] 1 lock held by in:imklog/189: [ 188.011068] 4 locks held by syz-executor/4318: [ 188.011700] [ 188.011943] ============================================= [ 188.011943] 10:19:50 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000850) syz_genetlink_get_family_id$SEG6(&(0x7f0000000180), 0xffffffffffffffff) read$hidraw(0xffffffffffffffff, &(0x7f00000001c0)=""/177, 0xb1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000000280)=""/136, 0x88}, {&(0x7f0000000340)=""/58, 0x3a}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x3, &(0x7f00000013c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}, 0x40) sendmsg$SMC_PNETID_GET(r5, &(0x7f0000001540)={0xfffffffffffffffe, 0x0, &(0x7f0000001500)={&(0x7f0000001480)={0x60, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'nr0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv_slave_1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x60}}, 0x10) r9 = syz_genetlink_get_family_id$smc(&(0x7f00000015c0), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r5, &(0x7f00000016c0)={&(0x7f0000001580), 0xc, &(0x7f0000001680)={&(0x7f0000001600)={0x4c, r9, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000) r10 = syz_genetlink_get_family_id$smc(&(0x7f0000001740), r8) sendmsg$SMC_PNETID_DEL(r4, &(0x7f0000001800)={&(0x7f0000001700), 0xc, &(0x7f00000017c0)={&(0x7f0000001780)={0x20, r10, 0x400, 0x70bd26, 0x25dfdbff, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040004}, 0x4000) sendmsg$TIPC_CMD_GET_LINKS(r5, &(0x7f0000001900)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000018c0)={&(0x7f0000001880)={0x24, r0, 0x100, 0x70bd2b, 0x25dfdbfb, {{}, {}, {0x8, 0x11, 0x81}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0xb101409338bc67e5}, 0x4000000) r11 = syz_genetlink_get_family_id$tipc(&(0x7f0000001980), r5) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000001a40)={&(0x7f0000001940)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001a00)={&(0x7f00000019c0)={0x1c, r11, 0xa08, 0x70bd28, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) clock_getres(0x1, &(0x7f0000001a80)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r6, &(0x7f0000001c80)={r7, 0xffffffffffffffff, 0x3f}) 10:19:50 executing program 1: ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8001, 0x1}}, './file0\x00'}) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) r1 = gettid() syz_open_procfs$namespace(r1, &(0x7f0000000040)='ns/ipc\x00') ptrace$peeksig(0x4209, r1, &(0x7f0000000080)={0x7ff, 0x0, 0x1}, &(0x7f00000000c0)=[{}]) ioctl$HIDIOCGRDESC(r0, 0x90044802, &(0x7f0000000140)={0x19, "d477f42664344f7d3bb8d47f61601055e8383704671c6b1454"}) getpriority(0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x10900, 0x88) recvmsg$unix(r2, &(0x7f0000000480)={&(0x7f00000001c0), 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/25, 0x19}, {&(0x7f0000000280)=""/46, 0x2e}], 0x2, &(0x7f0000000300)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x150}, 0x2041) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r5, 0xc0189379, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r6 = memfd_secret(0x80000) accept$unix(r6, 0x0, &(0x7f0000000500)) ioctl$NS_GET_NSTYPE(r3, 0xb703, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000006c0), r2) 10:19:50 executing program 4: ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x400}}, '.\x00'}) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040)={0x5, "bc7f48"}, 0x6) r1 = io_uring_setup(0x3c02, &(0x7f0000000080)={0x0, 0x77af, 0x0, 0x1, 0x166, 0x0, r0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x5, 0x1d0}}, './file0\x00'}) accept4$unix(r0, &(0x7f0000000140), &(0x7f00000001c0)=0x6e, 0x0) mknodat$loop(r2, &(0x7f0000000200)='./file0\x00', 0x100, 0x1) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {r3}}, './file0\x00'}) sendmsg$TIPC_CMD_SET_LINK_TOL(r5, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x68, 0x0, 0x200, 0x70bd2d, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0x1, @link='syz0\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4008005}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000054}, 0x40000c4) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x4000010, r5, 0x10000000) syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000900)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) io_uring_setup(0x131a, &(0x7f0000000940)={0x0, 0x6a03, 0x8, 0x1, 0x16c, 0x0, r7}) syz_genetlink_get_family_id$smc(&(0x7f00000009c0), r4) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x24, 0x0, 0x8, 0x70bd2a, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x1}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24000001}, 0x44000) 10:19:50 executing program 5: ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000000)) bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x24040000) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x3, @link='broadcast-link\x00'}}}}, 0x68}}, 0x400d4) link(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000780)={0x0, [], 0x7f, "ac74680eaee4c7"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001780)={{0x0, 0x3, 0x9, 0x7, 0x7fffffff, 0x519, 0x7, 0x0, 0x40, 0x8, 0x3f, 0x3f, 0x3f, 0xfffffffffffffffd, 0x5}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002780)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002980)) 10:19:50 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000540)="71aa618f1066790b9ca7541b4637fb294ba0770f11958bd3265df874beb7943d8fdd18d4dacc7eb8de52b3da7ea083d35b56c0074821544b4062191ca72b2c5d128f2db5df59ad4df7d10cbc0735db772779866453b28081a22a8f8826a107bdb4f9d868ff331ac455c393d117e3b894a95cad256fcacacb2fd1129cf44944cf07f2d84aae0feac5cbfce71180f01d748d1c1d6d441b01b610a382493dfb77d2d60b37f2656d04218aeda7b3ad916b23ea5fab46ece2dc0edac8f260a30565b5b9cc4f6a", 0xc4}, {&(0x7f0000000640)="ffc85f3b71943fe3526e3145dfe0cdda0ae4c9507ec01b97275e9599527c6338cc1341d439012c2122c79d3fac444f27f9a9fce36dc0235bc09c02b4f8c4c4e331de9353c853cf9e1635a10b75f07d6d289856404d", 0x55}, {&(0x7f00000006c0)="63014dee3bbcf8e3a506f749b91216cc2916b6d52a8a92b5e9200aeb849b675a3f789c82b288899349f5b8d5913aca2423276479db9d58d7b832e923de7bb69b5a85669bcb5076d1db7ff81e5dead29da52924b091ff8889b0985e7fa982d52ca2f47cd32fe42b9f8f3266e60045a27a74947f36ecbb4fb45361dd7aa4a86a2cffb129731cfc054eb7579c18931bfe1490c843366ba4322156849e4617acc27685", 0xa1}], 0x3, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x20, 0x80}, 0x40000) 10:19:50 executing program 0: setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)={0x8, "e3c5e2"}, 0x6) r0 = fsopen(&(0x7f0000000040)='cgroup\x00', 0x8d07077d4dd54d41) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x125180, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, 0x0, 0x800, 0x70bd29, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x6, @link='syz0\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x810}, 0x20000008) r3 = accept4$unix(r2, 0x0, &(0x7f0000000240), 0x800) newfstatat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) mount$cgroup2(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x400, &(0x7f00000003c0)={[{@subsystem='cpu'}, {@memory_recursiveprot}, {@subsystem='pids'}, {@subsystem='hugetlb'}, {}, {@memory_localevents}, {@memory_recursiveprot}, {@memory_recursiveprot}], [{@dont_appraise}, {@obj_role={'obj_role', 0x3d, '!'}}, {@euid_eq={'euid', 0x3d, r4}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'cgroup\x00'}}, {@euid_lt}, {@appraise}, {@subj_user={'subj_user', 0x3d, '\''}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\'}[*'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x34, 0x31, 0x64, 0x32, 0x3d9af854c7cdb0c2, 0x57, 0x64], 0x2d, [0x35, 0x39, 0x36, 0x66], 0x2d, [0x61, 0x31, 0x38, 0x31], 0x2d, [0x32, 0x32, 0x35, 0x36], 0x2d, [0x64, 0x61, 0x64, 0x30, 0x36, 0x38, 0x38, 0x63]}}}]}) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x68, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x196, @media='udp\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40800}, 0x4004000) ptrace$setregs(0xd, 0x0, 0x50, &(0x7f0000000640)="7ff032286d7cb70dc4687c2cb7940b61a91a7a7d2ac1bafcf00b1ddad49e3668e779fdb5c321a7d2649e6ed0467be863cf05eb0af6617c3d27553bcde3d92af8de2e613b9a17f00624f8531eaf0621b4d215b68d170f77f52fa5b77ccf6630353e4a487818ca16802ddbf34456d580b910b88dc8b8122b814fef2a3c9225465f4ce86f31a2d82d490e9d51f98ce8359428eb") sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x7c, 0x0, 0x100, 0x70bd25, 0x25dfdbff, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'hsr0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'team0\x00'}]}, 0x7c}}, 0x4000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000840)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r5, 0xc0189379, &(0x7f0000000880)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) lsetxattr$security_capability(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900), &(0x7f0000000940)=@v1={0x1000000, [{0x80, 0x5}]}, 0xc, 0x3) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x1c, 0x0, 0x8, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000b40), r5) 10:19:50 executing program 7: fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000000)=']!\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xff, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="1a574815b6185e042d60d885c18d7a134bb837a114917738f256e017f706ecc8bd051a9e88b2a77ce12138806e4a1f45c91f8e62cad166bc2051b5c89328", 0x3e, 0xfffffffffffffffe}], 0x1008002, &(0x7f0000000180)={[{@utf8no}, {@shortname_win95}, {@shortname_lower}, {@rodir}, {@nonumtail}, {@numtail}, {@shortname_win95}], [{@pcr}, {@measure}, {@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x30, 0x61, 0x63, 0x64, 0x34, 0x65, 0x34], 0x2d, [0x62, 0x36, 0x31, 0x63], 0x2d, [0x35, 0x36, 0x63, 0x31], 0x2d, [0x62, 0x15359d50cc9df773, 0x34, 0x57], 0x2d, [0x5c, 0x32, 0x66, 0x36, 0x66, 0x64, 0x35, 0x35]}}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfshat={'smackfshat', 0x3d, ']!\x00'}}, {@appraise_type}, {@subj_type}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000002c0)=0x80, 0x2) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) write$hidraw(r3, &(0x7f0000000340)="39b0a85c1fe20c732238c7bf17723a5aafb211ab9ac530e9d3", 0x19) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0), r2) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x84, r4, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x2}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x3, 0x8, 0x6]}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x39}}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}]}, 0x84}, 0x1, 0x0, 0x0, 0x800}, 0x8010) r5 = ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r5) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, r0, {0x6}}, './file1\x00'}) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r0, &(0x7f0000000580)={0x80000000}) socketpair(0x11, 0x2, 0x1f, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$TIPC_CMD_SET_NODE_ADDR(r7, &(0x7f0000000640)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0}, 0xc0080) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000680)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r8 = openat(0xffffffffffffff9c, &(0x7f0000000c80)='./file0\x00', 0x81, 0x1) execveat(r8, &(0x7f0000000cc0)='./file1\x00', &(0x7f0000000d40)=[&(0x7f0000000d00)='\x00'], &(0x7f0000000e00)=[&(0x7f0000000d80)='nnonumtail=1', &(0x7f0000000dc0)='nnonumtail=1'], 0x1000) 10:19:50 executing program 6: r0 = memfd_secret(0x80000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x0, 0x400, 0x70bd27, 0x25dfdbff, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r3 = gettid() sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x48, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {{}, {@void, @void, @val={0xc, 0x99, {0xff, 0x75}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x7b}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x73}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r0}, @NL80211_ATTR_PID={0x8, 0x52, r3}]}, 0x48}}, 0x44000) ptrace$setregs(0xf, 0x0, 0x5, &(0x7f00000003c0)="bdd67d59efde8cf926ccf0b712fbd0577bc1c988990bf6a06795764c0463d0ea41a21b9a7335a7b330e53feed0cae6") r4 = gettid() rt_sigqueueinfo(r4, 0x12, &(0x7f0000000400)={0x27, 0x6, 0x6}) r5 = socket(0x1a, 0x800, 0x2) sendmsg$SMC_PNETID_ADD(r5, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x48, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x2000000) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x8080}, 0x4000000) sched_rr_get_interval(r3, &(0x7f00000006c0)) chown(&(0x7f0000000840)='./file0\x00', 0x0, 0x0) [ 192.610604] loop7: detected capacity change from 0 to 16383 10:19:50 executing program 0: setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)={0x8, "e3c5e2"}, 0x6) r0 = fsopen(&(0x7f0000000040)='cgroup\x00', 0x8d07077d4dd54d41) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x125180, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, 0x0, 0x800, 0x70bd29, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x6, @link='syz0\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x810}, 0x20000008) r3 = accept4$unix(r2, 0x0, &(0x7f0000000240), 0x800) newfstatat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) mount$cgroup2(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x400, &(0x7f00000003c0)={[{@subsystem='cpu'}, {@memory_recursiveprot}, {@subsystem='pids'}, {@subsystem='hugetlb'}, {}, {@memory_localevents}, {@memory_recursiveprot}, {@memory_recursiveprot}], [{@dont_appraise}, {@obj_role={'obj_role', 0x3d, '!'}}, {@euid_eq={'euid', 0x3d, r4}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'cgroup\x00'}}, {@euid_lt}, {@appraise}, {@subj_user={'subj_user', 0x3d, '\''}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\'}[*'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x34, 0x31, 0x64, 0x32, 0x3d9af854c7cdb0c2, 0x57, 0x64], 0x2d, [0x35, 0x39, 0x36, 0x66], 0x2d, [0x61, 0x31, 0x38, 0x31], 0x2d, [0x32, 0x32, 0x35, 0x36], 0x2d, [0x64, 0x61, 0x64, 0x30, 0x36, 0x38, 0x38, 0x63]}}}]}) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x68, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x196, @media='udp\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40800}, 0x4004000) ptrace$setregs(0xd, 0x0, 0x50, &(0x7f0000000640)="7ff032286d7cb70dc4687c2cb7940b61a91a7a7d2ac1bafcf00b1ddad49e3668e779fdb5c321a7d2649e6ed0467be863cf05eb0af6617c3d27553bcde3d92af8de2e613b9a17f00624f8531eaf0621b4d215b68d170f77f52fa5b77ccf6630353e4a487818ca16802ddbf34456d580b910b88dc8b8122b814fef2a3c9225465f4ce86f31a2d82d490e9d51f98ce8359428eb") sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x7c, 0x0, 0x100, 0x70bd25, 0x25dfdbff, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'hsr0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'team0\x00'}]}, 0x7c}}, 0x4000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000840)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r5, 0xc0189379, &(0x7f0000000880)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) lsetxattr$security_capability(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900), &(0x7f0000000940)=@v1={0x1000000, [{0x80, 0x5}]}, 0xc, 0x3) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x1c, 0x0, 0x8, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000b40), r5) 10:19:50 executing program 5: ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000000)) bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x8, 0x70bd28, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x24040000) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x3, @link='broadcast-link\x00'}}}}, 0x68}}, 0x400d4) link(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000780)={0x0, [], 0x7f, "ac74680eaee4c7"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001780)={{0x0, 0x3, 0x9, 0x7, 0x7fffffff, 0x519, 0x7, 0x0, 0x40, 0x8, 0x3f, 0x3f, 0x3f, 0xfffffffffffffffd, 0x5}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002780)) 10:19:50 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000540)="71aa618f1066790b9ca7541b4637fb294ba0770f11958bd3265df874beb7943d8fdd18d4dacc7eb8de52b3da7ea083d35b56c0074821544b4062191ca72b2c5d128f2db5df59ad4df7d10cbc0735db772779866453b28081a22a8f8826a107bdb4f9d868ff331ac455c393d117e3b894a95cad256fcacacb2fd1129cf44944cf07f2d84aae0feac5cbfce71180f01d748d1c1d6d441b01b610a382493dfb77d2d60b37f2656d04218aeda7b3ad916b23ea5fab46ece2dc0edac8f260a30565b5b9cc4f6a", 0xc4}, {&(0x7f0000000640)="ffc85f3b71943fe3526e3145dfe0cdda0ae4c9507ec01b97275e9599527c6338cc1341d439012c2122c79d3fac444f27f9a9fce36dc0235bc09c02b4f8c4c4e331de9353c853cf9e1635a10b75f07d6d289856404d", 0x55}, {&(0x7f00000006c0)="63014dee3bbcf8e3a506f749b91216cc2916b6d52a8a92b5e9200aeb849b675a3f789c82b288899349f5b8d5913aca2423276479db9d58d7b832e923de7bb69b5a85669bcb5076d1db7ff81e5dead29da52924b091ff8889b0985e7fa982d52ca2f47cd32fe42b9f8f3266e60045a27a74947f36ecbb4fb45361dd7aa4a86a2cffb129731cfc054eb7579c18931bfe1490c843366ba4322156849e4617acc27685", 0xa1}], 0x3, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x20, 0x80}, 0x40000) [ 196.036115] Bluetooth: hci4: command 0x0406 tx timeout VM DIAGNOSIS: 10:19:46 Registers: info registers vcpu 0 RAX=dffffc0000000005 RBX=00000000000003f9 RCX=0000000000000000 RDX=00000000000003f9 RSI=ffffffff823bb06c RDI=ffffffff8765a9a0 RBP=ffffffff8765a960 RSP=ffff8880339af770 R8 =0000000000000001 R9 =ffff8880339af6fb R10=ffffed1006735edf R11=0000000000000001 R12=000000000000002c R13=ffffffff8765a960 R14=ffffffff8765a9b0 R15=ffffffff8765ac10 RIP=ffffffff823bb0c1 RFL=00000006 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055e695f10648 CR3=000000002e234000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 00000000ff000000 0000000000000000 YMM01=0000000000000000 0000000000000000 636f6c63006b6165 6c6d656d6b2f6775 YMM02=0000000000000000 0000000000000000 0000000000ffffff ff00000000000000 YMM03=0000000000000000 0000000000000000 0000ff0000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffff000000000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=0000000000000001 RCX=0000000000000000 RDX=ffff888008901ac0 RSI=ffffffff812c6586 RDI=0000000000000001 RBP=ffff88800902fd20 RSP=ffff88800902fce8 R8 =0000000000000001 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=0000000000000033 R13=ffff88803062d040 R14=0000000000000200 R15=ffff88800902fd70 RIP=ffffffff812c6588 RFL=00000093 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055e695f10648 CR3=00000000184e0000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 000c016c6c6f502e 726567616e614d0c YMM02=0000000000000000 0000000000000000 0000000200000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000c0000000a 0000000900000005 YMM04=0000000000000000 0000000000000000 6c6f502e72656761 6e614d0c0182ff13 YMM05=0000000000000000 0000000000000000 650e007374726174 73657220726f7475 YMM06=0000000000000000 0000000000000000 650a006574616469 646e616320636578 YMM07=0000000000000000 0000000000000000 20636578650a0068 73616d7320636578 YMM08=0000000000000000 0000000000000000 61746f7420636578 650a007364656573 YMM09=0000000000000000 0000000000000000 65786509006e6567 2063657865081b6c YMM10=0000000000000000 0000000000000000 6972742063657865 0b007a7a75662063 YMM11=0000000000000000 0000000000000000 696d696e696d2063 6578650d00656761 YMM12=0000000000000000 0000000000000000 000073746e696820 636578650a1b657a YMM13=0000000000000000 0000000000000000 b810b980d55644f3 db2d8016ca187848 YMM14=0000000000000000 0000000000000000 e84c5f4625923c2a ef4f812b12b8c88d YMM15=0000000000000000 0000000000000000 eb289435e88cf951 9d0e492dd8a2316f