Warning: Permanently added '[localhost]:49156' (ECDSA) to the list of known hosts. 2022/10/03 22:03:46 fuzzer started 2022/10/03 22:03:46 dialing manager at localhost:35095 syzkaller login: [ 36.808910] cgroup: Unknown subsys name 'net' [ 36.908136] cgroup: Unknown subsys name 'rlimit' 2022/10/03 22:04:02 syscalls: 200 2022/10/03 22:04:02 code coverage: enabled 2022/10/03 22:04:02 comparison tracing: enabled 2022/10/03 22:04:02 extra coverage: enabled 2022/10/03 22:04:02 setuid sandbox: enabled 2022/10/03 22:04:02 namespace sandbox: enabled 2022/10/03 22:04:02 Android sandbox: enabled 2022/10/03 22:04:02 fault injection: enabled 2022/10/03 22:04:02 leak checking: enabled 2022/10/03 22:04:02 net packet injection: enabled 2022/10/03 22:04:02 net device setup: enabled 2022/10/03 22:04:02 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/10/03 22:04:02 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/10/03 22:04:02 USB emulation: enabled 2022/10/03 22:04:02 hci packet injection: enabled 2022/10/03 22:04:02 wifi device emulation: failed to parse kernel version (6.0.0-rc7-next-20220930) 2022/10/03 22:04:02 802.15.4 emulation: enabled 2022/10/03 22:04:02 fetching corpus: 0, signal 0/0 (executing program) 2022/10/03 22:04:03 starting 8 fuzzer processes 22:04:03 executing program 0: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000000)=0x3, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x40, 0x86) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f00000000c0)={0x9, 0x2}, 0x2) ioctl$TUNSETLINK(r0, 0x400454cd, 0x555) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000100)=0x1a, &(0x7f0000000140)=0x1) prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x7fff8) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}, {0xc}, {0xc, 0x90, 0xff}}]}, 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000002c0), 0x3, 0xd0003) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000300)=""/25) write$P9_RFSYNC(r0, &(0x7f0000000340)={0x7, 0x33, 0x1}, 0x7) r3 = gettid() r4 = gettid() r5 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0xe2a5, 0x3, &(0x7f0000000640)=[{&(0x7f0000000400)="135180e5335ab6dbbc54c8e248e20fc2cbf36c32b132fc095f26b9d7ff25809ee0db3fea9fd51c03d9eb6009cf3c9eda6af5d99f27f4fd6d090ce28df4748ef7983c4bd96037469a5d4ca0966c2c642ea76e54135637470b84342d95b39b28b9de900b6a89590378157f34b61a9beabe594780203ebc7d66d59bb2a8554af9ab04ac770506ed6297cb8a76be7d6db172bcab57e227e6506f64aca39daba4b37c39625879cb99c78c16baea599551c47a6dc7106b506c5ccb7748a7666d", 0xbd, 0xffff}, {&(0x7f00000004c0)="2220a69d2edd06df94f76ff3f882e980957360b1f96a732f9b6e58d0ae984df7841d447f75a63dbf3335ed3c9c340b34c84297a429fec8b0f460ebe1bd1ce9334c3ecd7555b1be46f058f5d19f5312a1723858cf6b0e37532f6556888790e2011301bb011f14307d5de607641300675a8dda1e9cdb3f9dc301c3713ca80003d8af32284ab959bf2bfce3c1e2bddf363ff30ca424dc8c1ad07fc09ffac436a0aafd003b6cbbcd3b7be78fdf2fe372846149a3334472d760e37d2af42f0ca20cf8e1b51a2d2c4137724f85503adc4c920f566ae37cce0e15c8c94fa52d66757b21907589216e3f8a0d6bca923545", 0xed, 0x101}, {&(0x7f00000005c0)="ba45ac56af5e0daf4a8cdb87a0f67b87c7f023db6897dda4d520127d9a7c55fc875737f7466f742f8a1895f6166f487102c9f39eade02f55f30a5df38baa418ef36a8752da7c45905db280922f05ded4addcae3334c24ace096c5ed45bd87d626f5b928ef20db6154e2560fc", 0x6c, 0x2}], 0x2, &(0x7f00000006c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}, {@shortname_mixed}, {@rodir}, {@shortname_lower}, {@utf8}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/vcs#\x00'}}, {@measure}, {@fowner_gt={'fowner>', 0xee00}}]}) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r5, &(0x7f0000000740)={r0, r2, 0x3f3}) r6 = syz_open_dev$vcsn(&(0x7f0000000780), 0x81, 0x8000) write$P9_RCLUNK(r6, &(0x7f00000007c0)={0x7, 0x79, 0x1}, 0x7) r7 = syz_open_dev$vcsn(&(0x7f0000000800), 0x100, 0x101100) write$P9_RREADDIR(r7, &(0x7f0000000840)={0x87, 0x29, 0x2, {0x2, [{{0x1, 0x4, 0x7}, 0x524, 0x7f, 0x7, './file1'}, {{0x40, 0x2, 0x5}, 0xc227, 0x13, 0x7, './file0'}, {{0x2, 0x4, 0x6}, 0x4, 0x1c, 0x7, './file0'}, {{0x80, 0x2, 0x3}, 0x400, 0x3, 0x7, './file0'}]}}, 0x87) 22:04:03 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x71, 0x2, {{0x40, 0x0, 0x1}, 0x5}}, 0x18) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x49, 0x2, {0x8, 0x2, 0x3}}, 0x14) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x6d, 0x1}, 0x7) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$9p(r0, &(0x7f0000000100)="bca390dfb2aad74d6f9c27396275f45ae94f6ab4ae4e7ff1f9420e901a91a03c47caed038181e564b1e7124f503a1e7c7b7ecd9d49bfb7a4109df30aa9272cf6a61fa23a1d487a235cc314e3c5a2ca4979242cc62dfa2dabb2ca1cbaf3561e232117b23264d149cfa3ef125f7f7e3edd4f646d9590b5c499afbdf7ae79d177b51ed816e3972bec0d20531a3b2de42de01f02ff85370db8841b9fe741422bd07181127933d744b4b7c71ec6710adcbdba5b48901d670e717b84550f6bdcad29c5fac4d76f2bed0b8d1f035448fc77f6874c0f2f14546e83b68b1be630d51f882c5c2b74f5991ebe", 0xe7) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wg2\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000280)={'syztnl2\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x40, 0x20, 0x8, 0xff, {{0x6, 0x4, 0x2, 0x7, 0x18, 0x65, 0x0, 0x2, 0x29, 0x0, @rand_addr=0x64010101, @empty, {[@noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000380)={'tunl0\x00', &(0x7f00000002c0)={'gretap0\x00', r2, 0x8, 0x40, 0x401, 0xfffff000, {{0x1e, 0x4, 0x0, 0x9, 0x78, 0x64, 0x0, 0x9, 0x4, 0x0, @broadcast, @remote, {[@generic={0x83, 0x7, "9d3f8d3d0b"}, @ssrr={0x89, 0x7, 0xe8, [@remote]}, @timestamp={0x44, 0x10, 0x6f, 0x0, 0x5, [0x400, 0x3, 0x4]}, @timestamp_prespec={0x44, 0x14, 0x63, 0x3, 0xb, [{@empty, 0x8000}, {@local, 0x40}]}, @timestamp={0x44, 0x10, 0xe2, 0x0, 0x6, [0x200, 0x1, 0xfffffffc]}, @rr={0x7, 0x1f, 0x6f, [@local, @multicast2, @multicast2, @multicast1, @remote, @multicast2, @multicast2]}]}}}}}) write$P9_RFSYNC(r0, &(0x7f00000003c0)={0x7, 0x33, 0x1}, 0x7) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_SPLICE={0x1e, 0x3, 0x0, @fd=r0, 0x40, {0x0, r0}, 0x1f, 0xc, 0x1, {0x0, 0x0, r1}}, 0x2cb) r3 = syz_open_dev$vcsn(&(0x7f0000000440), 0x3ff, 0x82000) ioctl$EVIOCGBITSW(r3, 0x80404525, &(0x7f0000000480)=""/55) write$P9_RFSYNC(r3, &(0x7f00000004c0)={0x7, 0x33, 0x2}, 0x7) r4 = syz_open_dev$vcsn(&(0x7f0000000500), 0x9, 0x1ac02) setsockopt$inet_udp_int(r4, 0x11, 0xb, &(0x7f0000000540)=0x3f, 0x4) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000580)={0x14, 0x67, 0x2, {0x0, 0x2, 0x2}}, 0x14) epoll_pwait(r4, &(0x7f00000005c0)=[{}, {}], 0x2, 0x2, &(0x7f0000000600)={[0x7]}, 0x8) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000640)=@IORING_OP_ASYNC_CANCEL={0xe, 0x2, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000680)) 22:04:03 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x800, 0x311800) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000040)=0x8, 0x4) prctl$PR_MCE_KILL_GET(0x22) prctl$PR_MCE_KILL_GET(0x22) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000100)) ioctl$TUNSETOWNER(r1, 0x400454cc, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140), 0x4, 0x1a5201) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) rt_sigqueueinfo(0x0, 0x1b, &(0x7f0000000180)={0x36, 0x2, 0x10}) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000200)={0x5, 0x80}, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000240), 0xff, 0x44200) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000280)={0x40000004}) r6 = openat$incfs(r3, &(0x7f00000002c0)='.pending_reads\x00', 0x42000, 0x119) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x440000, 0x0) epoll_pwait2(r5, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, &(0x7f0000000400), &(0x7f0000000440)={[0x4]}, 0x8) 22:04:03 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x1, 0x2, 0x1}}, 0x14) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000080)=""/78) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000001c0)={0x4, 0x99, &(0x7f0000000100)="98de84c8fc1f3757f657d92a2cafec389481024bd74c10ebb4deddce7a9fc2b3bade12c3563b098db065cff32535da5b4275ab0c97363281046f3c1d227069d58e06e26ac42423b77f5b35964a7d416cb7943c642ac75234bfd0e767b19171f87e874b8afd127ad4332819967e93c4959fe72183de5753db5d0138ceea4f8a974c5bc7d20ddab8a42666859e99a0b44fb6df351782bda5fb2a"}) syz_open_dev$evdev(&(0x7f0000000200), 0x1, 0x10080) write$P9_RSTATu(r0, &(0x7f0000000240)={0x6d, 0x7d, 0x1, {{0x0, 0x58, 0x8, 0x7, {0x10, 0x3, 0x5}, 0x35100000, 0x7, 0x0, 0x5, 0x10, '$&-\\@-},\x01($,,/B}', 0x1, ']', 0x12, '/dev/input/event#\x00', 0x2, '+\''}, 0x0, '', 0xee01, 0xee01, 0xee01}}, 0x6d) write$P9_RVERSION(r0, &(0x7f00000002c0)={0x13, 0x65, 0xffff, 0x6163, 0x6, '9P2000'}, 0x13) r1 = syz_open_dev$evdev(&(0x7f0000000300), 0x7, 0x40000) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000340)=""/20) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000380)=0x6, &(0x7f00000003c0)=0x4) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000400)='.pending_reads\x00', 0x8000, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000440)={0x1d, 0x7, 0x1, {{0x10, '$&-\\@-},\x01($,,/B}'}}}, 0x1d) r3 = openat$incfs(r2, &(0x7f0000000480)='.log\x00', 0x300, 0x0) write$P9_RLERROR(r3, &(0x7f00000004c0)={0x19, 0x7, 0x2, {0x10, '$&-\\@-},\x01($,,/B}'}}, 0x19) write$P9_RLERROR(r3, &(0x7f0000000500)={0x1b, 0x7, 0x1, {0x12, '/dev/input/event#\x00'}}, 0x1b) sendmsg$TCPDIAG_GETSOCK(r3, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000880)={&(0x7f0000000580)={0x2e4, 0x12, 0x2, 0x70bd2d, 0x25dfdbff, {0x26, 0xff, 0x1c, 0x3, {0x4e21, 0x4e21, [0x7a, 0x5, 0x7, 0x3ba6deb0], [0x8, 0x6, 0x1ff, 0x74a0], 0x0, [0x4, 0x2]}, 0x7ff, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x51, 0x1, "7ff60461cbb9d26d7f85f5fa06e4b0aa01050340fe0c23ba1baafadefd078aebb83b8ef3ba579bf6857bb6d6f7c917da9e9caeb87ed972c3de9d80649b4b1dc6ea1777965919ae3c43f9a8d147"}, @INET_DIAG_REQ_BYTECODE={0x5c, 0x1, "381383bd45e66e200aab66f17686275de90549a9b2e2a390f2abc2bc1f24f59e0b246f47c6a4cab5d1df503553d1f3d51a533235403efcb917e74022a897f8b62ebbf0c4220fdc13df18dfb3e868a274e9714e5cbce9d470"}, @INET_DIAG_REQ_BYTECODE={0xfd, 0x1, "b91d3d2baa2420aeb5fa17a168040fcebaa1a674f4b44eba89bdfefbf462982542f49a90499f6af261b1fd0ad5e7bd5fffebc9d9a14d7151ebe27fe7b92ead66973a9c10d83e9b053403ee0e1b41b6b1b8ebcf9d9da163ab39daf604b98cfbbe1ca09e5a519c15b0ad013e0a6ddf4bc2a65492be1a98902169934022b9c8b017dbe3e4aad9755a933be457bdd22cb570eb3a850a989723136d2196d939dedb37cae0e5917b88487d6022be075285749cc649a1059395db8f5f9c346f6143d1c20437a8ecc59ca2644a5d3ce715f7833fd6910db9c32a2dc7ae3069a428f8e014d310899ec924f9293e5c9787aa34878348c0aeeeed5b5d0ef1"}, @INET_DIAG_REQ_BYTECODE={0x49, 0x1, "a66a8639b4ccdd25efd94763bb887614aaa915bb77179649af180eacb35485a82e09d8bd58f78cb5ddb39fd803cdf9571dd296a7ad1dd145f8a461f9ebdbba54059c5c152a"}, @INET_DIAG_REQ_BYTECODE={0xa, 0x1, "34532344fe52"}, @INET_DIAG_REQ_BYTECODE={0x8e, 0x1, "eb7e667ef0faac2674d988e8d4c948ab4ada3768b31fed03fda1963fef17562c7b97f4d3806ec444265a25bbb97898f30530a807a72aee6d2f24cf0ef5ba77f2b907eba7f70023d56eec9e185c2559d18c2b58557ed67a875ed23b2bac9f64e908cd735a29a2b7fc8679a00747ae284db1868a3e9a3cfa4dfb0c50f8f10088bc221d1b205406fff0951f"}]}, 0x2e4}, 0x1, 0x0, 0x0, 0x800}, 0x4040000) syz_genetlink_get_family_id$devlink(&(0x7f0000000900), r3) ioctl$sock_bt_hci(r2, 0x400448e1, &(0x7f0000000940)="276d03538c835d7fc0c980cbf32577a89b0a49b53a2bbede3b1364eaedfce8a8579b03242cef8d37cab297ca871925769050d30151977140e1210c837ad99ec422f67985ce6387103e427a7fc00f097b3db7709543a0a3ef39a0787e1f58ffbbf52e7a2f5cc87e9665d4973663a7828629") write$P9_RSETATTR(r0, &(0x7f00000009c0)={0x7, 0x1b, 0x2}, 0x7) waitid(0x1, 0x0, 0x0, 0x1, 0x0) [ 52.946425] audit: type=1400 audit(1664834643.395:6): avc: denied { execmem } for pid=285 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 22:04:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x81880004}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@GTPA_TID={0xc, 0x3, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040004}, 0x4008041) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r1, 0x100, 0x70bd27, 0x25dfdbff, {}, [@GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_VERSION={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @multicast2}, @GTPA_FLOW={0x6, 0x6, 0x2}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000c0}, 0x4) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000240)='.pending_reads\x00', 0x101000, 0x48) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000002c0)={0x5, 0x80, 0x1f, 0x1, 0x3, 0x1, 0x0, 0x6, 0xb204, 0x6, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000280), 0x4}, 0x20060, 0x4, 0x1, 0x5, 0x100000000, 0x7, 0x81, 0x0, 0x5, 0x0, 0x4}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000380)) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f00000003c0)) r4 = gettid() syz_open_procfs$namespace(r4, &(0x7f0000000400)='ns/ipc\x00') r5 = socket(0x5, 0x5, 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000000440)={'wg0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000500)={'erspan0\x00', &(0x7f0000000480)={'gre0\x00', r6, 0x8000, 0x7800, 0x6, 0x4, {{0x14, 0x4, 0x2, 0x19, 0x50, 0x67, 0x0, 0x4, 0x4, 0x0, @multicast2, @private=0xa010101, {[@timestamp_addr={0x44, 0x24, 0xb1, 0x1, 0x4, [{@local, 0x9}, {@local, 0x6}, {@remote, 0x8000}, {@multicast2, 0x1}]}, @end, @ssrr={0x89, 0xf, 0xa6, [@remote, @empty, @local]}, @rr={0x7, 0x7, 0xb5, [@multicast2]}]}}}}}) r7 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x11d001, 0x15) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000600)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x5, 0x0, r7, 0x0, &(0x7f0000000580)="88571343deee7402d7333445b4e1e746179fccb95971dd80da361bfe8d1079be5b951d72e1aa4a4f3a70081c3b5754ca067be0309a7db6d3e06c20992269f93849ba536af0dd532cd9af83cf", 0x4c, 0x20, 0x1}, 0x20) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000640)={0x0}, &(0x7f0000000680)=0xc) r9 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) kcmp$KCMP_EPOLL_TFD(r4, r8, 0x7, r2, &(0x7f00000006c0)={r2, r9, 0x5}) 22:04:03 executing program 5: ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000000)=""/79) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x1, 0x10, 0x4, 0x3, "cd9bd728cdfb87501cabb30f30e546a6195ee3cf4e57ecb72e47dd8745b3039b"}) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f00000000c0)={0x1000, 0xfffffff8, 0x1f, 0x0, 0x0, 0x1}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000009, 0x4000010, 0xffffffffffffffff, 0x8000000) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/5) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x50000000}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x803, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@uname={'uname', 0x3d, ':$'}}, {@loose}, {@nodevmap}, {@aname={'aname', 0x3d, '+@('}}, {@access_any}, {@version_L}, {@access_any}, {@dfltuid}, {@posixacl}, {@cache_none}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@subj_role={'subj_role', 0x3d, '$,&'}}, {@measure}, {@subj_type}, {@smackfsfloor}]}}) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000380)=""/84) write$P9_RREADDIR(r2, &(0x7f0000000400)={0xa6, 0x29, 0x2, {0x7, [{{0x8, 0x2}, 0x6, 0x80, 0x7, './file0'}, {{0x4, 0x2, 0x7}, 0x800, 0x1, 0x7, './file0'}, {{0x10, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x1, 0x4}, 0x4, 0x36, 0x7, './file0'}, {{0x10, 0x1, 0x2}, 0x8, 0x1f, 0x7, './file0'}]}}, 0xa6) r3 = openat$incfs(r0, &(0x7f00000004c0)='.pending_reads\x00', 0x200c00, 0x14c) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000500)=""/178) syz_mount_image$vfat(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3d8a, 0x4, &(0x7f00000008c0)=[{&(0x7f0000000640)="236dbf0f9973e3dc919bd8b5c985a8f696752af745db513fca7506f7bc29f67bcc6effa48b14cbcdefcea1fdd06918cdac00d7f78cffbc67a2d80fbbc5a26fc11fc8026b1ff3be582da142e694869b3547075489a32cc38701666e6244fc7ae676a11ff289b8a3094331b9bacfed5d6eaf5120a3c579a8bb8520399558f0c2936c02ba1d8da3ce229b81096fe7ae52cd7d47faf6290148157f893dc0b0de553b0b1f6d764b6f3e4c7830940db825e4557155afca728cf1e3b768793935f17ce24c34f05f351ef614", 0xc8, 0x2}, {&(0x7f0000000740)="fad75d4a77cf1cb91d54dae0e04b271123069aa9bca6e80c3b59a15d3d3d522820bddb46b6900d369aef7e9d9d90d9b06ea83a8045b804610088f828f8b0d6fc2790b4ce7f893dcff7b30176dd09c291a8ce91667087f3b0acacdd08aaac02cc6832076857b71a95e859e9c8798c93ded048d06542e8bd5f93743ce82ef04de0b66a96cbfca40d63eef7a6ce8f0434db65992d842a38a2f3a8be2cd22a1906f3073afe66c22e9b5e1cca75756e26811581bee4a74e9fc065c88643596a754c73b26d0a25268ac925bc5450304a6402977653b793390182bbd1fc9d1b36", 0xdd, 0x5}, {&(0x7f0000000840)="d4a910423910907dd89f5558d1fcf666dec9", 0x12, 0x7}, {&(0x7f0000000880)="55e0ebca5162bcd27d3a35f2ff49da246cccd22d8c45b270cfa9bc960e4525b266bb64f346247eb28fc9b2a35680405d", 0x30, 0x9}], 0x24041, &(0x7f0000000940)={[{@nonumtail}, {@numtail}, {@utf8}, {@iocharset={'iocharset', 0x3d, 'iso8859-4'}}], [{@obj_user={'obj_user', 0x3d, 'subj_type'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\xfd\'.'}}, {@seclabel}]}) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f00000009c0)={0x7, 0x7}, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000a00)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$EVIOCGLED(r4, 0x80404519, &(0x7f0000000a40)=""/120) ioctl$EVIOCGUNIQ(r3, 0x80404508, &(0x7f0000000ac0)=""/208) ioctl$EVIOCGPHYS(r4, 0x80404507, &(0x7f0000000bc0)=""/225) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000cc0)=""/192) 22:04:03 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000000)=0x80, 0x1) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x2, 0x80010, 0xffffffffffffffff, 0x8000000) r2 = mmap$IORING_OFF_SQES(&(0x7f0000eeb000/0x1000)=nil, 0x1000, 0x2000002, 0x100010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_CLOSE={0x13, 0x4, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x307cbdc9) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.log\x00', 0x0, 0x50) setsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f00000000c0)=0x1, 0x4) io_uring_setup(0x7f90, &(0x7f0000000100)={0x0, 0x333, 0x20, 0x3, 0x3e8, 0x0, r3}) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff}, 0x84000) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f00000001c0)={0x2000}) socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = syz_open_dev$vcsn(&(0x7f0000000200), 0x4, 0x250301) openat$incfs(r5, &(0x7f0000000240)='.log\x00', 0x80000, 0x100) r6 = epoll_create(0xfff) epoll_pwait(r6, &(0x7f0000000280)=[{}, {}], 0x2, 0x1f, &(0x7f00000002c0)={[0xa8da]}, 0x8) r7 = syz_open_dev$vcsn(&(0x7f0000000300), 0x5, 0x20000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000340)={r7, r3, 0xfffff386}) write$P9_RFSYNC(r3, &(0x7f0000000380)={0x7, 0x33, 0x1}, 0x7) syz_genetlink_get_family_id$devlink(&(0x7f00000003c0), r5) 22:04:03 executing program 7: write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x79, 0x1}, 0x7) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x49, 0x1, {0x52, 0x0, 0x6}}, 0x14) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x79, 0x1}, 0x7) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) write$P9_RRENAME(r0, &(0x7f0000000100)={0x7, 0x15, 0x1}, 0x7) r1 = syz_open_dev$vcsn(&(0x7f0000000140), 0x92a, 0x4442) write$P9_RCLUNK(r1, &(0x7f0000000180)={0x7, 0x79, 0x1}, 0x7) write$P9_RGETATTR(r0, &(0x7f00000001c0)={0xa0, 0x19, 0x2, {0x28, {0x10, 0x3, 0x1}, 0x20, 0xee00, 0xee00, 0x5, 0x631, 0xffff, 0x3, 0x1, 0x81a1, 0x0, 0x3, 0x10000, 0x0, 0xfff, 0x401, 0x2, 0x3a, 0xffffffff}}, 0xa0) write$P9_RVERSION(r1, &(0x7f0000000280)={0x13, 0x65, 0xffff, 0x1, 0x6, '9P2000'}, 0x13) pipe2$9p(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSYMLINK(r2, &(0x7f0000000300)={0x14, 0x11, 0x1, {0x2, 0x3, 0x5}}, 0x14) write$9p(r1, &(0x7f0000000340)="aa9e2df267450c0625fedbb9951dd3d35551c8cb07ad190185d70c9e7706ea135189402723c7107da568286447f61b58eee330dcddaab61411f6b86ed9ba3b4c37ec74a88078ca0ad694970dbd3d739e0d3ce8347f3ebc565bedaf0878e2b6e102adf9691334078a39f8babead66fa0b52a928235a773e15903429b993673947ad0718cf97476bbf2ee81e880df17e54866cf28ecbf81cbe99b00d875fc03f1a372b6130508507c908a40a170d5d9c6c2912cb3941d26fe8c691b6bd4e88f64422b7fd6c9cf8ba14bef0229fcedfba42a9c65340df3a0030dee613662aeb2d52494fb90eee175f63678c7e72", 0xec) syz_genetlink_get_family_id$devlink(&(0x7f0000000440), r0) write$P9_RFSYNC(r2, &(0x7f0000000480)={0x7, 0x33, 0x1}, 0x7) write$P9_RSETATTR(r2, &(0x7f00000004c0)={0x7, 0x1b, 0x2}, 0x7) inotify_rm_watch(r1, 0x0) inotify_init1(0x80800) keyctl$describe(0x6, 0x0, &(0x7f0000000500)=""/143, 0x8f) openat$autofs(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000600)=0x9, &(0x7f0000000640)=0x2) [ 54.202216] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 54.205479] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 54.208114] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 54.211843] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 54.213947] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 54.216335] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 54.221761] Bluetooth: hci0: HCI_REQ-0x0c1a [ 54.255958] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 54.258567] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 54.260637] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 54.261654] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 54.262812] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 54.264245] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 54.265467] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 54.267234] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 54.268740] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 54.271715] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 54.274103] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 54.276058] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 54.278111] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 54.279821] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 54.283837] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 54.285635] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 54.287678] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 54.289937] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 54.291579] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 54.298387] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 54.300873] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 54.308084] Bluetooth: hci3: HCI_REQ-0x0c1a [ 54.314401] Bluetooth: hci4: HCI_REQ-0x0c1a [ 54.316304] Bluetooth: hci1: HCI_REQ-0x0c1a [ 54.327305] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 54.345389] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 54.350514] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 54.391517] Bluetooth: hci2: HCI_REQ-0x0c1a [ 54.450065] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 54.457605] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 54.461614] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 54.463926] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 54.469390] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 54.471129] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 54.472782] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 54.485044] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 54.486857] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 54.494627] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 54.505656] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 54.508808] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 54.512332] Bluetooth: hci5: HCI_REQ-0x0c1a [ 54.542640] Bluetooth: hci6: HCI_REQ-0x0c1a [ 56.278850] Bluetooth: hci0: command 0x0409 tx timeout [ 56.342431] Bluetooth: hci3: command 0x0409 tx timeout [ 56.343558] Bluetooth: hci1: command 0x0409 tx timeout [ 56.344544] Bluetooth: hci4: command 0x0409 tx timeout [ 56.406338] Bluetooth: hci7: Opcode 0x c03 failed: -110 [ 56.406383] Bluetooth: hci2: command 0x0409 tx timeout [ 56.534357] Bluetooth: hci5: command 0x0409 tx timeout [ 56.598261] Bluetooth: hci6: command 0x0409 tx timeout [ 58.326259] Bluetooth: hci0: command 0x041b tx timeout [ 58.390311] Bluetooth: hci4: command 0x041b tx timeout [ 58.390336] Bluetooth: hci1: command 0x041b tx timeout [ 58.391231] Bluetooth: hci3: command 0x041b tx timeout [ 58.454278] Bluetooth: hci2: command 0x041b tx timeout [ 58.582282] Bluetooth: hci5: command 0x041b tx timeout [ 58.646240] Bluetooth: hci6: command 0x041b tx timeout [ 59.155959] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 59.163342] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 59.165865] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 59.173323] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 59.178331] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 59.179913] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 59.184941] Bluetooth: hci7: HCI_REQ-0x0c1a [ 60.375302] Bluetooth: hci0: command 0x040f tx timeout [ 60.438225] Bluetooth: hci1: command 0x040f tx timeout [ 60.438720] Bluetooth: hci4: command 0x040f tx timeout [ 60.439251] Bluetooth: hci3: command 0x040f tx timeout [ 60.502249] Bluetooth: hci2: command 0x040f tx timeout [ 60.631285] Bluetooth: hci5: command 0x040f tx timeout [ 60.694238] Bluetooth: hci6: command 0x040f tx timeout [ 61.207310] Bluetooth: hci7: command 0x0409 tx timeout [ 62.423285] Bluetooth: hci0: command 0x0419 tx timeout [ 62.487327] Bluetooth: hci3: command 0x0419 tx timeout [ 62.487799] Bluetooth: hci4: command 0x0419 tx timeout [ 62.488257] Bluetooth: hci1: command 0x0419 tx timeout [ 62.550257] Bluetooth: hci2: command 0x0419 tx timeout [ 62.679280] Bluetooth: hci5: command 0x0419 tx timeout [ 62.743199] Bluetooth: hci6: command 0x0419 tx timeout [ 63.254254] Bluetooth: hci7: command 0x041b tx timeout [ 65.303210] Bluetooth: hci7: command 0x040f tx timeout [ 67.351204] Bluetooth: hci7: command 0x0419 tx timeout 22:04:55 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x1, 0x2, 0x1}}, 0x14) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000080)=""/78) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000001c0)={0x4, 0x99, &(0x7f0000000100)="98de84c8fc1f3757f657d92a2cafec389481024bd74c10ebb4deddce7a9fc2b3bade12c3563b098db065cff32535da5b4275ab0c97363281046f3c1d227069d58e06e26ac42423b77f5b35964a7d416cb7943c642ac75234bfd0e767b19171f87e874b8afd127ad4332819967e93c4959fe72183de5753db5d0138ceea4f8a974c5bc7d20ddab8a42666859e99a0b44fb6df351782bda5fb2a"}) syz_open_dev$evdev(&(0x7f0000000200), 0x1, 0x10080) write$P9_RSTATu(r0, &(0x7f0000000240)={0x6d, 0x7d, 0x1, {{0x0, 0x58, 0x8, 0x7, {0x10, 0x3, 0x5}, 0x35100000, 0x7, 0x0, 0x5, 0x10, '$&-\\@-},\x01($,,/B}', 0x1, ']', 0x12, '/dev/input/event#\x00', 0x2, '+\''}, 0x0, '', 0xee01, 0xee01, 0xee01}}, 0x6d) write$P9_RVERSION(r0, &(0x7f00000002c0)={0x13, 0x65, 0xffff, 0x6163, 0x6, '9P2000'}, 0x13) r1 = syz_open_dev$evdev(&(0x7f0000000300), 0x7, 0x40000) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000340)=""/20) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000380)=0x6, &(0x7f00000003c0)=0x4) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000400)='.pending_reads\x00', 0x8000, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000440)={0x1d, 0x7, 0x1, {{0x10, '$&-\\@-},\x01($,,/B}'}}}, 0x1d) r3 = openat$incfs(r2, &(0x7f0000000480)='.log\x00', 0x300, 0x0) write$P9_RLERROR(r3, &(0x7f00000004c0)={0x19, 0x7, 0x2, {0x10, '$&-\\@-},\x01($,,/B}'}}, 0x19) write$P9_RLERROR(r3, &(0x7f0000000500)={0x1b, 0x7, 0x1, {0x12, '/dev/input/event#\x00'}}, 0x1b) sendmsg$TCPDIAG_GETSOCK(r3, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000880)={&(0x7f0000000580)={0x2e4, 0x12, 0x2, 0x70bd2d, 0x25dfdbff, {0x26, 0xff, 0x1c, 0x3, {0x4e21, 0x4e21, [0x7a, 0x5, 0x7, 0x3ba6deb0], [0x8, 0x6, 0x1ff, 0x74a0], 0x0, [0x4, 0x2]}, 0x7ff, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x51, 0x1, "7ff60461cbb9d26d7f85f5fa06e4b0aa01050340fe0c23ba1baafadefd078aebb83b8ef3ba579bf6857bb6d6f7c917da9e9caeb87ed972c3de9d80649b4b1dc6ea1777965919ae3c43f9a8d147"}, @INET_DIAG_REQ_BYTECODE={0x5c, 0x1, "381383bd45e66e200aab66f17686275de90549a9b2e2a390f2abc2bc1f24f59e0b246f47c6a4cab5d1df503553d1f3d51a533235403efcb917e74022a897f8b62ebbf0c4220fdc13df18dfb3e868a274e9714e5cbce9d470"}, @INET_DIAG_REQ_BYTECODE={0xfd, 0x1, "b91d3d2baa2420aeb5fa17a168040fcebaa1a674f4b44eba89bdfefbf462982542f49a90499f6af261b1fd0ad5e7bd5fffebc9d9a14d7151ebe27fe7b92ead66973a9c10d83e9b053403ee0e1b41b6b1b8ebcf9d9da163ab39daf604b98cfbbe1ca09e5a519c15b0ad013e0a6ddf4bc2a65492be1a98902169934022b9c8b017dbe3e4aad9755a933be457bdd22cb570eb3a850a989723136d2196d939dedb37cae0e5917b88487d6022be075285749cc649a1059395db8f5f9c346f6143d1c20437a8ecc59ca2644a5d3ce715f7833fd6910db9c32a2dc7ae3069a428f8e014d310899ec924f9293e5c9787aa34878348c0aeeeed5b5d0ef1"}, @INET_DIAG_REQ_BYTECODE={0x49, 0x1, "a66a8639b4ccdd25efd94763bb887614aaa915bb77179649af180eacb35485a82e09d8bd58f78cb5ddb39fd803cdf9571dd296a7ad1dd145f8a461f9ebdbba54059c5c152a"}, @INET_DIAG_REQ_BYTECODE={0xa, 0x1, "34532344fe52"}, @INET_DIAG_REQ_BYTECODE={0x8e, 0x1, "eb7e667ef0faac2674d988e8d4c948ab4ada3768b31fed03fda1963fef17562c7b97f4d3806ec444265a25bbb97898f30530a807a72aee6d2f24cf0ef5ba77f2b907eba7f70023d56eec9e185c2559d18c2b58557ed67a875ed23b2bac9f64e908cd735a29a2b7fc8679a00747ae284db1868a3e9a3cfa4dfb0c50f8f10088bc221d1b205406fff0951f"}]}, 0x2e4}, 0x1, 0x0, 0x0, 0x800}, 0x4040000) syz_genetlink_get_family_id$devlink(&(0x7f0000000900), r3) ioctl$sock_bt_hci(r2, 0x400448e1, &(0x7f0000000940)="276d03538c835d7fc0c980cbf32577a89b0a49b53a2bbede3b1364eaedfce8a8579b03242cef8d37cab297ca871925769050d30151977140e1210c837ad99ec422f67985ce6387103e427a7fc00f097b3db7709543a0a3ef39a0787e1f58ffbbf52e7a2f5cc87e9665d4973663a7828629") write$P9_RSETATTR(r0, &(0x7f00000009c0)={0x7, 0x1b, 0x2}, 0x7) waitid(0x1, 0x0, 0x0, 0x1, 0x0) 22:04:55 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x1, 0x2, 0x1}}, 0x14) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000080)=""/78) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000001c0)={0x4, 0x99, &(0x7f0000000100)="98de84c8fc1f3757f657d92a2cafec389481024bd74c10ebb4deddce7a9fc2b3bade12c3563b098db065cff32535da5b4275ab0c97363281046f3c1d227069d58e06e26ac42423b77f5b35964a7d416cb7943c642ac75234bfd0e767b19171f87e874b8afd127ad4332819967e93c4959fe72183de5753db5d0138ceea4f8a974c5bc7d20ddab8a42666859e99a0b44fb6df351782bda5fb2a"}) syz_open_dev$evdev(&(0x7f0000000200), 0x1, 0x10080) write$P9_RSTATu(r0, &(0x7f0000000240)={0x6d, 0x7d, 0x1, {{0x0, 0x58, 0x8, 0x7, {0x10, 0x3, 0x5}, 0x35100000, 0x7, 0x0, 0x5, 0x10, '$&-\\@-},\x01($,,/B}', 0x1, ']', 0x12, '/dev/input/event#\x00', 0x2, '+\''}, 0x0, '', 0xee01, 0xee01, 0xee01}}, 0x6d) write$P9_RVERSION(r0, &(0x7f00000002c0)={0x13, 0x65, 0xffff, 0x6163, 0x6, '9P2000'}, 0x13) r1 = syz_open_dev$evdev(&(0x7f0000000300), 0x7, 0x40000) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000340)=""/20) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000380)=0x6, &(0x7f00000003c0)=0x4) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000400)='.pending_reads\x00', 0x8000, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000440)={0x1d, 0x7, 0x1, {{0x10, '$&-\\@-},\x01($,,/B}'}}}, 0x1d) r3 = openat$incfs(r2, &(0x7f0000000480)='.log\x00', 0x300, 0x0) write$P9_RLERROR(r3, &(0x7f00000004c0)={0x19, 0x7, 0x2, {0x10, '$&-\\@-},\x01($,,/B}'}}, 0x19) write$P9_RLERROR(r3, &(0x7f0000000500)={0x1b, 0x7, 0x1, {0x12, '/dev/input/event#\x00'}}, 0x1b) sendmsg$TCPDIAG_GETSOCK(r3, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000880)={&(0x7f0000000580)={0x2e4, 0x12, 0x2, 0x70bd2d, 0x25dfdbff, {0x26, 0xff, 0x1c, 0x3, {0x4e21, 0x4e21, [0x7a, 0x5, 0x7, 0x3ba6deb0], [0x8, 0x6, 0x1ff, 0x74a0], 0x0, [0x4, 0x2]}, 0x7ff, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x51, 0x1, "7ff60461cbb9d26d7f85f5fa06e4b0aa01050340fe0c23ba1baafadefd078aebb83b8ef3ba579bf6857bb6d6f7c917da9e9caeb87ed972c3de9d80649b4b1dc6ea1777965919ae3c43f9a8d147"}, @INET_DIAG_REQ_BYTECODE={0x5c, 0x1, "381383bd45e66e200aab66f17686275de90549a9b2e2a390f2abc2bc1f24f59e0b246f47c6a4cab5d1df503553d1f3d51a533235403efcb917e74022a897f8b62ebbf0c4220fdc13df18dfb3e868a274e9714e5cbce9d470"}, @INET_DIAG_REQ_BYTECODE={0xfd, 0x1, "b91d3d2baa2420aeb5fa17a168040fcebaa1a674f4b44eba89bdfefbf462982542f49a90499f6af261b1fd0ad5e7bd5fffebc9d9a14d7151ebe27fe7b92ead66973a9c10d83e9b053403ee0e1b41b6b1b8ebcf9d9da163ab39daf604b98cfbbe1ca09e5a519c15b0ad013e0a6ddf4bc2a65492be1a98902169934022b9c8b017dbe3e4aad9755a933be457bdd22cb570eb3a850a989723136d2196d939dedb37cae0e5917b88487d6022be075285749cc649a1059395db8f5f9c346f6143d1c20437a8ecc59ca2644a5d3ce715f7833fd6910db9c32a2dc7ae3069a428f8e014d310899ec924f9293e5c9787aa34878348c0aeeeed5b5d0ef1"}, @INET_DIAG_REQ_BYTECODE={0x49, 0x1, "a66a8639b4ccdd25efd94763bb887614aaa915bb77179649af180eacb35485a82e09d8bd58f78cb5ddb39fd803cdf9571dd296a7ad1dd145f8a461f9ebdbba54059c5c152a"}, @INET_DIAG_REQ_BYTECODE={0xa, 0x1, "34532344fe52"}, @INET_DIAG_REQ_BYTECODE={0x8e, 0x1, "eb7e667ef0faac2674d988e8d4c948ab4ada3768b31fed03fda1963fef17562c7b97f4d3806ec444265a25bbb97898f30530a807a72aee6d2f24cf0ef5ba77f2b907eba7f70023d56eec9e185c2559d18c2b58557ed67a875ed23b2bac9f64e908cd735a29a2b7fc8679a00747ae284db1868a3e9a3cfa4dfb0c50f8f10088bc221d1b205406fff0951f"}]}, 0x2e4}, 0x1, 0x0, 0x0, 0x800}, 0x4040000) syz_genetlink_get_family_id$devlink(&(0x7f0000000900), r3) ioctl$sock_bt_hci(r2, 0x400448e1, &(0x7f0000000940)="276d03538c835d7fc0c980cbf32577a89b0a49b53a2bbede3b1364eaedfce8a8579b03242cef8d37cab297ca871925769050d30151977140e1210c837ad99ec422f67985ce6387103e427a7fc00f097b3db7709543a0a3ef39a0787e1f58ffbbf52e7a2f5cc87e9665d4973663a7828629") write$P9_RSETATTR(r0, &(0x7f00000009c0)={0x7, 0x1b, 0x2}, 0x7) waitid(0x1, 0x0, 0x0, 0x1, 0x0) 22:04:56 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x1, 0x2, 0x1}}, 0x14) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000080)=""/78) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000001c0)={0x4, 0x99, &(0x7f0000000100)="98de84c8fc1f3757f657d92a2cafec389481024bd74c10ebb4deddce7a9fc2b3bade12c3563b098db065cff32535da5b4275ab0c97363281046f3c1d227069d58e06e26ac42423b77f5b35964a7d416cb7943c642ac75234bfd0e767b19171f87e874b8afd127ad4332819967e93c4959fe72183de5753db5d0138ceea4f8a974c5bc7d20ddab8a42666859e99a0b44fb6df351782bda5fb2a"}) syz_open_dev$evdev(&(0x7f0000000200), 0x1, 0x10080) write$P9_RSTATu(r0, &(0x7f0000000240)={0x6d, 0x7d, 0x1, {{0x0, 0x58, 0x8, 0x7, {0x10, 0x3, 0x5}, 0x35100000, 0x7, 0x0, 0x5, 0x10, '$&-\\@-},\x01($,,/B}', 0x1, ']', 0x12, '/dev/input/event#\x00', 0x2, '+\''}, 0x0, '', 0xee01, 0xee01, 0xee01}}, 0x6d) write$P9_RVERSION(r0, &(0x7f00000002c0)={0x13, 0x65, 0xffff, 0x6163, 0x6, '9P2000'}, 0x13) r1 = syz_open_dev$evdev(&(0x7f0000000300), 0x7, 0x40000) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000340)=""/20) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000380)=0x6, &(0x7f00000003c0)=0x4) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000400)='.pending_reads\x00', 0x8000, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000440)={0x1d, 0x7, 0x1, {{0x10, '$&-\\@-},\x01($,,/B}'}}}, 0x1d) r3 = openat$incfs(r2, &(0x7f0000000480)='.log\x00', 0x300, 0x0) write$P9_RLERROR(r3, &(0x7f00000004c0)={0x19, 0x7, 0x2, {0x10, '$&-\\@-},\x01($,,/B}'}}, 0x19) write$P9_RLERROR(r3, &(0x7f0000000500)={0x1b, 0x7, 0x1, {0x12, '/dev/input/event#\x00'}}, 0x1b) sendmsg$TCPDIAG_GETSOCK(r3, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000880)={&(0x7f0000000580)={0x2e4, 0x12, 0x2, 0x70bd2d, 0x25dfdbff, {0x26, 0xff, 0x1c, 0x3, {0x4e21, 0x4e21, [0x7a, 0x5, 0x7, 0x3ba6deb0], [0x8, 0x6, 0x1ff, 0x74a0], 0x0, [0x4, 0x2]}, 0x7ff, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x51, 0x1, "7ff60461cbb9d26d7f85f5fa06e4b0aa01050340fe0c23ba1baafadefd078aebb83b8ef3ba579bf6857bb6d6f7c917da9e9caeb87ed972c3de9d80649b4b1dc6ea1777965919ae3c43f9a8d147"}, @INET_DIAG_REQ_BYTECODE={0x5c, 0x1, "381383bd45e66e200aab66f17686275de90549a9b2e2a390f2abc2bc1f24f59e0b246f47c6a4cab5d1df503553d1f3d51a533235403efcb917e74022a897f8b62ebbf0c4220fdc13df18dfb3e868a274e9714e5cbce9d470"}, @INET_DIAG_REQ_BYTECODE={0xfd, 0x1, "b91d3d2baa2420aeb5fa17a168040fcebaa1a674f4b44eba89bdfefbf462982542f49a90499f6af261b1fd0ad5e7bd5fffebc9d9a14d7151ebe27fe7b92ead66973a9c10d83e9b053403ee0e1b41b6b1b8ebcf9d9da163ab39daf604b98cfbbe1ca09e5a519c15b0ad013e0a6ddf4bc2a65492be1a98902169934022b9c8b017dbe3e4aad9755a933be457bdd22cb570eb3a850a989723136d2196d939dedb37cae0e5917b88487d6022be075285749cc649a1059395db8f5f9c346f6143d1c20437a8ecc59ca2644a5d3ce715f7833fd6910db9c32a2dc7ae3069a428f8e014d310899ec924f9293e5c9787aa34878348c0aeeeed5b5d0ef1"}, @INET_DIAG_REQ_BYTECODE={0x49, 0x1, "a66a8639b4ccdd25efd94763bb887614aaa915bb77179649af180eacb35485a82e09d8bd58f78cb5ddb39fd803cdf9571dd296a7ad1dd145f8a461f9ebdbba54059c5c152a"}, @INET_DIAG_REQ_BYTECODE={0xa, 0x1, "34532344fe52"}, @INET_DIAG_REQ_BYTECODE={0x8e, 0x1, "eb7e667ef0faac2674d988e8d4c948ab4ada3768b31fed03fda1963fef17562c7b97f4d3806ec444265a25bbb97898f30530a807a72aee6d2f24cf0ef5ba77f2b907eba7f70023d56eec9e185c2559d18c2b58557ed67a875ed23b2bac9f64e908cd735a29a2b7fc8679a00747ae284db1868a3e9a3cfa4dfb0c50f8f10088bc221d1b205406fff0951f"}]}, 0x2e4}, 0x1, 0x0, 0x0, 0x800}, 0x4040000) syz_genetlink_get_family_id$devlink(&(0x7f0000000900), r3) ioctl$sock_bt_hci(r2, 0x400448e1, &(0x7f0000000940)="276d03538c835d7fc0c980cbf32577a89b0a49b53a2bbede3b1364eaedfce8a8579b03242cef8d37cab297ca871925769050d30151977140e1210c837ad99ec422f67985ce6387103e427a7fc00f097b3db7709543a0a3ef39a0787e1f58ffbbf52e7a2f5cc87e9665d4973663a7828629") write$P9_RSETATTR(r0, &(0x7f00000009c0)={0x7, 0x1b, 0x2}, 0x7) waitid(0x1, 0x0, 0x0, 0x1, 0x0) 22:04:56 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x1, 0x2, 0x1}}, 0x14) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000080)=""/78) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000001c0)={0x4, 0x99, &(0x7f0000000100)="98de84c8fc1f3757f657d92a2cafec389481024bd74c10ebb4deddce7a9fc2b3bade12c3563b098db065cff32535da5b4275ab0c97363281046f3c1d227069d58e06e26ac42423b77f5b35964a7d416cb7943c642ac75234bfd0e767b19171f87e874b8afd127ad4332819967e93c4959fe72183de5753db5d0138ceea4f8a974c5bc7d20ddab8a42666859e99a0b44fb6df351782bda5fb2a"}) syz_open_dev$evdev(&(0x7f0000000200), 0x1, 0x10080) write$P9_RSTATu(r0, &(0x7f0000000240)={0x6d, 0x7d, 0x1, {{0x0, 0x58, 0x8, 0x7, {0x10, 0x3, 0x5}, 0x35100000, 0x7, 0x0, 0x5, 0x10, '$&-\\@-},\x01($,,/B}', 0x1, ']', 0x12, '/dev/input/event#\x00', 0x2, '+\''}, 0x0, '', 0xee01, 0xee01, 0xee01}}, 0x6d) write$P9_RVERSION(r0, &(0x7f00000002c0)={0x13, 0x65, 0xffff, 0x6163, 0x6, '9P2000'}, 0x13) r1 = syz_open_dev$evdev(&(0x7f0000000300), 0x7, 0x40000) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000340)=""/20) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000380)=0x6, &(0x7f00000003c0)=0x4) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000400)='.pending_reads\x00', 0x8000, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000440)={0x1d, 0x7, 0x1, {{0x10, '$&-\\@-},\x01($,,/B}'}}}, 0x1d) r3 = openat$incfs(r2, &(0x7f0000000480)='.log\x00', 0x300, 0x0) write$P9_RLERROR(r3, &(0x7f00000004c0)={0x19, 0x7, 0x2, {0x10, '$&-\\@-},\x01($,,/B}'}}, 0x19) write$P9_RLERROR(r3, &(0x7f0000000500)={0x1b, 0x7, 0x1, {0x12, '/dev/input/event#\x00'}}, 0x1b) sendmsg$TCPDIAG_GETSOCK(r3, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000880)={&(0x7f0000000580)={0x2e4, 0x12, 0x2, 0x70bd2d, 0x25dfdbff, {0x26, 0xff, 0x1c, 0x3, {0x4e21, 0x4e21, [0x7a, 0x5, 0x7, 0x3ba6deb0], [0x8, 0x6, 0x1ff, 0x74a0], 0x0, [0x4, 0x2]}, 0x7ff, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x51, 0x1, "7ff60461cbb9d26d7f85f5fa06e4b0aa01050340fe0c23ba1baafadefd078aebb83b8ef3ba579bf6857bb6d6f7c917da9e9caeb87ed972c3de9d80649b4b1dc6ea1777965919ae3c43f9a8d147"}, @INET_DIAG_REQ_BYTECODE={0x5c, 0x1, "381383bd45e66e200aab66f17686275de90549a9b2e2a390f2abc2bc1f24f59e0b246f47c6a4cab5d1df503553d1f3d51a533235403efcb917e74022a897f8b62ebbf0c4220fdc13df18dfb3e868a274e9714e5cbce9d470"}, @INET_DIAG_REQ_BYTECODE={0xfd, 0x1, "b91d3d2baa2420aeb5fa17a168040fcebaa1a674f4b44eba89bdfefbf462982542f49a90499f6af261b1fd0ad5e7bd5fffebc9d9a14d7151ebe27fe7b92ead66973a9c10d83e9b053403ee0e1b41b6b1b8ebcf9d9da163ab39daf604b98cfbbe1ca09e5a519c15b0ad013e0a6ddf4bc2a65492be1a98902169934022b9c8b017dbe3e4aad9755a933be457bdd22cb570eb3a850a989723136d2196d939dedb37cae0e5917b88487d6022be075285749cc649a1059395db8f5f9c346f6143d1c20437a8ecc59ca2644a5d3ce715f7833fd6910db9c32a2dc7ae3069a428f8e014d310899ec924f9293e5c9787aa34878348c0aeeeed5b5d0ef1"}, @INET_DIAG_REQ_BYTECODE={0x49, 0x1, "a66a8639b4ccdd25efd94763bb887614aaa915bb77179649af180eacb35485a82e09d8bd58f78cb5ddb39fd803cdf9571dd296a7ad1dd145f8a461f9ebdbba54059c5c152a"}, @INET_DIAG_REQ_BYTECODE={0xa, 0x1, "34532344fe52"}, @INET_DIAG_REQ_BYTECODE={0x8e, 0x1, "eb7e667ef0faac2674d988e8d4c948ab4ada3768b31fed03fda1963fef17562c7b97f4d3806ec444265a25bbb97898f30530a807a72aee6d2f24cf0ef5ba77f2b907eba7f70023d56eec9e185c2559d18c2b58557ed67a875ed23b2bac9f64e908cd735a29a2b7fc8679a00747ae284db1868a3e9a3cfa4dfb0c50f8f10088bc221d1b205406fff0951f"}]}, 0x2e4}, 0x1, 0x0, 0x0, 0x800}, 0x4040000) syz_genetlink_get_family_id$devlink(&(0x7f0000000900), r3) ioctl$sock_bt_hci(r2, 0x400448e1, &(0x7f0000000940)="276d03538c835d7fc0c980cbf32577a89b0a49b53a2bbede3b1364eaedfce8a8579b03242cef8d37cab297ca871925769050d30151977140e1210c837ad99ec422f67985ce6387103e427a7fc00f097b3db7709543a0a3ef39a0787e1f58ffbbf52e7a2f5cc87e9665d4973663a7828629") waitid(0x1, 0x0, 0x0, 0x1, 0x0) 22:04:56 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x1, 0x2, 0x1}}, 0x14) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000080)=""/78) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000001c0)={0x4, 0x99, &(0x7f0000000100)="98de84c8fc1f3757f657d92a2cafec389481024bd74c10ebb4deddce7a9fc2b3bade12c3563b098db065cff32535da5b4275ab0c97363281046f3c1d227069d58e06e26ac42423b77f5b35964a7d416cb7943c642ac75234bfd0e767b19171f87e874b8afd127ad4332819967e93c4959fe72183de5753db5d0138ceea4f8a974c5bc7d20ddab8a42666859e99a0b44fb6df351782bda5fb2a"}) syz_open_dev$evdev(&(0x7f0000000200), 0x1, 0x10080) write$P9_RSTATu(r0, &(0x7f0000000240)={0x6d, 0x7d, 0x1, {{0x0, 0x58, 0x8, 0x7, {0x10, 0x3, 0x5}, 0x35100000, 0x7, 0x0, 0x5, 0x10, '$&-\\@-},\x01($,,/B}', 0x1, ']', 0x12, '/dev/input/event#\x00', 0x2, '+\''}, 0x0, '', 0xee01, 0xee01, 0xee01}}, 0x6d) write$P9_RVERSION(r0, &(0x7f00000002c0)={0x13, 0x65, 0xffff, 0x6163, 0x6, '9P2000'}, 0x13) r1 = syz_open_dev$evdev(&(0x7f0000000300), 0x7, 0x40000) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000340)=""/20) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000380)=0x6, &(0x7f00000003c0)=0x4) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000400)='.pending_reads\x00', 0x8000, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000440)={0x1d, 0x7, 0x1, {{0x10, '$&-\\@-},\x01($,,/B}'}}}, 0x1d) r3 = openat$incfs(r2, &(0x7f0000000480)='.log\x00', 0x300, 0x0) write$P9_RLERROR(r3, &(0x7f00000004c0)={0x19, 0x7, 0x2, {0x10, '$&-\\@-},\x01($,,/B}'}}, 0x19) write$P9_RLERROR(r3, &(0x7f0000000500)={0x1b, 0x7, 0x1, {0x12, '/dev/input/event#\x00'}}, 0x1b) sendmsg$TCPDIAG_GETSOCK(r3, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000880)={&(0x7f0000000580)={0x2e4, 0x12, 0x2, 0x70bd2d, 0x25dfdbff, {0x26, 0xff, 0x1c, 0x3, {0x4e21, 0x4e21, [0x7a, 0x5, 0x7, 0x3ba6deb0], [0x8, 0x6, 0x1ff, 0x74a0], 0x0, [0x4, 0x2]}, 0x7ff, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x51, 0x1, "7ff60461cbb9d26d7f85f5fa06e4b0aa01050340fe0c23ba1baafadefd078aebb83b8ef3ba579bf6857bb6d6f7c917da9e9caeb87ed972c3de9d80649b4b1dc6ea1777965919ae3c43f9a8d147"}, @INET_DIAG_REQ_BYTECODE={0x5c, 0x1, "381383bd45e66e200aab66f17686275de90549a9b2e2a390f2abc2bc1f24f59e0b246f47c6a4cab5d1df503553d1f3d51a533235403efcb917e74022a897f8b62ebbf0c4220fdc13df18dfb3e868a274e9714e5cbce9d470"}, @INET_DIAG_REQ_BYTECODE={0xfd, 0x1, "b91d3d2baa2420aeb5fa17a168040fcebaa1a674f4b44eba89bdfefbf462982542f49a90499f6af261b1fd0ad5e7bd5fffebc9d9a14d7151ebe27fe7b92ead66973a9c10d83e9b053403ee0e1b41b6b1b8ebcf9d9da163ab39daf604b98cfbbe1ca09e5a519c15b0ad013e0a6ddf4bc2a65492be1a98902169934022b9c8b017dbe3e4aad9755a933be457bdd22cb570eb3a850a989723136d2196d939dedb37cae0e5917b88487d6022be075285749cc649a1059395db8f5f9c346f6143d1c20437a8ecc59ca2644a5d3ce715f7833fd6910db9c32a2dc7ae3069a428f8e014d310899ec924f9293e5c9787aa34878348c0aeeeed5b5d0ef1"}, @INET_DIAG_REQ_BYTECODE={0x49, 0x1, "a66a8639b4ccdd25efd94763bb887614aaa915bb77179649af180eacb35485a82e09d8bd58f78cb5ddb39fd803cdf9571dd296a7ad1dd145f8a461f9ebdbba54059c5c152a"}, @INET_DIAG_REQ_BYTECODE={0xa, 0x1, "34532344fe52"}, @INET_DIAG_REQ_BYTECODE={0x8e, 0x1, "eb7e667ef0faac2674d988e8d4c948ab4ada3768b31fed03fda1963fef17562c7b97f4d3806ec444265a25bbb97898f30530a807a72aee6d2f24cf0ef5ba77f2b907eba7f70023d56eec9e185c2559d18c2b58557ed67a875ed23b2bac9f64e908cd735a29a2b7fc8679a00747ae284db1868a3e9a3cfa4dfb0c50f8f10088bc221d1b205406fff0951f"}]}, 0x2e4}, 0x1, 0x0, 0x0, 0x800}, 0x4040000) syz_genetlink_get_family_id$devlink(&(0x7f0000000900), r3) waitid(0x1, 0x0, 0x0, 0x1, 0x0) 22:04:57 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x1, 0x2, 0x1}}, 0x14) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000080)=""/78) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000001c0)={0x4, 0x99, &(0x7f0000000100)="98de84c8fc1f3757f657d92a2cafec389481024bd74c10ebb4deddce7a9fc2b3bade12c3563b098db065cff32535da5b4275ab0c97363281046f3c1d227069d58e06e26ac42423b77f5b35964a7d416cb7943c642ac75234bfd0e767b19171f87e874b8afd127ad4332819967e93c4959fe72183de5753db5d0138ceea4f8a974c5bc7d20ddab8a42666859e99a0b44fb6df351782bda5fb2a"}) syz_open_dev$evdev(&(0x7f0000000200), 0x1, 0x10080) write$P9_RSTATu(r0, &(0x7f0000000240)={0x6d, 0x7d, 0x1, {{0x0, 0x58, 0x8, 0x7, {0x10, 0x3, 0x5}, 0x35100000, 0x7, 0x0, 0x5, 0x10, '$&-\\@-},\x01($,,/B}', 0x1, ']', 0x12, '/dev/input/event#\x00', 0x2, '+\''}, 0x0, '', 0xee01, 0xee01, 0xee01}}, 0x6d) write$P9_RVERSION(r0, &(0x7f00000002c0)={0x13, 0x65, 0xffff, 0x6163, 0x6, '9P2000'}, 0x13) r1 = syz_open_dev$evdev(&(0x7f0000000300), 0x7, 0x40000) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000340)=""/20) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000380)=0x6, &(0x7f00000003c0)=0x4) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000400)='.pending_reads\x00', 0x8000, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000440)={0x1d, 0x7, 0x1, {{0x10, '$&-\\@-},\x01($,,/B}'}}}, 0x1d) r3 = openat$incfs(r2, &(0x7f0000000480)='.log\x00', 0x300, 0x0) write$P9_RLERROR(r3, &(0x7f00000004c0)={0x19, 0x7, 0x2, {0x10, '$&-\\@-},\x01($,,/B}'}}, 0x19) write$P9_RLERROR(r3, &(0x7f0000000500)={0x1b, 0x7, 0x1, {0x12, '/dev/input/event#\x00'}}, 0x1b) sendmsg$TCPDIAG_GETSOCK(r3, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000880)={&(0x7f0000000580)={0x2e4, 0x12, 0x2, 0x70bd2d, 0x25dfdbff, {0x26, 0xff, 0x1c, 0x3, {0x4e21, 0x4e21, [0x7a, 0x5, 0x7, 0x3ba6deb0], [0x8, 0x6, 0x1ff, 0x74a0], 0x0, [0x4, 0x2]}, 0x7ff, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x51, 0x1, "7ff60461cbb9d26d7f85f5fa06e4b0aa01050340fe0c23ba1baafadefd078aebb83b8ef3ba579bf6857bb6d6f7c917da9e9caeb87ed972c3de9d80649b4b1dc6ea1777965919ae3c43f9a8d147"}, @INET_DIAG_REQ_BYTECODE={0x5c, 0x1, "381383bd45e66e200aab66f17686275de90549a9b2e2a390f2abc2bc1f24f59e0b246f47c6a4cab5d1df503553d1f3d51a533235403efcb917e74022a897f8b62ebbf0c4220fdc13df18dfb3e868a274e9714e5cbce9d470"}, @INET_DIAG_REQ_BYTECODE={0xfd, 0x1, "b91d3d2baa2420aeb5fa17a168040fcebaa1a674f4b44eba89bdfefbf462982542f49a90499f6af261b1fd0ad5e7bd5fffebc9d9a14d7151ebe27fe7b92ead66973a9c10d83e9b053403ee0e1b41b6b1b8ebcf9d9da163ab39daf604b98cfbbe1ca09e5a519c15b0ad013e0a6ddf4bc2a65492be1a98902169934022b9c8b017dbe3e4aad9755a933be457bdd22cb570eb3a850a989723136d2196d939dedb37cae0e5917b88487d6022be075285749cc649a1059395db8f5f9c346f6143d1c20437a8ecc59ca2644a5d3ce715f7833fd6910db9c32a2dc7ae3069a428f8e014d310899ec924f9293e5c9787aa34878348c0aeeeed5b5d0ef1"}, @INET_DIAG_REQ_BYTECODE={0x49, 0x1, "a66a8639b4ccdd25efd94763bb887614aaa915bb77179649af180eacb35485a82e09d8bd58f78cb5ddb39fd803cdf9571dd296a7ad1dd145f8a461f9ebdbba54059c5c152a"}, @INET_DIAG_REQ_BYTECODE={0xa, 0x1, "34532344fe52"}, @INET_DIAG_REQ_BYTECODE={0x8e, 0x1, "eb7e667ef0faac2674d988e8d4c948ab4ada3768b31fed03fda1963fef17562c7b97f4d3806ec444265a25bbb97898f30530a807a72aee6d2f24cf0ef5ba77f2b907eba7f70023d56eec9e185c2559d18c2b58557ed67a875ed23b2bac9f64e908cd735a29a2b7fc8679a00747ae284db1868a3e9a3cfa4dfb0c50f8f10088bc221d1b205406fff0951f"}]}, 0x2e4}, 0x1, 0x0, 0x0, 0x800}, 0x4040000) waitid(0x1, 0x0, 0x0, 0x1, 0x0) 22:04:57 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x1, 0x2, 0x1}}, 0x14) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000080)=""/78) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000001c0)={0x4, 0x99, &(0x7f0000000100)="98de84c8fc1f3757f657d92a2cafec389481024bd74c10ebb4deddce7a9fc2b3bade12c3563b098db065cff32535da5b4275ab0c97363281046f3c1d227069d58e06e26ac42423b77f5b35964a7d416cb7943c642ac75234bfd0e767b19171f87e874b8afd127ad4332819967e93c4959fe72183de5753db5d0138ceea4f8a974c5bc7d20ddab8a42666859e99a0b44fb6df351782bda5fb2a"}) syz_open_dev$evdev(&(0x7f0000000200), 0x1, 0x10080) write$P9_RSTATu(r0, &(0x7f0000000240)={0x6d, 0x7d, 0x1, {{0x0, 0x58, 0x8, 0x7, {0x10, 0x3, 0x5}, 0x35100000, 0x7, 0x0, 0x5, 0x10, '$&-\\@-},\x01($,,/B}', 0x1, ']', 0x12, '/dev/input/event#\x00', 0x2, '+\''}, 0x0, '', 0xee01, 0xee01, 0xee01}}, 0x6d) write$P9_RVERSION(r0, &(0x7f00000002c0)={0x13, 0x65, 0xffff, 0x6163, 0x6, '9P2000'}, 0x13) r1 = syz_open_dev$evdev(&(0x7f0000000300), 0x7, 0x40000) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000340)=""/20) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000380)=0x6, &(0x7f00000003c0)=0x4) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000400)='.pending_reads\x00', 0x8000, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000440)={0x1d, 0x7, 0x1, {{0x10, '$&-\\@-},\x01($,,/B}'}}}, 0x1d) r3 = openat$incfs(r2, &(0x7f0000000480)='.log\x00', 0x300, 0x0) write$P9_RLERROR(r3, &(0x7f00000004c0)={0x19, 0x7, 0x2, {0x10, '$&-\\@-},\x01($,,/B}'}}, 0x19) write$P9_RLERROR(r3, &(0x7f0000000500)={0x1b, 0x7, 0x1, {0x12, '/dev/input/event#\x00'}}, 0x1b) waitid(0x1, 0x0, 0x0, 0x1, 0x0) 22:04:57 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x1, 0x2, 0x1}}, 0x14) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000080)=""/78) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000001c0)={0x4, 0x99, &(0x7f0000000100)="98de84c8fc1f3757f657d92a2cafec389481024bd74c10ebb4deddce7a9fc2b3bade12c3563b098db065cff32535da5b4275ab0c97363281046f3c1d227069d58e06e26ac42423b77f5b35964a7d416cb7943c642ac75234bfd0e767b19171f87e874b8afd127ad4332819967e93c4959fe72183de5753db5d0138ceea4f8a974c5bc7d20ddab8a42666859e99a0b44fb6df351782bda5fb2a"}) syz_open_dev$evdev(&(0x7f0000000200), 0x1, 0x10080) write$P9_RSTATu(r0, &(0x7f0000000240)={0x6d, 0x7d, 0x1, {{0x0, 0x58, 0x8, 0x7, {0x10, 0x3, 0x5}, 0x35100000, 0x7, 0x0, 0x5, 0x10, '$&-\\@-},\x01($,,/B}', 0x1, ']', 0x12, '/dev/input/event#\x00', 0x2, '+\''}, 0x0, '', 0xee01, 0xee01, 0xee01}}, 0x6d) write$P9_RVERSION(r0, &(0x7f00000002c0)={0x13, 0x65, 0xffff, 0x6163, 0x6, '9P2000'}, 0x13) r1 = syz_open_dev$evdev(&(0x7f0000000300), 0x7, 0x40000) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000340)=""/20) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000380)=0x6, &(0x7f00000003c0)=0x4) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000400)='.pending_reads\x00', 0x8000, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000440)={0x1d, 0x7, 0x1, {{0x10, '$&-\\@-},\x01($,,/B}'}}}, 0x1d) r3 = openat$incfs(r2, &(0x7f0000000480)='.log\x00', 0x300, 0x0) write$P9_RLERROR(r3, &(0x7f00000004c0)={0x19, 0x7, 0x2, {0x10, '$&-\\@-},\x01($,,/B}'}}, 0x19) waitid(0x1, 0x0, 0x0, 0x1, 0x0) [ 107.553289] loop5: detected capacity change from 0 to 30 [ 107.560043] ======================================================= [ 107.560043] WARNING: The mand mount option has been deprecated and [ 107.560043] and is ignored by this kernel. Remove the mand [ 107.560043] option from the mount to silence this warning. [ 107.560043] ======================================================= [ 107.577067] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 107.582329] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 107.587259] loop5: detected capacity change from 0 to 30 [ 108.325253] loop0: detected capacity change from 0 to 255 [ 108.327987] FAT-fs (loop0): Unrecognized mount option "smackfsroot=/dev/vcs#" or missing value [ 110.214993] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3990 comm=syz-executor.4 [ 110.285900] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3993 comm=syz-executor.4 22:05:14 executing program 7: write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x79, 0x1}, 0x7) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x49, 0x1, {0x52, 0x0, 0x6}}, 0x14) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x79, 0x1}, 0x7) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) write$P9_RRENAME(r0, &(0x7f0000000100)={0x7, 0x15, 0x1}, 0x7) r1 = syz_open_dev$vcsn(&(0x7f0000000140), 0x92a, 0x4442) write$P9_RCLUNK(r1, &(0x7f0000000180)={0x7, 0x79, 0x1}, 0x7) write$P9_RGETATTR(r0, &(0x7f00000001c0)={0xa0, 0x19, 0x2, {0x28, {0x10, 0x3, 0x1}, 0x20, 0xee00, 0xee00, 0x5, 0x631, 0xffff, 0x3, 0x1, 0x81a1, 0x0, 0x3, 0x10000, 0x0, 0xfff, 0x401, 0x2, 0x3a, 0xffffffff}}, 0xa0) write$P9_RVERSION(r1, &(0x7f0000000280)={0x13, 0x65, 0xffff, 0x1, 0x6, '9P2000'}, 0x13) pipe2$9p(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSYMLINK(r2, &(0x7f0000000300)={0x14, 0x11, 0x1, {0x2, 0x3, 0x5}}, 0x14) write$9p(r1, &(0x7f0000000340)="aa9e2df267450c0625fedbb9951dd3d35551c8cb07ad190185d70c9e7706ea135189402723c7107da568286447f61b58eee330dcddaab61411f6b86ed9ba3b4c37ec74a88078ca0ad694970dbd3d739e0d3ce8347f3ebc565bedaf0878e2b6e102adf9691334078a39f8babead66fa0b52a928235a773e15903429b993673947ad0718cf97476bbf2ee81e880df17e54866cf28ecbf81cbe99b00d875fc03f1a372b6130508507c908a40a170d5d9c6c2912cb3941d26fe8c691b6bd4e88f64422b7fd6c9cf8ba14bef0229fcedfba42a9c65340df3a0030dee613662aeb2d52494fb90eee175f63678c7e72", 0xec) syz_genetlink_get_family_id$devlink(&(0x7f0000000440), r0) write$P9_RFSYNC(r2, &(0x7f0000000480)={0x7, 0x33, 0x1}, 0x7) write$P9_RSETATTR(r2, &(0x7f00000004c0)={0x7, 0x1b, 0x2}, 0x7) inotify_rm_watch(r1, 0x0) inotify_init1(0x80800) keyctl$describe(0x6, 0x0, &(0x7f0000000500)=""/143, 0x8f) openat$autofs(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000600)=0x9, &(0x7f0000000640)=0x2) 22:05:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x81880004}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@GTPA_TID={0xc, 0x3, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040004}, 0x4008041) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r1, 0x100, 0x70bd27, 0x25dfdbff, {}, [@GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_VERSION={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @multicast2}, @GTPA_FLOW={0x6, 0x6, 0x2}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000c0}, 0x4) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000240)='.pending_reads\x00', 0x101000, 0x48) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000002c0)={0x5, 0x80, 0x1f, 0x1, 0x3, 0x1, 0x0, 0x6, 0xb204, 0x6, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000280), 0x4}, 0x20060, 0x4, 0x1, 0x5, 0x100000000, 0x7, 0x81, 0x0, 0x5, 0x0, 0x4}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000380)) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f00000003c0)) r4 = gettid() syz_open_procfs$namespace(r4, &(0x7f0000000400)='ns/ipc\x00') r5 = socket(0x5, 0x5, 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000000440)={'wg0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000500)={'erspan0\x00', &(0x7f0000000480)={'gre0\x00', r6, 0x8000, 0x7800, 0x6, 0x4, {{0x14, 0x4, 0x2, 0x19, 0x50, 0x67, 0x0, 0x4, 0x4, 0x0, @multicast2, @private=0xa010101, {[@timestamp_addr={0x44, 0x24, 0xb1, 0x1, 0x4, [{@local, 0x9}, {@local, 0x6}, {@remote, 0x8000}, {@multicast2, 0x1}]}, @end, @ssrr={0x89, 0xf, 0xa6, [@remote, @empty, @local]}, @rr={0x7, 0x7, 0xb5, [@multicast2]}]}}}}}) r7 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x11d001, 0x15) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000600)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x5, 0x0, r7, 0x0, &(0x7f0000000580)="88571343deee7402d7333445b4e1e746179fccb95971dd80da361bfe8d1079be5b951d72e1aa4a4f3a70081c3b5754ca067be0309a7db6d3e06c20992269f93849ba536af0dd532cd9af83cf", 0x4c, 0x20, 0x1}, 0x20) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000640)={0x0}, &(0x7f0000000680)=0xc) r9 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) kcmp$KCMP_EPOLL_TFD(r4, r8, 0x7, r2, &(0x7f00000006c0)={r2, r9, 0x5}) 22:05:14 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000000)=0x80, 0x1) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x2, 0x80010, 0xffffffffffffffff, 0x8000000) r2 = mmap$IORING_OFF_SQES(&(0x7f0000eeb000/0x1000)=nil, 0x1000, 0x2000002, 0x100010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_CLOSE={0x13, 0x4, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x307cbdc9) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.log\x00', 0x0, 0x50) setsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f00000000c0)=0x1, 0x4) io_uring_setup(0x7f90, &(0x7f0000000100)={0x0, 0x333, 0x20, 0x3, 0x3e8, 0x0, r3}) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff}, 0x84000) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f00000001c0)={0x2000}) socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = syz_open_dev$vcsn(&(0x7f0000000200), 0x4, 0x250301) openat$incfs(r5, &(0x7f0000000240)='.log\x00', 0x80000, 0x100) r6 = epoll_create(0xfff) epoll_pwait(r6, &(0x7f0000000280)=[{}, {}], 0x2, 0x1f, &(0x7f00000002c0)={[0xa8da]}, 0x8) r7 = syz_open_dev$vcsn(&(0x7f0000000300), 0x5, 0x20000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000340)={r7, r3, 0xfffff386}) write$P9_RFSYNC(r3, &(0x7f0000000380)={0x7, 0x33, 0x1}, 0x7) syz_genetlink_get_family_id$devlink(&(0x7f00000003c0), r5) 22:05:14 executing program 5: ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000000)=""/79) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x1, 0x10, 0x4, 0x3, "cd9bd728cdfb87501cabb30f30e546a6195ee3cf4e57ecb72e47dd8745b3039b"}) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f00000000c0)={0x1000, 0xfffffff8, 0x1f, 0x0, 0x0, 0x1}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000009, 0x4000010, 0xffffffffffffffff, 0x8000000) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/5) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x50000000}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x803, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@uname={'uname', 0x3d, ':$'}}, {@loose}, {@nodevmap}, {@aname={'aname', 0x3d, '+@('}}, {@access_any}, {@version_L}, {@access_any}, {@dfltuid}, {@posixacl}, {@cache_none}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@subj_role={'subj_role', 0x3d, '$,&'}}, {@measure}, {@subj_type}, {@smackfsfloor}]}}) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000380)=""/84) write$P9_RREADDIR(r2, &(0x7f0000000400)={0xa6, 0x29, 0x2, {0x7, [{{0x8, 0x2}, 0x6, 0x80, 0x7, './file0'}, {{0x4, 0x2, 0x7}, 0x800, 0x1, 0x7, './file0'}, {{0x10, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x1, 0x4}, 0x4, 0x36, 0x7, './file0'}, {{0x10, 0x1, 0x2}, 0x8, 0x1f, 0x7, './file0'}]}}, 0xa6) r3 = openat$incfs(r0, &(0x7f00000004c0)='.pending_reads\x00', 0x200c00, 0x14c) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000500)=""/178) syz_mount_image$vfat(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3d8a, 0x4, &(0x7f00000008c0)=[{&(0x7f0000000640)="236dbf0f9973e3dc919bd8b5c985a8f696752af745db513fca7506f7bc29f67bcc6effa48b14cbcdefcea1fdd06918cdac00d7f78cffbc67a2d80fbbc5a26fc11fc8026b1ff3be582da142e694869b3547075489a32cc38701666e6244fc7ae676a11ff289b8a3094331b9bacfed5d6eaf5120a3c579a8bb8520399558f0c2936c02ba1d8da3ce229b81096fe7ae52cd7d47faf6290148157f893dc0b0de553b0b1f6d764b6f3e4c7830940db825e4557155afca728cf1e3b768793935f17ce24c34f05f351ef614", 0xc8, 0x2}, {&(0x7f0000000740)="fad75d4a77cf1cb91d54dae0e04b271123069aa9bca6e80c3b59a15d3d3d522820bddb46b6900d369aef7e9d9d90d9b06ea83a8045b804610088f828f8b0d6fc2790b4ce7f893dcff7b30176dd09c291a8ce91667087f3b0acacdd08aaac02cc6832076857b71a95e859e9c8798c93ded048d06542e8bd5f93743ce82ef04de0b66a96cbfca40d63eef7a6ce8f0434db65992d842a38a2f3a8be2cd22a1906f3073afe66c22e9b5e1cca75756e26811581bee4a74e9fc065c88643596a754c73b26d0a25268ac925bc5450304a6402977653b793390182bbd1fc9d1b36", 0xdd, 0x5}, {&(0x7f0000000840)="d4a910423910907dd89f5558d1fcf666dec9", 0x12, 0x7}, {&(0x7f0000000880)="55e0ebca5162bcd27d3a35f2ff49da246cccd22d8c45b270cfa9bc960e4525b266bb64f346247eb28fc9b2a35680405d", 0x30, 0x9}], 0x24041, &(0x7f0000000940)={[{@nonumtail}, {@numtail}, {@utf8}, {@iocharset={'iocharset', 0x3d, 'iso8859-4'}}], [{@obj_user={'obj_user', 0x3d, 'subj_type'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\xfd\'.'}}, {@seclabel}]}) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f00000009c0)={0x7, 0x7}, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000a00)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$EVIOCGLED(r4, 0x80404519, &(0x7f0000000a40)=""/120) ioctl$EVIOCGUNIQ(r3, 0x80404508, &(0x7f0000000ac0)=""/208) ioctl$EVIOCGPHYS(r4, 0x80404507, &(0x7f0000000bc0)=""/225) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000cc0)=""/192) 22:05:14 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x1, 0x2, 0x1}}, 0x14) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000080)=""/78) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000001c0)={0x4, 0x99, &(0x7f0000000100)="98de84c8fc1f3757f657d92a2cafec389481024bd74c10ebb4deddce7a9fc2b3bade12c3563b098db065cff32535da5b4275ab0c97363281046f3c1d227069d58e06e26ac42423b77f5b35964a7d416cb7943c642ac75234bfd0e767b19171f87e874b8afd127ad4332819967e93c4959fe72183de5753db5d0138ceea4f8a974c5bc7d20ddab8a42666859e99a0b44fb6df351782bda5fb2a"}) syz_open_dev$evdev(&(0x7f0000000200), 0x1, 0x10080) write$P9_RSTATu(r0, &(0x7f0000000240)={0x6d, 0x7d, 0x1, {{0x0, 0x58, 0x8, 0x7, {0x10, 0x3, 0x5}, 0x35100000, 0x7, 0x0, 0x5, 0x10, '$&-\\@-},\x01($,,/B}', 0x1, ']', 0x12, '/dev/input/event#\x00', 0x2, '+\''}, 0x0, '', 0xee01, 0xee01, 0xee01}}, 0x6d) write$P9_RVERSION(r0, &(0x7f00000002c0)={0x13, 0x65, 0xffff, 0x6163, 0x6, '9P2000'}, 0x13) r1 = syz_open_dev$evdev(&(0x7f0000000300), 0x7, 0x40000) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000340)=""/20) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000380)=0x6, &(0x7f00000003c0)=0x4) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000400)='.pending_reads\x00', 0x8000, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000440)={0x1d, 0x7, 0x1, {{0x10, '$&-\\@-},\x01($,,/B}'}}}, 0x1d) openat$incfs(r2, &(0x7f0000000480)='.log\x00', 0x300, 0x0) waitid(0x1, 0x0, 0x0, 0x1, 0x0) 22:05:14 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x71, 0x2, {{0x40, 0x0, 0x1}, 0x5}}, 0x18) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x49, 0x2, {0x8, 0x2, 0x3}}, 0x14) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x6d, 0x1}, 0x7) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$9p(r0, &(0x7f0000000100)="bca390dfb2aad74d6f9c27396275f45ae94f6ab4ae4e7ff1f9420e901a91a03c47caed038181e564b1e7124f503a1e7c7b7ecd9d49bfb7a4109df30aa9272cf6a61fa23a1d487a235cc314e3c5a2ca4979242cc62dfa2dabb2ca1cbaf3561e232117b23264d149cfa3ef125f7f7e3edd4f646d9590b5c499afbdf7ae79d177b51ed816e3972bec0d20531a3b2de42de01f02ff85370db8841b9fe741422bd07181127933d744b4b7c71ec6710adcbdba5b48901d670e717b84550f6bdcad29c5fac4d76f2bed0b8d1f035448fc77f6874c0f2f14546e83b68b1be630d51f882c5c2b74f5991ebe", 0xe7) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wg2\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000280)={'syztnl2\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x40, 0x20, 0x8, 0xff, {{0x6, 0x4, 0x2, 0x7, 0x18, 0x65, 0x0, 0x2, 0x29, 0x0, @rand_addr=0x64010101, @empty, {[@noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000380)={'tunl0\x00', &(0x7f00000002c0)={'gretap0\x00', r2, 0x8, 0x40, 0x401, 0xfffff000, {{0x1e, 0x4, 0x0, 0x9, 0x78, 0x64, 0x0, 0x9, 0x4, 0x0, @broadcast, @remote, {[@generic={0x83, 0x7, "9d3f8d3d0b"}, @ssrr={0x89, 0x7, 0xe8, [@remote]}, @timestamp={0x44, 0x10, 0x6f, 0x0, 0x5, [0x400, 0x3, 0x4]}, @timestamp_prespec={0x44, 0x14, 0x63, 0x3, 0xb, [{@empty, 0x8000}, {@local, 0x40}]}, @timestamp={0x44, 0x10, 0xe2, 0x0, 0x6, [0x200, 0x1, 0xfffffffc]}, @rr={0x7, 0x1f, 0x6f, [@local, @multicast2, @multicast2, @multicast1, @remote, @multicast2, @multicast2]}]}}}}}) write$P9_RFSYNC(r0, &(0x7f00000003c0)={0x7, 0x33, 0x1}, 0x7) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_SPLICE={0x1e, 0x3, 0x0, @fd=r0, 0x40, {0x0, r0}, 0x1f, 0xc, 0x1, {0x0, 0x0, r1}}, 0x2cb) r3 = syz_open_dev$vcsn(&(0x7f0000000440), 0x3ff, 0x82000) ioctl$EVIOCGBITSW(r3, 0x80404525, &(0x7f0000000480)=""/55) write$P9_RFSYNC(r3, &(0x7f00000004c0)={0x7, 0x33, 0x2}, 0x7) r4 = syz_open_dev$vcsn(&(0x7f0000000500), 0x9, 0x1ac02) setsockopt$inet_udp_int(r4, 0x11, 0xb, &(0x7f0000000540)=0x3f, 0x4) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000580)={0x14, 0x67, 0x2, {0x0, 0x2, 0x2}}, 0x14) epoll_pwait(r4, &(0x7f00000005c0)=[{}, {}], 0x2, 0x2, &(0x7f0000000600)={[0x7]}, 0x8) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000640)=@IORING_OP_ASYNC_CANCEL={0xe, 0x2, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000680)) 22:05:14 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x800, 0x311800) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000040)=0x8, 0x4) prctl$PR_MCE_KILL_GET(0x22) prctl$PR_MCE_KILL_GET(0x22) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000100)) ioctl$TUNSETOWNER(r1, 0x400454cc, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140), 0x4, 0x1a5201) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) rt_sigqueueinfo(0x0, 0x1b, &(0x7f0000000180)={0x36, 0x2, 0x10}) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000200)={0x5, 0x80}, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000240), 0xff, 0x44200) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000280)={0x40000004}) r6 = openat$incfs(r3, &(0x7f00000002c0)='.pending_reads\x00', 0x42000, 0x119) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x440000, 0x0) epoll_pwait2(r5, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, &(0x7f0000000400), &(0x7f0000000440)={[0x4]}, 0x8) [ 123.807940] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4000 comm=syz-executor.4 [ 123.817310] loop5: detected capacity change from 0 to 30 22:05:14 executing program 0: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000000)=0x3, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x40, 0x86) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f00000000c0)={0x9, 0x2}, 0x2) ioctl$TUNSETLINK(r0, 0x400454cd, 0x555) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000100)=0x1a, &(0x7f0000000140)=0x1) prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x7fff8) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}, {0xc}, {0xc, 0x90, 0xff}}]}, 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000002c0), 0x3, 0xd0003) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000300)=""/25) write$P9_RFSYNC(r0, &(0x7f0000000340)={0x7, 0x33, 0x1}, 0x7) r3 = gettid() r4 = gettid() r5 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0xe2a5, 0x3, &(0x7f0000000640)=[{&(0x7f0000000400)="135180e5335ab6dbbc54c8e248e20fc2cbf36c32b132fc095f26b9d7ff25809ee0db3fea9fd51c03d9eb6009cf3c9eda6af5d99f27f4fd6d090ce28df4748ef7983c4bd96037469a5d4ca0966c2c642ea76e54135637470b84342d95b39b28b9de900b6a89590378157f34b61a9beabe594780203ebc7d66d59bb2a8554af9ab04ac770506ed6297cb8a76be7d6db172bcab57e227e6506f64aca39daba4b37c39625879cb99c78c16baea599551c47a6dc7106b506c5ccb7748a7666d", 0xbd, 0xffff}, {&(0x7f00000004c0)="2220a69d2edd06df94f76ff3f882e980957360b1f96a732f9b6e58d0ae984df7841d447f75a63dbf3335ed3c9c340b34c84297a429fec8b0f460ebe1bd1ce9334c3ecd7555b1be46f058f5d19f5312a1723858cf6b0e37532f6556888790e2011301bb011f14307d5de607641300675a8dda1e9cdb3f9dc301c3713ca80003d8af32284ab959bf2bfce3c1e2bddf363ff30ca424dc8c1ad07fc09ffac436a0aafd003b6cbbcd3b7be78fdf2fe372846149a3334472d760e37d2af42f0ca20cf8e1b51a2d2c4137724f85503adc4c920f566ae37cce0e15c8c94fa52d66757b21907589216e3f8a0d6bca923545", 0xed, 0x101}, {&(0x7f00000005c0)="ba45ac56af5e0daf4a8cdb87a0f67b87c7f023db6897dda4d520127d9a7c55fc875737f7466f742f8a1895f6166f487102c9f39eade02f55f30a5df38baa418ef36a8752da7c45905db280922f05ded4addcae3334c24ace096c5ed45bd87d626f5b928ef20db6154e2560fc", 0x6c, 0x2}], 0x2, &(0x7f00000006c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}, {@shortname_mixed}, {@rodir}, {@shortname_lower}, {@utf8}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/vcs#\x00'}}, {@measure}, {@fowner_gt={'fowner>', 0xee00}}]}) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r5, &(0x7f0000000740)={r0, r2, 0x3f3}) r6 = syz_open_dev$vcsn(&(0x7f0000000780), 0x81, 0x8000) write$P9_RCLUNK(r6, &(0x7f00000007c0)={0x7, 0x79, 0x1}, 0x7) r7 = syz_open_dev$vcsn(&(0x7f0000000800), 0x100, 0x101100) write$P9_RREADDIR(r7, &(0x7f0000000840)={0x87, 0x29, 0x2, {0x2, [{{0x1, 0x4, 0x7}, 0x524, 0x7f, 0x7, './file1'}, {{0x40, 0x2, 0x5}, 0xc227, 0x13, 0x7, './file0'}, {{0x2, 0x4, 0x6}, 0x4, 0x1c, 0x7, './file0'}, {{0x80, 0x2, 0x3}, 0x400, 0x3, 0x7, './file0'}]}}, 0x87) [ 123.885131] loop0: detected capacity change from 0 to 255 22:05:14 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x1, 0x2, 0x1}}, 0x14) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000080)=""/78) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000001c0)={0x4, 0x99, &(0x7f0000000100)="98de84c8fc1f3757f657d92a2cafec389481024bd74c10ebb4deddce7a9fc2b3bade12c3563b098db065cff32535da5b4275ab0c97363281046f3c1d227069d58e06e26ac42423b77f5b35964a7d416cb7943c642ac75234bfd0e767b19171f87e874b8afd127ad4332819967e93c4959fe72183de5753db5d0138ceea4f8a974c5bc7d20ddab8a42666859e99a0b44fb6df351782bda5fb2a"}) syz_open_dev$evdev(&(0x7f0000000200), 0x1, 0x10080) write$P9_RSTATu(r0, &(0x7f0000000240)={0x6d, 0x7d, 0x1, {{0x0, 0x58, 0x8, 0x7, {0x10, 0x3, 0x5}, 0x35100000, 0x7, 0x0, 0x5, 0x10, '$&-\\@-},\x01($,,/B}', 0x1, ']', 0x12, '/dev/input/event#\x00', 0x2, '+\''}, 0x0, '', 0xee01, 0xee01, 0xee01}}, 0x6d) write$P9_RVERSION(r0, &(0x7f00000002c0)={0x13, 0x65, 0xffff, 0x6163, 0x6, '9P2000'}, 0x13) r1 = syz_open_dev$evdev(&(0x7f0000000300), 0x7, 0x40000) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000340)=""/20) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000380)=0x6, &(0x7f00000003c0)=0x4) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000400)='.pending_reads\x00', 0x8000, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000440)={0x1d, 0x7, 0x1, {{0x10, '$&-\\@-},\x01($,,/B}'}}}, 0x1d) waitid(0x1, 0x0, 0x0, 0x1, 0x0) [ 123.900740] FAT-fs (loop0): Unrecognized mount option "smackfsroot=/dev/vcs#" or missing value 22:05:14 executing program 5: ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000000)=""/79) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x1, 0x10, 0x4, 0x3, "cd9bd728cdfb87501cabb30f30e546a6195ee3cf4e57ecb72e47dd8745b3039b"}) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f00000000c0)={0x1000, 0xfffffff8, 0x1f, 0x0, 0x0, 0x1}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000009, 0x4000010, 0xffffffffffffffff, 0x8000000) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/5) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x50000000}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x803, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@uname={'uname', 0x3d, ':$'}}, {@loose}, {@nodevmap}, {@aname={'aname', 0x3d, '+@('}}, {@access_any}, {@version_L}, {@access_any}, {@dfltuid}, {@posixacl}, {@cache_none}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@subj_role={'subj_role', 0x3d, '$,&'}}, {@measure}, {@subj_type}, {@smackfsfloor}]}}) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000380)=""/84) write$P9_RREADDIR(r2, &(0x7f0000000400)={0xa6, 0x29, 0x2, {0x7, [{{0x8, 0x2}, 0x6, 0x80, 0x7, './file0'}, {{0x4, 0x2, 0x7}, 0x800, 0x1, 0x7, './file0'}, {{0x10, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x1, 0x4}, 0x4, 0x36, 0x7, './file0'}, {{0x10, 0x1, 0x2}, 0x8, 0x1f, 0x7, './file0'}]}}, 0xa6) r3 = openat$incfs(r0, &(0x7f00000004c0)='.pending_reads\x00', 0x200c00, 0x14c) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000500)=""/178) syz_mount_image$vfat(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3d8a, 0x4, &(0x7f00000008c0)=[{&(0x7f0000000640)="236dbf0f9973e3dc919bd8b5c985a8f696752af745db513fca7506f7bc29f67bcc6effa48b14cbcdefcea1fdd06918cdac00d7f78cffbc67a2d80fbbc5a26fc11fc8026b1ff3be582da142e694869b3547075489a32cc38701666e6244fc7ae676a11ff289b8a3094331b9bacfed5d6eaf5120a3c579a8bb8520399558f0c2936c02ba1d8da3ce229b81096fe7ae52cd7d47faf6290148157f893dc0b0de553b0b1f6d764b6f3e4c7830940db825e4557155afca728cf1e3b768793935f17ce24c34f05f351ef614", 0xc8, 0x2}, {&(0x7f0000000740)="fad75d4a77cf1cb91d54dae0e04b271123069aa9bca6e80c3b59a15d3d3d522820bddb46b6900d369aef7e9d9d90d9b06ea83a8045b804610088f828f8b0d6fc2790b4ce7f893dcff7b30176dd09c291a8ce91667087f3b0acacdd08aaac02cc6832076857b71a95e859e9c8798c93ded048d06542e8bd5f93743ce82ef04de0b66a96cbfca40d63eef7a6ce8f0434db65992d842a38a2f3a8be2cd22a1906f3073afe66c22e9b5e1cca75756e26811581bee4a74e9fc065c88643596a754c73b26d0a25268ac925bc5450304a6402977653b793390182bbd1fc9d1b36", 0xdd, 0x5}, {&(0x7f0000000840)="d4a910423910907dd89f5558d1fcf666dec9", 0x12, 0x7}, {&(0x7f0000000880)="55e0ebca5162bcd27d3a35f2ff49da246cccd22d8c45b270cfa9bc960e4525b266bb64f346247eb28fc9b2a35680405d", 0x30, 0x9}], 0x24041, &(0x7f0000000940)={[{@nonumtail}, {@numtail}, {@utf8}, {@iocharset={'iocharset', 0x3d, 'iso8859-4'}}], [{@obj_user={'obj_user', 0x3d, 'subj_type'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\xfd\'.'}}, {@seclabel}]}) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f00000009c0)={0x7, 0x7}, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000a00)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$EVIOCGLED(r4, 0x80404519, &(0x7f0000000a40)=""/120) ioctl$EVIOCGUNIQ(r3, 0x80404508, &(0x7f0000000ac0)=""/208) ioctl$EVIOCGPHYS(r4, 0x80404507, &(0x7f0000000bc0)=""/225) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000cc0)=""/192) 22:05:14 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x800, 0x311800) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000040)=0x8, 0x4) prctl$PR_MCE_KILL_GET(0x22) prctl$PR_MCE_KILL_GET(0x22) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000100)) ioctl$TUNSETOWNER(r1, 0x400454cc, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140), 0x4, 0x1a5201) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) rt_sigqueueinfo(0x0, 0x1b, &(0x7f0000000180)={0x36, 0x2, 0x10}) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000200)={0x5, 0x80}, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000240), 0xff, 0x44200) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000280)={0x40000004}) r6 = openat$incfs(r3, &(0x7f00000002c0)='.pending_reads\x00', 0x42000, 0x119) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x440000, 0x0) epoll_pwait2(r5, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, &(0x7f0000000400), &(0x7f0000000440)={[0x4]}, 0x8) 22:05:14 executing program 0: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000000)=0x3, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x40, 0x86) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f00000000c0)={0x9, 0x2}, 0x2) ioctl$TUNSETLINK(r0, 0x400454cd, 0x555) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000100)=0x1a, &(0x7f0000000140)=0x1) prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x7fff8) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}, {0xc}, {0xc, 0x90, 0xff}}]}, 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000002c0), 0x3, 0xd0003) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000300)=""/25) write$P9_RFSYNC(r0, &(0x7f0000000340)={0x7, 0x33, 0x1}, 0x7) r3 = gettid() r4 = gettid() r5 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0xe2a5, 0x3, &(0x7f0000000640)=[{&(0x7f0000000400)="135180e5335ab6dbbc54c8e248e20fc2cbf36c32b132fc095f26b9d7ff25809ee0db3fea9fd51c03d9eb6009cf3c9eda6af5d99f27f4fd6d090ce28df4748ef7983c4bd96037469a5d4ca0966c2c642ea76e54135637470b84342d95b39b28b9de900b6a89590378157f34b61a9beabe594780203ebc7d66d59bb2a8554af9ab04ac770506ed6297cb8a76be7d6db172bcab57e227e6506f64aca39daba4b37c39625879cb99c78c16baea599551c47a6dc7106b506c5ccb7748a7666d", 0xbd, 0xffff}, {&(0x7f00000004c0)="2220a69d2edd06df94f76ff3f882e980957360b1f96a732f9b6e58d0ae984df7841d447f75a63dbf3335ed3c9c340b34c84297a429fec8b0f460ebe1bd1ce9334c3ecd7555b1be46f058f5d19f5312a1723858cf6b0e37532f6556888790e2011301bb011f14307d5de607641300675a8dda1e9cdb3f9dc301c3713ca80003d8af32284ab959bf2bfce3c1e2bddf363ff30ca424dc8c1ad07fc09ffac436a0aafd003b6cbbcd3b7be78fdf2fe372846149a3334472d760e37d2af42f0ca20cf8e1b51a2d2c4137724f85503adc4c920f566ae37cce0e15c8c94fa52d66757b21907589216e3f8a0d6bca923545", 0xed, 0x101}, {&(0x7f00000005c0)="ba45ac56af5e0daf4a8cdb87a0f67b87c7f023db6897dda4d520127d9a7c55fc875737f7466f742f8a1895f6166f487102c9f39eade02f55f30a5df38baa418ef36a8752da7c45905db280922f05ded4addcae3334c24ace096c5ed45bd87d626f5b928ef20db6154e2560fc", 0x6c, 0x2}], 0x2, &(0x7f00000006c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}, {@shortname_mixed}, {@rodir}, {@shortname_lower}, {@utf8}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/vcs#\x00'}}, {@measure}, {@fowner_gt={'fowner>', 0xee00}}]}) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r5, &(0x7f0000000740)={r0, r2, 0x3f3}) r6 = syz_open_dev$vcsn(&(0x7f0000000780), 0x81, 0x8000) write$P9_RCLUNK(r6, &(0x7f00000007c0)={0x7, 0x79, 0x1}, 0x7) r7 = syz_open_dev$vcsn(&(0x7f0000000800), 0x100, 0x101100) write$P9_RREADDIR(r7, &(0x7f0000000840)={0x87, 0x29, 0x2, {0x2, [{{0x1, 0x4, 0x7}, 0x524, 0x7f, 0x7, './file1'}, {{0x40, 0x2, 0x5}, 0xc227, 0x13, 0x7, './file0'}, {{0x2, 0x4, 0x6}, 0x4, 0x1c, 0x7, './file0'}, {{0x80, 0x2, 0x3}, 0x400, 0x3, 0x7, './file0'}]}}, 0x87) 22:05:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x81880004}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@GTPA_TID={0xc, 0x3, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040004}, 0x4008041) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r1, 0x100, 0x70bd27, 0x25dfdbff, {}, [@GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_VERSION={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @multicast2}, @GTPA_FLOW={0x6, 0x6, 0x2}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000c0}, 0x4) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000240)='.pending_reads\x00', 0x101000, 0x48) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000002c0)={0x5, 0x80, 0x1f, 0x1, 0x3, 0x1, 0x0, 0x6, 0xb204, 0x6, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000280), 0x4}, 0x20060, 0x4, 0x1, 0x5, 0x100000000, 0x7, 0x81, 0x0, 0x5, 0x0, 0x4}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000380)) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f00000003c0)) r4 = gettid() syz_open_procfs$namespace(r4, &(0x7f0000000400)='ns/ipc\x00') r5 = socket(0x5, 0x5, 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000000440)={'wg0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000500)={'erspan0\x00', &(0x7f0000000480)={'gre0\x00', r6, 0x8000, 0x7800, 0x6, 0x4, {{0x14, 0x4, 0x2, 0x19, 0x50, 0x67, 0x0, 0x4, 0x4, 0x0, @multicast2, @private=0xa010101, {[@timestamp_addr={0x44, 0x24, 0xb1, 0x1, 0x4, [{@local, 0x9}, {@local, 0x6}, {@remote, 0x8000}, {@multicast2, 0x1}]}, @end, @ssrr={0x89, 0xf, 0xa6, [@remote, @empty, @local]}, @rr={0x7, 0x7, 0xb5, [@multicast2]}]}}}}}) r7 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x11d001, 0x15) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000600)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x5, 0x0, r7, 0x0, &(0x7f0000000580)="88571343deee7402d7333445b4e1e746179fccb95971dd80da361bfe8d1079be5b951d72e1aa4a4f3a70081c3b5754ca067be0309a7db6d3e06c20992269f93849ba536af0dd532cd9af83cf", 0x4c, 0x20, 0x1}, 0x20) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000640)={0x0}, &(0x7f0000000680)=0xc) r9 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) kcmp$KCMP_EPOLL_TFD(r4, r8, 0x7, r2, &(0x7f00000006c0)={r2, r9, 0x5}) [ 124.160991] loop5: detected capacity change from 0 to 30 [ 124.212772] loop0: detected capacity change from 0 to 255 [ 124.233685] FAT-fs (loop0): Unrecognized mount option "smackfsroot=/dev/vcs#" or missing value [ 124.257803] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4035 comm=syz-executor.4 22:05:29 executing program 7: write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x79, 0x1}, 0x7) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x49, 0x1, {0x52, 0x0, 0x6}}, 0x14) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x79, 0x1}, 0x7) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) write$P9_RRENAME(r0, &(0x7f0000000100)={0x7, 0x15, 0x1}, 0x7) r1 = syz_open_dev$vcsn(&(0x7f0000000140), 0x92a, 0x4442) write$P9_RCLUNK(r1, &(0x7f0000000180)={0x7, 0x79, 0x1}, 0x7) write$P9_RGETATTR(r0, &(0x7f00000001c0)={0xa0, 0x19, 0x2, {0x28, {0x10, 0x3, 0x1}, 0x20, 0xee00, 0xee00, 0x5, 0x631, 0xffff, 0x3, 0x1, 0x81a1, 0x0, 0x3, 0x10000, 0x0, 0xfff, 0x401, 0x2, 0x3a, 0xffffffff}}, 0xa0) write$P9_RVERSION(r1, &(0x7f0000000280)={0x13, 0x65, 0xffff, 0x1, 0x6, '9P2000'}, 0x13) pipe2$9p(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSYMLINK(r2, &(0x7f0000000300)={0x14, 0x11, 0x1, {0x2, 0x3, 0x5}}, 0x14) write$9p(r1, &(0x7f0000000340)="aa9e2df267450c0625fedbb9951dd3d35551c8cb07ad190185d70c9e7706ea135189402723c7107da568286447f61b58eee330dcddaab61411f6b86ed9ba3b4c37ec74a88078ca0ad694970dbd3d739e0d3ce8347f3ebc565bedaf0878e2b6e102adf9691334078a39f8babead66fa0b52a928235a773e15903429b993673947ad0718cf97476bbf2ee81e880df17e54866cf28ecbf81cbe99b00d875fc03f1a372b6130508507c908a40a170d5d9c6c2912cb3941d26fe8c691b6bd4e88f64422b7fd6c9cf8ba14bef0229fcedfba42a9c65340df3a0030dee613662aeb2d52494fb90eee175f63678c7e72", 0xec) syz_genetlink_get_family_id$devlink(&(0x7f0000000440), r0) write$P9_RFSYNC(r2, &(0x7f0000000480)={0x7, 0x33, 0x1}, 0x7) write$P9_RSETATTR(r2, &(0x7f00000004c0)={0x7, 0x1b, 0x2}, 0x7) inotify_rm_watch(r1, 0x0) inotify_init1(0x80800) keyctl$describe(0x6, 0x0, &(0x7f0000000500)=""/143, 0x8f) openat$autofs(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000600)=0x9, &(0x7f0000000640)=0x2) 22:05:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x81880004}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@GTPA_TID={0xc, 0x3, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040004}, 0x4008041) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r1, 0x100, 0x70bd27, 0x25dfdbff, {}, [@GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_VERSION={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @multicast2}, @GTPA_FLOW={0x6, 0x6, 0x2}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000c0}, 0x4) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000240)='.pending_reads\x00', 0x101000, 0x48) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000002c0)={0x5, 0x80, 0x1f, 0x1, 0x3, 0x1, 0x0, 0x6, 0xb204, 0x6, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000280), 0x4}, 0x20060, 0x4, 0x1, 0x5, 0x100000000, 0x7, 0x81, 0x0, 0x5, 0x0, 0x4}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000380)) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f00000003c0)) r4 = gettid() syz_open_procfs$namespace(r4, &(0x7f0000000400)='ns/ipc\x00') r5 = socket(0x5, 0x5, 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000000440)={'wg0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000500)={'erspan0\x00', &(0x7f0000000480)={'gre0\x00', r6, 0x8000, 0x7800, 0x6, 0x4, {{0x14, 0x4, 0x2, 0x19, 0x50, 0x67, 0x0, 0x4, 0x4, 0x0, @multicast2, @private=0xa010101, {[@timestamp_addr={0x44, 0x24, 0xb1, 0x1, 0x4, [{@local, 0x9}, {@local, 0x6}, {@remote, 0x8000}, {@multicast2, 0x1}]}, @end, @ssrr={0x89, 0xf, 0xa6, [@remote, @empty, @local]}, @rr={0x7, 0x7, 0xb5, [@multicast2]}]}}}}}) r7 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x11d001, 0x15) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000600)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x5, 0x0, r7, 0x0, &(0x7f0000000580)="88571343deee7402d7333445b4e1e746179fccb95971dd80da361bfe8d1079be5b951d72e1aa4a4f3a70081c3b5754ca067be0309a7db6d3e06c20992269f93849ba536af0dd532cd9af83cf", 0x4c, 0x20, 0x1}, 0x20) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000640)={0x0}, &(0x7f0000000680)=0xc) r9 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) kcmp$KCMP_EPOLL_TFD(r4, r8, 0x7, r2, &(0x7f00000006c0)={r2, r9, 0x5}) 22:05:29 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x71, 0x2, {{0x40, 0x0, 0x1}, 0x5}}, 0x18) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x49, 0x2, {0x8, 0x2, 0x3}}, 0x14) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x6d, 0x1}, 0x7) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$9p(r0, &(0x7f0000000100)="bca390dfb2aad74d6f9c27396275f45ae94f6ab4ae4e7ff1f9420e901a91a03c47caed038181e564b1e7124f503a1e7c7b7ecd9d49bfb7a4109df30aa9272cf6a61fa23a1d487a235cc314e3c5a2ca4979242cc62dfa2dabb2ca1cbaf3561e232117b23264d149cfa3ef125f7f7e3edd4f646d9590b5c499afbdf7ae79d177b51ed816e3972bec0d20531a3b2de42de01f02ff85370db8841b9fe741422bd07181127933d744b4b7c71ec6710adcbdba5b48901d670e717b84550f6bdcad29c5fac4d76f2bed0b8d1f035448fc77f6874c0f2f14546e83b68b1be630d51f882c5c2b74f5991ebe", 0xe7) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wg2\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000280)={'syztnl2\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x40, 0x20, 0x8, 0xff, {{0x6, 0x4, 0x2, 0x7, 0x18, 0x65, 0x0, 0x2, 0x29, 0x0, @rand_addr=0x64010101, @empty, {[@noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000380)={'tunl0\x00', &(0x7f00000002c0)={'gretap0\x00', r2, 0x8, 0x40, 0x401, 0xfffff000, {{0x1e, 0x4, 0x0, 0x9, 0x78, 0x64, 0x0, 0x9, 0x4, 0x0, @broadcast, @remote, {[@generic={0x83, 0x7, "9d3f8d3d0b"}, @ssrr={0x89, 0x7, 0xe8, [@remote]}, @timestamp={0x44, 0x10, 0x6f, 0x0, 0x5, [0x400, 0x3, 0x4]}, @timestamp_prespec={0x44, 0x14, 0x63, 0x3, 0xb, [{@empty, 0x8000}, {@local, 0x40}]}, @timestamp={0x44, 0x10, 0xe2, 0x0, 0x6, [0x200, 0x1, 0xfffffffc]}, @rr={0x7, 0x1f, 0x6f, [@local, @multicast2, @multicast2, @multicast1, @remote, @multicast2, @multicast2]}]}}}}}) write$P9_RFSYNC(r0, &(0x7f00000003c0)={0x7, 0x33, 0x1}, 0x7) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_SPLICE={0x1e, 0x3, 0x0, @fd=r0, 0x40, {0x0, r0}, 0x1f, 0xc, 0x1, {0x0, 0x0, r1}}, 0x2cb) r3 = syz_open_dev$vcsn(&(0x7f0000000440), 0x3ff, 0x82000) ioctl$EVIOCGBITSW(r3, 0x80404525, &(0x7f0000000480)=""/55) write$P9_RFSYNC(r3, &(0x7f00000004c0)={0x7, 0x33, 0x2}, 0x7) r4 = syz_open_dev$vcsn(&(0x7f0000000500), 0x9, 0x1ac02) setsockopt$inet_udp_int(r4, 0x11, 0xb, &(0x7f0000000540)=0x3f, 0x4) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000580)={0x14, 0x67, 0x2, {0x0, 0x2, 0x2}}, 0x14) epoll_pwait(r4, &(0x7f00000005c0)=[{}, {}], 0x2, 0x2, &(0x7f0000000600)={[0x7]}, 0x8) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000640)=@IORING_OP_ASYNC_CANCEL={0xe, 0x2, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000680)) 22:05:29 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x800, 0x311800) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000040)=0x8, 0x4) prctl$PR_MCE_KILL_GET(0x22) prctl$PR_MCE_KILL_GET(0x22) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000100)) ioctl$TUNSETOWNER(r1, 0x400454cc, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140), 0x4, 0x1a5201) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) rt_sigqueueinfo(0x0, 0x1b, &(0x7f0000000180)={0x36, 0x2, 0x10}) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000200)={0x5, 0x80}, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000240), 0xff, 0x44200) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000280)={0x40000004}) r6 = openat$incfs(r3, &(0x7f00000002c0)='.pending_reads\x00', 0x42000, 0x119) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x440000, 0x0) epoll_pwait2(r5, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, &(0x7f0000000400), &(0x7f0000000440)={[0x4]}, 0x8) 22:05:29 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x1, 0x2, 0x1}}, 0x14) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000080)=""/78) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000001c0)={0x4, 0x99, &(0x7f0000000100)="98de84c8fc1f3757f657d92a2cafec389481024bd74c10ebb4deddce7a9fc2b3bade12c3563b098db065cff32535da5b4275ab0c97363281046f3c1d227069d58e06e26ac42423b77f5b35964a7d416cb7943c642ac75234bfd0e767b19171f87e874b8afd127ad4332819967e93c4959fe72183de5753db5d0138ceea4f8a974c5bc7d20ddab8a42666859e99a0b44fb6df351782bda5fb2a"}) syz_open_dev$evdev(&(0x7f0000000200), 0x1, 0x10080) write$P9_RSTATu(r0, &(0x7f0000000240)={0x6d, 0x7d, 0x1, {{0x0, 0x58, 0x8, 0x7, {0x10, 0x3, 0x5}, 0x35100000, 0x7, 0x0, 0x5, 0x10, '$&-\\@-},\x01($,,/B}', 0x1, ']', 0x12, '/dev/input/event#\x00', 0x2, '+\''}, 0x0, '', 0xee01, 0xee01, 0xee01}}, 0x6d) write$P9_RVERSION(r0, &(0x7f00000002c0)={0x13, 0x65, 0xffff, 0x6163, 0x6, '9P2000'}, 0x13) r1 = syz_open_dev$evdev(&(0x7f0000000300), 0x7, 0x40000) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000340)=""/20) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000380)=0x6, &(0x7f00000003c0)=0x4) openat$incfs(0xffffffffffffff9c, &(0x7f0000000400)='.pending_reads\x00', 0x8000, 0x0) waitid(0x1, 0x0, 0x0, 0x1, 0x0) 22:05:29 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000000)=0x80, 0x1) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x2, 0x80010, 0xffffffffffffffff, 0x8000000) r2 = mmap$IORING_OFF_SQES(&(0x7f0000eeb000/0x1000)=nil, 0x1000, 0x2000002, 0x100010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_CLOSE={0x13, 0x4, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x307cbdc9) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.log\x00', 0x0, 0x50) setsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f00000000c0)=0x1, 0x4) io_uring_setup(0x7f90, &(0x7f0000000100)={0x0, 0x333, 0x20, 0x3, 0x3e8, 0x0, r3}) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff}, 0x84000) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f00000001c0)={0x2000}) socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = syz_open_dev$vcsn(&(0x7f0000000200), 0x4, 0x250301) openat$incfs(r5, &(0x7f0000000240)='.log\x00', 0x80000, 0x100) r6 = epoll_create(0xfff) epoll_pwait(r6, &(0x7f0000000280)=[{}, {}], 0x2, 0x1f, &(0x7f00000002c0)={[0xa8da]}, 0x8) r7 = syz_open_dev$vcsn(&(0x7f0000000300), 0x5, 0x20000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000340)={r7, r3, 0xfffff386}) write$P9_RFSYNC(r3, &(0x7f0000000380)={0x7, 0x33, 0x1}, 0x7) syz_genetlink_get_family_id$devlink(&(0x7f00000003c0), r5) 22:05:29 executing program 5: ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000000)=""/79) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x1, 0x10, 0x4, 0x3, "cd9bd728cdfb87501cabb30f30e546a6195ee3cf4e57ecb72e47dd8745b3039b"}) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f00000000c0)={0x1000, 0xfffffff8, 0x1f, 0x0, 0x0, 0x1}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000009, 0x4000010, 0xffffffffffffffff, 0x8000000) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/5) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x50000000}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x803, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@uname={'uname', 0x3d, ':$'}}, {@loose}, {@nodevmap}, {@aname={'aname', 0x3d, '+@('}}, {@access_any}, {@version_L}, {@access_any}, {@dfltuid}, {@posixacl}, {@cache_none}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@subj_role={'subj_role', 0x3d, '$,&'}}, {@measure}, {@subj_type}, {@smackfsfloor}]}}) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000380)=""/84) write$P9_RREADDIR(r2, &(0x7f0000000400)={0xa6, 0x29, 0x2, {0x7, [{{0x8, 0x2}, 0x6, 0x80, 0x7, './file0'}, {{0x4, 0x2, 0x7}, 0x800, 0x1, 0x7, './file0'}, {{0x10, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x1, 0x4}, 0x4, 0x36, 0x7, './file0'}, {{0x10, 0x1, 0x2}, 0x8, 0x1f, 0x7, './file0'}]}}, 0xa6) r3 = openat$incfs(r0, &(0x7f00000004c0)='.pending_reads\x00', 0x200c00, 0x14c) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000500)=""/178) syz_mount_image$vfat(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3d8a, 0x4, &(0x7f00000008c0)=[{&(0x7f0000000640)="236dbf0f9973e3dc919bd8b5c985a8f696752af745db513fca7506f7bc29f67bcc6effa48b14cbcdefcea1fdd06918cdac00d7f78cffbc67a2d80fbbc5a26fc11fc8026b1ff3be582da142e694869b3547075489a32cc38701666e6244fc7ae676a11ff289b8a3094331b9bacfed5d6eaf5120a3c579a8bb8520399558f0c2936c02ba1d8da3ce229b81096fe7ae52cd7d47faf6290148157f893dc0b0de553b0b1f6d764b6f3e4c7830940db825e4557155afca728cf1e3b768793935f17ce24c34f05f351ef614", 0xc8, 0x2}, {&(0x7f0000000740)="fad75d4a77cf1cb91d54dae0e04b271123069aa9bca6e80c3b59a15d3d3d522820bddb46b6900d369aef7e9d9d90d9b06ea83a8045b804610088f828f8b0d6fc2790b4ce7f893dcff7b30176dd09c291a8ce91667087f3b0acacdd08aaac02cc6832076857b71a95e859e9c8798c93ded048d06542e8bd5f93743ce82ef04de0b66a96cbfca40d63eef7a6ce8f0434db65992d842a38a2f3a8be2cd22a1906f3073afe66c22e9b5e1cca75756e26811581bee4a74e9fc065c88643596a754c73b26d0a25268ac925bc5450304a6402977653b793390182bbd1fc9d1b36", 0xdd, 0x5}, {&(0x7f0000000840)="d4a910423910907dd89f5558d1fcf666dec9", 0x12, 0x7}, {&(0x7f0000000880)="55e0ebca5162bcd27d3a35f2ff49da246cccd22d8c45b270cfa9bc960e4525b266bb64f346247eb28fc9b2a35680405d", 0x30, 0x9}], 0x24041, &(0x7f0000000940)={[{@nonumtail}, {@numtail}, {@utf8}, {@iocharset={'iocharset', 0x3d, 'iso8859-4'}}], [{@obj_user={'obj_user', 0x3d, 'subj_type'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\xfd\'.'}}, {@seclabel}]}) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f00000009c0)={0x7, 0x7}, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000a00)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$EVIOCGLED(r4, 0x80404519, &(0x7f0000000a40)=""/120) ioctl$EVIOCGUNIQ(r3, 0x80404508, &(0x7f0000000ac0)=""/208) ioctl$EVIOCGPHYS(r4, 0x80404507, &(0x7f0000000bc0)=""/225) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000cc0)=""/192) 22:05:29 executing program 0: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000000)=0x3, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x40, 0x86) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f00000000c0)={0x9, 0x2}, 0x2) ioctl$TUNSETLINK(r0, 0x400454cd, 0x555) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000100)=0x1a, &(0x7f0000000140)=0x1) prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x7fff8) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}, {0xc}, {0xc, 0x90, 0xff}}]}, 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000002c0), 0x3, 0xd0003) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000300)=""/25) write$P9_RFSYNC(r0, &(0x7f0000000340)={0x7, 0x33, 0x1}, 0x7) r3 = gettid() r4 = gettid() r5 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0xe2a5, 0x3, &(0x7f0000000640)=[{&(0x7f0000000400)="135180e5335ab6dbbc54c8e248e20fc2cbf36c32b132fc095f26b9d7ff25809ee0db3fea9fd51c03d9eb6009cf3c9eda6af5d99f27f4fd6d090ce28df4748ef7983c4bd96037469a5d4ca0966c2c642ea76e54135637470b84342d95b39b28b9de900b6a89590378157f34b61a9beabe594780203ebc7d66d59bb2a8554af9ab04ac770506ed6297cb8a76be7d6db172bcab57e227e6506f64aca39daba4b37c39625879cb99c78c16baea599551c47a6dc7106b506c5ccb7748a7666d", 0xbd, 0xffff}, {&(0x7f00000004c0)="2220a69d2edd06df94f76ff3f882e980957360b1f96a732f9b6e58d0ae984df7841d447f75a63dbf3335ed3c9c340b34c84297a429fec8b0f460ebe1bd1ce9334c3ecd7555b1be46f058f5d19f5312a1723858cf6b0e37532f6556888790e2011301bb011f14307d5de607641300675a8dda1e9cdb3f9dc301c3713ca80003d8af32284ab959bf2bfce3c1e2bddf363ff30ca424dc8c1ad07fc09ffac436a0aafd003b6cbbcd3b7be78fdf2fe372846149a3334472d760e37d2af42f0ca20cf8e1b51a2d2c4137724f85503adc4c920f566ae37cce0e15c8c94fa52d66757b21907589216e3f8a0d6bca923545", 0xed, 0x101}, {&(0x7f00000005c0)="ba45ac56af5e0daf4a8cdb87a0f67b87c7f023db6897dda4d520127d9a7c55fc875737f7466f742f8a1895f6166f487102c9f39eade02f55f30a5df38baa418ef36a8752da7c45905db280922f05ded4addcae3334c24ace096c5ed45bd87d626f5b928ef20db6154e2560fc", 0x6c, 0x2}], 0x2, &(0x7f00000006c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}, {@shortname_mixed}, {@rodir}, {@shortname_lower}, {@utf8}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/vcs#\x00'}}, {@measure}, {@fowner_gt={'fowner>', 0xee00}}]}) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r5, &(0x7f0000000740)={r0, r2, 0x3f3}) r6 = syz_open_dev$vcsn(&(0x7f0000000780), 0x81, 0x8000) write$P9_RCLUNK(r6, &(0x7f00000007c0)={0x7, 0x79, 0x1}, 0x7) r7 = syz_open_dev$vcsn(&(0x7f0000000800), 0x100, 0x101100) write$P9_RREADDIR(r7, &(0x7f0000000840)={0x87, 0x29, 0x2, {0x2, [{{0x1, 0x4, 0x7}, 0x524, 0x7f, 0x7, './file1'}, {{0x40, 0x2, 0x5}, 0xc227, 0x13, 0x7, './file0'}, {{0x2, 0x4, 0x6}, 0x4, 0x1c, 0x7, './file0'}, {{0x80, 0x2, 0x3}, 0x400, 0x3, 0x7, './file0'}]}}, 0x87) [ 138.847076] loop5: detected capacity change from 0 to 30 [ 138.853611] loop0: detected capacity change from 0 to 255 [ 138.857489] FAT-fs (loop0): Unrecognized mount option "smackfsroot=/dev/vcs#" or missing value [ 138.875102] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4066 comm=syz-executor.4 22:05:29 executing program 0: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000000)=0x3, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x40, 0x86) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f00000000c0)={0x9, 0x2}, 0x2) ioctl$TUNSETLINK(r0, 0x400454cd, 0x555) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000100)=0x1a, &(0x7f0000000140)=0x1) prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x7fff8) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}, {0xc}, {0xc, 0x90, 0xff}}]}, 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000002c0), 0x3, 0xd0003) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000300)=""/25) write$P9_RFSYNC(r0, &(0x7f0000000340)={0x7, 0x33, 0x1}, 0x7) r3 = gettid() r4 = gettid() r5 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0xe2a5, 0x3, &(0x7f0000000640)=[{&(0x7f0000000400)="135180e5335ab6dbbc54c8e248e20fc2cbf36c32b132fc095f26b9d7ff25809ee0db3fea9fd51c03d9eb6009cf3c9eda6af5d99f27f4fd6d090ce28df4748ef7983c4bd96037469a5d4ca0966c2c642ea76e54135637470b84342d95b39b28b9de900b6a89590378157f34b61a9beabe594780203ebc7d66d59bb2a8554af9ab04ac770506ed6297cb8a76be7d6db172bcab57e227e6506f64aca39daba4b37c39625879cb99c78c16baea599551c47a6dc7106b506c5ccb7748a7666d", 0xbd, 0xffff}, {&(0x7f00000004c0)="2220a69d2edd06df94f76ff3f882e980957360b1f96a732f9b6e58d0ae984df7841d447f75a63dbf3335ed3c9c340b34c84297a429fec8b0f460ebe1bd1ce9334c3ecd7555b1be46f058f5d19f5312a1723858cf6b0e37532f6556888790e2011301bb011f14307d5de607641300675a8dda1e9cdb3f9dc301c3713ca80003d8af32284ab959bf2bfce3c1e2bddf363ff30ca424dc8c1ad07fc09ffac436a0aafd003b6cbbcd3b7be78fdf2fe372846149a3334472d760e37d2af42f0ca20cf8e1b51a2d2c4137724f85503adc4c920f566ae37cce0e15c8c94fa52d66757b21907589216e3f8a0d6bca923545", 0xed, 0x101}, {&(0x7f00000005c0)="ba45ac56af5e0daf4a8cdb87a0f67b87c7f023db6897dda4d520127d9a7c55fc875737f7466f742f8a1895f6166f487102c9f39eade02f55f30a5df38baa418ef36a8752da7c45905db280922f05ded4addcae3334c24ace096c5ed45bd87d626f5b928ef20db6154e2560fc", 0x6c, 0x2}], 0x2, &(0x7f00000006c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}, {@shortname_mixed}, {@rodir}, {@shortname_lower}, {@utf8}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/vcs#\x00'}}, {@measure}, {@fowner_gt={'fowner>', 0xee00}}]}) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r5, &(0x7f0000000740)={r0, r2, 0x3f3}) r6 = syz_open_dev$vcsn(&(0x7f0000000780), 0x81, 0x8000) write$P9_RCLUNK(r6, &(0x7f00000007c0)={0x7, 0x79, 0x1}, 0x7) syz_open_dev$vcsn(&(0x7f0000000800), 0x100, 0x101100) [ 138.983779] loop0: detected capacity change from 0 to 255 [ 138.988656] FAT-fs (loop0): Unrecognized mount option "smackfsroot=/dev/vcs#" or missing value 22:05:29 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000000)=0x80, 0x1) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x2, 0x80010, 0xffffffffffffffff, 0x8000000) r2 = mmap$IORING_OFF_SQES(&(0x7f0000eeb000/0x1000)=nil, 0x1000, 0x2000002, 0x100010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_CLOSE={0x13, 0x4, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x307cbdc9) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.log\x00', 0x0, 0x50) setsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f00000000c0)=0x1, 0x4) io_uring_setup(0x7f90, &(0x7f0000000100)={0x0, 0x333, 0x20, 0x3, 0x3e8, 0x0, r3}) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff}, 0x84000) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f00000001c0)={0x2000}) socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = syz_open_dev$vcsn(&(0x7f0000000200), 0x4, 0x250301) openat$incfs(r5, &(0x7f0000000240)='.log\x00', 0x80000, 0x100) r6 = epoll_create(0xfff) epoll_pwait(r6, &(0x7f0000000280)=[{}, {}], 0x2, 0x1f, &(0x7f00000002c0)={[0xa8da]}, 0x8) r7 = syz_open_dev$vcsn(&(0x7f0000000300), 0x5, 0x20000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000340)={r7, r3, 0xfffff386}) write$P9_RFSYNC(r3, &(0x7f0000000380)={0x7, 0x33, 0x1}, 0x7) syz_genetlink_get_family_id$devlink(&(0x7f00000003c0), r5) 22:05:29 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x1, 0x2, 0x1}}, 0x14) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000080)=""/78) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000001c0)={0x4, 0x99, &(0x7f0000000100)="98de84c8fc1f3757f657d92a2cafec389481024bd74c10ebb4deddce7a9fc2b3bade12c3563b098db065cff32535da5b4275ab0c97363281046f3c1d227069d58e06e26ac42423b77f5b35964a7d416cb7943c642ac75234bfd0e767b19171f87e874b8afd127ad4332819967e93c4959fe72183de5753db5d0138ceea4f8a974c5bc7d20ddab8a42666859e99a0b44fb6df351782bda5fb2a"}) syz_open_dev$evdev(&(0x7f0000000200), 0x1, 0x10080) write$P9_RSTATu(r0, &(0x7f0000000240)={0x6d, 0x7d, 0x1, {{0x0, 0x58, 0x8, 0x7, {0x10, 0x3, 0x5}, 0x35100000, 0x7, 0x0, 0x5, 0x10, '$&-\\@-},\x01($,,/B}', 0x1, ']', 0x12, '/dev/input/event#\x00', 0x2, '+\''}, 0x0, '', 0xee01, 0xee01, 0xee01}}, 0x6d) write$P9_RVERSION(r0, &(0x7f00000002c0)={0x13, 0x65, 0xffff, 0x6163, 0x6, '9P2000'}, 0x13) r1 = syz_open_dev$evdev(&(0x7f0000000300), 0x7, 0x40000) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000340)=""/20) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000380)=0x6, &(0x7f00000003c0)=0x4) waitid(0x1, 0x0, 0x0, 0x1, 0x0) 22:05:29 executing program 5: ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000000)=""/79) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x1, 0x10, 0x4, 0x3, "cd9bd728cdfb87501cabb30f30e546a6195ee3cf4e57ecb72e47dd8745b3039b"}) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f00000000c0)={0x1000, 0xfffffff8, 0x1f, 0x0, 0x0, 0x1}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000009, 0x4000010, 0xffffffffffffffff, 0x8000000) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/5) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x50000000}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x803, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@uname={'uname', 0x3d, ':$'}}, {@loose}, {@nodevmap}, {@aname={'aname', 0x3d, '+@('}}, {@access_any}, {@version_L}, {@access_any}, {@dfltuid}, {@posixacl}, {@cache_none}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@subj_role={'subj_role', 0x3d, '$,&'}}, {@measure}, {@subj_type}, {@smackfsfloor}]}}) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000380)=""/84) write$P9_RREADDIR(r2, &(0x7f0000000400)={0xa6, 0x29, 0x2, {0x7, [{{0x8, 0x2}, 0x6, 0x80, 0x7, './file0'}, {{0x4, 0x2, 0x7}, 0x800, 0x1, 0x7, './file0'}, {{0x10, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x1, 0x4}, 0x4, 0x36, 0x7, './file0'}, {{0x10, 0x1, 0x2}, 0x8, 0x1f, 0x7, './file0'}]}}, 0xa6) r3 = openat$incfs(r0, &(0x7f00000004c0)='.pending_reads\x00', 0x200c00, 0x14c) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000500)=""/178) syz_mount_image$vfat(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3d8a, 0x4, &(0x7f00000008c0)=[{&(0x7f0000000640)="236dbf0f9973e3dc919bd8b5c985a8f696752af745db513fca7506f7bc29f67bcc6effa48b14cbcdefcea1fdd06918cdac00d7f78cffbc67a2d80fbbc5a26fc11fc8026b1ff3be582da142e694869b3547075489a32cc38701666e6244fc7ae676a11ff289b8a3094331b9bacfed5d6eaf5120a3c579a8bb8520399558f0c2936c02ba1d8da3ce229b81096fe7ae52cd7d47faf6290148157f893dc0b0de553b0b1f6d764b6f3e4c7830940db825e4557155afca728cf1e3b768793935f17ce24c34f05f351ef614", 0xc8, 0x2}, {&(0x7f0000000740)="fad75d4a77cf1cb91d54dae0e04b271123069aa9bca6e80c3b59a15d3d3d522820bddb46b6900d369aef7e9d9d90d9b06ea83a8045b804610088f828f8b0d6fc2790b4ce7f893dcff7b30176dd09c291a8ce91667087f3b0acacdd08aaac02cc6832076857b71a95e859e9c8798c93ded048d06542e8bd5f93743ce82ef04de0b66a96cbfca40d63eef7a6ce8f0434db65992d842a38a2f3a8be2cd22a1906f3073afe66c22e9b5e1cca75756e26811581bee4a74e9fc065c88643596a754c73b26d0a25268ac925bc5450304a6402977653b793390182bbd1fc9d1b36", 0xdd, 0x5}, {&(0x7f0000000840)="d4a910423910907dd89f5558d1fcf666dec9", 0x12, 0x7}, {&(0x7f0000000880)="55e0ebca5162bcd27d3a35f2ff49da246cccd22d8c45b270cfa9bc960e4525b266bb64f346247eb28fc9b2a35680405d", 0x30, 0x9}], 0x24041, &(0x7f0000000940)={[{@nonumtail}, {@numtail}, {@utf8}, {@iocharset={'iocharset', 0x3d, 'iso8859-4'}}], [{@obj_user={'obj_user', 0x3d, 'subj_type'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\xfd\'.'}}, {@seclabel}]}) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f00000009c0)={0x7, 0x7}, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000a00)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$EVIOCGLED(r4, 0x80404519, &(0x7f0000000a40)=""/120) ioctl$EVIOCGUNIQ(r3, 0x80404508, &(0x7f0000000ac0)=""/208) ioctl$EVIOCGPHYS(r4, 0x80404507, &(0x7f0000000bc0)=""/225) [ 139.085098] loop5: detected capacity change from 0 to 30 22:05:44 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x1, 0x2, 0x1}}, 0x14) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000080)=""/78) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000001c0)={0x4, 0x99, &(0x7f0000000100)="98de84c8fc1f3757f657d92a2cafec389481024bd74c10ebb4deddce7a9fc2b3bade12c3563b098db065cff32535da5b4275ab0c97363281046f3c1d227069d58e06e26ac42423b77f5b35964a7d416cb7943c642ac75234bfd0e767b19171f87e874b8afd127ad4332819967e93c4959fe72183de5753db5d0138ceea4f8a974c5bc7d20ddab8a42666859e99a0b44fb6df351782bda5fb2a"}) syz_open_dev$evdev(&(0x7f0000000200), 0x1, 0x10080) write$P9_RSTATu(r0, &(0x7f0000000240)={0x6d, 0x7d, 0x1, {{0x0, 0x58, 0x8, 0x7, {0x10, 0x3, 0x5}, 0x35100000, 0x7, 0x0, 0x5, 0x10, '$&-\\@-},\x01($,,/B}', 0x1, ']', 0x12, '/dev/input/event#\x00', 0x2, '+\''}, 0x0, '', 0xee01, 0xee01, 0xee01}}, 0x6d) write$P9_RVERSION(r0, &(0x7f00000002c0)={0x13, 0x65, 0xffff, 0x6163, 0x6, '9P2000'}, 0x13) r1 = syz_open_dev$evdev(&(0x7f0000000300), 0x7, 0x40000) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000340)=""/20) waitid(0x1, 0x0, 0x0, 0x1, 0x0) 22:05:44 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x800, 0x311800) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000040)=0x8, 0x4) prctl$PR_MCE_KILL_GET(0x22) prctl$PR_MCE_KILL_GET(0x22) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000100)) ioctl$TUNSETOWNER(r1, 0x400454cc, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140), 0x4, 0x1a5201) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) rt_sigqueueinfo(0x0, 0x1b, &(0x7f0000000180)={0x36, 0x2, 0x10}) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000200)={0x5, 0x80}, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000240), 0xff, 0x44200) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000280)={0x40000004}) r6 = openat$incfs(r3, &(0x7f00000002c0)='.pending_reads\x00', 0x42000, 0x119) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) epoll_pwait2(r5, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, &(0x7f0000000400), &(0x7f0000000440)={[0x4]}, 0x8) 22:05:44 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000000)=0x80, 0x1) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x2, 0x80010, 0xffffffffffffffff, 0x8000000) r2 = mmap$IORING_OFF_SQES(&(0x7f0000eeb000/0x1000)=nil, 0x1000, 0x2000002, 0x100010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_CLOSE={0x13, 0x4, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x307cbdc9) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.log\x00', 0x0, 0x50) setsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f00000000c0)=0x1, 0x4) io_uring_setup(0x7f90, &(0x7f0000000100)={0x0, 0x333, 0x20, 0x3, 0x3e8, 0x0, r3}) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff}, 0x84000) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f00000001c0)={0x2000}) socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = syz_open_dev$vcsn(&(0x7f0000000200), 0x4, 0x250301) openat$incfs(r5, &(0x7f0000000240)='.log\x00', 0x80000, 0x100) r6 = epoll_create(0xfff) epoll_pwait(r6, &(0x7f0000000280)=[{}, {}], 0x2, 0x1f, &(0x7f00000002c0)={[0xa8da]}, 0x8) r7 = syz_open_dev$vcsn(&(0x7f0000000300), 0x5, 0x20000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000340)={r7, r3, 0xfffff386}) syz_genetlink_get_family_id$devlink(&(0x7f00000003c0), r5) 22:05:44 executing program 7: write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x79, 0x1}, 0x7) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x49, 0x1, {0x52, 0x0, 0x6}}, 0x14) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x79, 0x1}, 0x7) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) write$P9_RRENAME(r0, &(0x7f0000000100)={0x7, 0x15, 0x1}, 0x7) r1 = syz_open_dev$vcsn(&(0x7f0000000140), 0x92a, 0x4442) write$P9_RCLUNK(r1, &(0x7f0000000180)={0x7, 0x79, 0x1}, 0x7) write$P9_RGETATTR(r0, &(0x7f00000001c0)={0xa0, 0x19, 0x2, {0x28, {0x10, 0x3, 0x1}, 0x20, 0xee00, 0xee00, 0x5, 0x631, 0xffff, 0x3, 0x1, 0x81a1, 0x0, 0x3, 0x10000, 0x0, 0xfff, 0x401, 0x2, 0x3a, 0xffffffff}}, 0xa0) write$P9_RVERSION(r1, &(0x7f0000000280)={0x13, 0x65, 0xffff, 0x1, 0x6, '9P2000'}, 0x13) pipe2$9p(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSYMLINK(r2, &(0x7f0000000300)={0x14, 0x11, 0x1, {0x2, 0x3, 0x5}}, 0x14) write$9p(r1, &(0x7f0000000340)="aa9e2df267450c0625fedbb9951dd3d35551c8cb07ad190185d70c9e7706ea135189402723c7107da568286447f61b58eee330dcddaab61411f6b86ed9ba3b4c37ec74a88078ca0ad694970dbd3d739e0d3ce8347f3ebc565bedaf0878e2b6e102adf9691334078a39f8babead66fa0b52a928235a773e15903429b993673947ad0718cf97476bbf2ee81e880df17e54866cf28ecbf81cbe99b00d875fc03f1a372b6130508507c908a40a170d5d9c6c2912cb3941d26fe8c691b6bd4e88f64422b7fd6c9cf8ba14bef0229fcedfba42a9c65340df3a0030dee613662aeb2d52494fb90eee175f63678c7e72", 0xec) syz_genetlink_get_family_id$devlink(&(0x7f0000000440), r0) write$P9_RFSYNC(r2, &(0x7f0000000480)={0x7, 0x33, 0x1}, 0x7) write$P9_RSETATTR(r2, &(0x7f00000004c0)={0x7, 0x1b, 0x2}, 0x7) inotify_rm_watch(r1, 0x0) inotify_init1(0x80800) keyctl$describe(0x6, 0x0, &(0x7f0000000500)=""/143, 0x8f) openat$autofs(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000600)=0x9, &(0x7f0000000640)=0x2) 22:05:44 executing program 0: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000000)=0x3, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x40, 0x86) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f00000000c0)={0x9, 0x2}, 0x2) ioctl$TUNSETLINK(r0, 0x400454cd, 0x555) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000100)=0x1a, &(0x7f0000000140)=0x1) prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x7fff8) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}, {0xc}, {0xc, 0x90, 0xff}}]}, 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000002c0), 0x3, 0xd0003) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000300)=""/25) write$P9_RFSYNC(r0, &(0x7f0000000340)={0x7, 0x33, 0x1}, 0x7) r3 = gettid() r4 = gettid() r5 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0xe2a5, 0x3, &(0x7f0000000640)=[{&(0x7f0000000400)="135180e5335ab6dbbc54c8e248e20fc2cbf36c32b132fc095f26b9d7ff25809ee0db3fea9fd51c03d9eb6009cf3c9eda6af5d99f27f4fd6d090ce28df4748ef7983c4bd96037469a5d4ca0966c2c642ea76e54135637470b84342d95b39b28b9de900b6a89590378157f34b61a9beabe594780203ebc7d66d59bb2a8554af9ab04ac770506ed6297cb8a76be7d6db172bcab57e227e6506f64aca39daba4b37c39625879cb99c78c16baea599551c47a6dc7106b506c5ccb7748a7666d", 0xbd, 0xffff}, {&(0x7f00000004c0)="2220a69d2edd06df94f76ff3f882e980957360b1f96a732f9b6e58d0ae984df7841d447f75a63dbf3335ed3c9c340b34c84297a429fec8b0f460ebe1bd1ce9334c3ecd7555b1be46f058f5d19f5312a1723858cf6b0e37532f6556888790e2011301bb011f14307d5de607641300675a8dda1e9cdb3f9dc301c3713ca80003d8af32284ab959bf2bfce3c1e2bddf363ff30ca424dc8c1ad07fc09ffac436a0aafd003b6cbbcd3b7be78fdf2fe372846149a3334472d760e37d2af42f0ca20cf8e1b51a2d2c4137724f85503adc4c920f566ae37cce0e15c8c94fa52d66757b21907589216e3f8a0d6bca923545", 0xed, 0x101}, {&(0x7f00000005c0)="ba45ac56af5e0daf4a8cdb87a0f67b87c7f023db6897dda4d520127d9a7c55fc875737f7466f742f8a1895f6166f487102c9f39eade02f55f30a5df38baa418ef36a8752da7c45905db280922f05ded4addcae3334c24ace096c5ed45bd87d626f5b928ef20db6154e2560fc", 0x6c, 0x2}], 0x2, &(0x7f00000006c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}, {@shortname_mixed}, {@rodir}, {@shortname_lower}, {@utf8}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/vcs#\x00'}}, {@measure}, {@fowner_gt={'fowner>', 0xee00}}]}) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r5, &(0x7f0000000740)={r0, r2, 0x3f3}) syz_open_dev$vcsn(&(0x7f0000000780), 0x81, 0x8000) syz_open_dev$vcsn(&(0x7f0000000800), 0x100, 0x101100) 22:05:44 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x71, 0x2, {{0x40, 0x0, 0x1}, 0x5}}, 0x18) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x49, 0x2, {0x8, 0x2, 0x3}}, 0x14) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x6d, 0x1}, 0x7) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$9p(r0, &(0x7f0000000100)="bca390dfb2aad74d6f9c27396275f45ae94f6ab4ae4e7ff1f9420e901a91a03c47caed038181e564b1e7124f503a1e7c7b7ecd9d49bfb7a4109df30aa9272cf6a61fa23a1d487a235cc314e3c5a2ca4979242cc62dfa2dabb2ca1cbaf3561e232117b23264d149cfa3ef125f7f7e3edd4f646d9590b5c499afbdf7ae79d177b51ed816e3972bec0d20531a3b2de42de01f02ff85370db8841b9fe741422bd07181127933d744b4b7c71ec6710adcbdba5b48901d670e717b84550f6bdcad29c5fac4d76f2bed0b8d1f035448fc77f6874c0f2f14546e83b68b1be630d51f882c5c2b74f5991ebe", 0xe7) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wg2\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000280)={'syztnl2\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x40, 0x20, 0x8, 0xff, {{0x6, 0x4, 0x2, 0x7, 0x18, 0x65, 0x0, 0x2, 0x29, 0x0, @rand_addr=0x64010101, @empty, {[@noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000380)={'tunl0\x00', &(0x7f00000002c0)={'gretap0\x00', r2, 0x8, 0x40, 0x401, 0xfffff000, {{0x1e, 0x4, 0x0, 0x9, 0x78, 0x64, 0x0, 0x9, 0x4, 0x0, @broadcast, @remote, {[@generic={0x83, 0x7, "9d3f8d3d0b"}, @ssrr={0x89, 0x7, 0xe8, [@remote]}, @timestamp={0x44, 0x10, 0x6f, 0x0, 0x5, [0x400, 0x3, 0x4]}, @timestamp_prespec={0x44, 0x14, 0x63, 0x3, 0xb, [{@empty, 0x8000}, {@local, 0x40}]}, @timestamp={0x44, 0x10, 0xe2, 0x0, 0x6, [0x200, 0x1, 0xfffffffc]}, @rr={0x7, 0x1f, 0x6f, [@local, @multicast2, @multicast2, @multicast1, @remote, @multicast2, @multicast2]}]}}}}}) write$P9_RFSYNC(r0, &(0x7f00000003c0)={0x7, 0x33, 0x1}, 0x7) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_SPLICE={0x1e, 0x3, 0x0, @fd=r0, 0x40, {0x0, r0}, 0x1f, 0xc, 0x1, {0x0, 0x0, r1}}, 0x2cb) r3 = syz_open_dev$vcsn(&(0x7f0000000440), 0x3ff, 0x82000) ioctl$EVIOCGBITSW(r3, 0x80404525, &(0x7f0000000480)=""/55) write$P9_RFSYNC(r3, &(0x7f00000004c0)={0x7, 0x33, 0x2}, 0x7) r4 = syz_open_dev$vcsn(&(0x7f0000000500), 0x9, 0x1ac02) setsockopt$inet_udp_int(r4, 0x11, 0xb, &(0x7f0000000540)=0x3f, 0x4) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000580)={0x14, 0x67, 0x2, {0x0, 0x2, 0x2}}, 0x14) epoll_pwait(r4, &(0x7f00000005c0)=[{}, {}], 0x2, 0x2, &(0x7f0000000600)={[0x7]}, 0x8) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000640)=@IORING_OP_ASYNC_CANCEL={0xe, 0x2, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000680)) 22:05:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x81880004}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@GTPA_TID={0xc, 0x3, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040004}, 0x4008041) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r1, 0x100, 0x70bd27, 0x25dfdbff, {}, [@GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_VERSION={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @multicast2}, @GTPA_FLOW={0x6, 0x6, 0x2}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000c0}, 0x4) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000240)='.pending_reads\x00', 0x101000, 0x48) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000002c0)={0x5, 0x80, 0x1f, 0x1, 0x3, 0x1, 0x0, 0x6, 0xb204, 0x6, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000280), 0x4}, 0x20060, 0x4, 0x1, 0x5, 0x100000000, 0x7, 0x81, 0x0, 0x5, 0x0, 0x4}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000380)) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f00000003c0)) r4 = gettid() syz_open_procfs$namespace(r4, &(0x7f0000000400)='ns/ipc\x00') r5 = socket(0x5, 0x5, 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000000440)={'wg0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000500)={'erspan0\x00', &(0x7f0000000480)={'gre0\x00', r6, 0x8000, 0x7800, 0x6, 0x4, {{0x14, 0x4, 0x2, 0x19, 0x50, 0x67, 0x0, 0x4, 0x4, 0x0, @multicast2, @private=0xa010101, {[@timestamp_addr={0x44, 0x24, 0xb1, 0x1, 0x4, [{@local, 0x9}, {@local, 0x6}, {@remote, 0x8000}, {@multicast2, 0x1}]}, @end, @ssrr={0x89, 0xf, 0xa6, [@remote, @empty, @local]}, @rr={0x7, 0x7, 0xb5, [@multicast2]}]}}}}}) r7 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x11d001, 0x15) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000600)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x5, 0x0, r7, 0x0, &(0x7f0000000580)="88571343deee7402d7333445b4e1e746179fccb95971dd80da361bfe8d1079be5b951d72e1aa4a4f3a70081c3b5754ca067be0309a7db6d3e06c20992269f93849ba536af0dd532cd9af83cf", 0x4c, 0x20, 0x1}, 0x20) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000640)={0x0}, &(0x7f0000000680)=0xc) kcmp$KCMP_EPOLL_TFD(r4, r8, 0x7, r2, &(0x7f00000006c0)={r2, 0xffffffffffffffff, 0x5}) 22:05:44 executing program 5: ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000000)=""/79) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x1, 0x10, 0x4, 0x3, "cd9bd728cdfb87501cabb30f30e546a6195ee3cf4e57ecb72e47dd8745b3039b"}) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f00000000c0)={0x1000, 0xfffffff8, 0x1f, 0x0, 0x0, 0x1}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000009, 0x4000010, 0xffffffffffffffff, 0x8000000) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/5) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x50000000}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x803, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@uname={'uname', 0x3d, ':$'}}, {@loose}, {@nodevmap}, {@aname={'aname', 0x3d, '+@('}}, {@access_any}, {@version_L}, {@access_any}, {@dfltuid}, {@posixacl}, {@cache_none}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@subj_role={'subj_role', 0x3d, '$,&'}}, {@measure}, {@subj_type}, {@smackfsfloor}]}}) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000380)=""/84) write$P9_RREADDIR(r2, &(0x7f0000000400)={0xa6, 0x29, 0x2, {0x7, [{{0x8, 0x2}, 0x6, 0x80, 0x7, './file0'}, {{0x4, 0x2, 0x7}, 0x800, 0x1, 0x7, './file0'}, {{0x10, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x1, 0x4}, 0x4, 0x36, 0x7, './file0'}, {{0x10, 0x1, 0x2}, 0x8, 0x1f, 0x7, './file0'}]}}, 0xa6) r3 = openat$incfs(r0, &(0x7f00000004c0)='.pending_reads\x00', 0x200c00, 0x14c) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000500)=""/178) syz_mount_image$vfat(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3d8a, 0x4, &(0x7f00000008c0)=[{&(0x7f0000000640)="236dbf0f9973e3dc919bd8b5c985a8f696752af745db513fca7506f7bc29f67bcc6effa48b14cbcdefcea1fdd06918cdac00d7f78cffbc67a2d80fbbc5a26fc11fc8026b1ff3be582da142e694869b3547075489a32cc38701666e6244fc7ae676a11ff289b8a3094331b9bacfed5d6eaf5120a3c579a8bb8520399558f0c2936c02ba1d8da3ce229b81096fe7ae52cd7d47faf6290148157f893dc0b0de553b0b1f6d764b6f3e4c7830940db825e4557155afca728cf1e3b768793935f17ce24c34f05f351ef614", 0xc8, 0x2}, {&(0x7f0000000740)="fad75d4a77cf1cb91d54dae0e04b271123069aa9bca6e80c3b59a15d3d3d522820bddb46b6900d369aef7e9d9d90d9b06ea83a8045b804610088f828f8b0d6fc2790b4ce7f893dcff7b30176dd09c291a8ce91667087f3b0acacdd08aaac02cc6832076857b71a95e859e9c8798c93ded048d06542e8bd5f93743ce82ef04de0b66a96cbfca40d63eef7a6ce8f0434db65992d842a38a2f3a8be2cd22a1906f3073afe66c22e9b5e1cca75756e26811581bee4a74e9fc065c88643596a754c73b26d0a25268ac925bc5450304a6402977653b793390182bbd1fc9d1b36", 0xdd, 0x5}, {&(0x7f0000000840)="d4a910423910907dd89f5558d1fcf666dec9", 0x12, 0x7}, {&(0x7f0000000880)="55e0ebca5162bcd27d3a35f2ff49da246cccd22d8c45b270cfa9bc960e4525b266bb64f346247eb28fc9b2a35680405d", 0x30, 0x9}], 0x24041, &(0x7f0000000940)={[{@nonumtail}, {@numtail}, {@utf8}, {@iocharset={'iocharset', 0x3d, 'iso8859-4'}}], [{@obj_user={'obj_user', 0x3d, 'subj_type'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\xfd\'.'}}, {@seclabel}]}) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f00000009c0)={0x7, 0x7}, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000a00)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$EVIOCGLED(r4, 0x80404519, &(0x7f0000000a40)=""/120) ioctl$EVIOCGUNIQ(r3, 0x80404508, &(0x7f0000000ac0)=""/208) [ 154.514669] loop5: detected capacity change from 0 to 30 [ 154.555372] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4106 comm=syz-executor.4 [ 154.571731] loop0: detected capacity change from 0 to 255 [ 154.583395] FAT-fs (loop0): Unrecognized mount option "smackfsroot=/dev/vcs#" or missing value 22:05:45 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x1, 0x2, 0x1}}, 0x14) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000080)=""/78) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000001c0)={0x4, 0x99, &(0x7f0000000100)="98de84c8fc1f3757f657d92a2cafec389481024bd74c10ebb4deddce7a9fc2b3bade12c3563b098db065cff32535da5b4275ab0c97363281046f3c1d227069d58e06e26ac42423b77f5b35964a7d416cb7943c642ac75234bfd0e767b19171f87e874b8afd127ad4332819967e93c4959fe72183de5753db5d0138ceea4f8a974c5bc7d20ddab8a42666859e99a0b44fb6df351782bda5fb2a"}) syz_open_dev$evdev(&(0x7f0000000200), 0x1, 0x10080) write$P9_RSTATu(r0, &(0x7f0000000240)={0x6d, 0x7d, 0x1, {{0x0, 0x58, 0x8, 0x7, {0x10, 0x3, 0x5}, 0x35100000, 0x7, 0x0, 0x5, 0x10, '$&-\\@-},\x01($,,/B}', 0x1, ']', 0x12, '/dev/input/event#\x00', 0x2, '+\''}, 0x0, '', 0xee01, 0xee01, 0xee01}}, 0x6d) write$P9_RVERSION(r0, &(0x7f00000002c0)={0x13, 0x65, 0xffff, 0x6163, 0x6, '9P2000'}, 0x13) syz_open_dev$evdev(&(0x7f0000000300), 0x7, 0x40000) waitid(0x1, 0x0, 0x0, 0x1, 0x0) 22:05:57 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x71, 0x2, {{0x40, 0x0, 0x1}, 0x5}}, 0x18) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x49, 0x2, {0x8, 0x2, 0x3}}, 0x14) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x6d, 0x1}, 0x7) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$9p(r0, &(0x7f0000000100)="bca390dfb2aad74d6f9c27396275f45ae94f6ab4ae4e7ff1f9420e901a91a03c47caed038181e564b1e7124f503a1e7c7b7ecd9d49bfb7a4109df30aa9272cf6a61fa23a1d487a235cc314e3c5a2ca4979242cc62dfa2dabb2ca1cbaf3561e232117b23264d149cfa3ef125f7f7e3edd4f646d9590b5c499afbdf7ae79d177b51ed816e3972bec0d20531a3b2de42de01f02ff85370db8841b9fe741422bd07181127933d744b4b7c71ec6710adcbdba5b48901d670e717b84550f6bdcad29c5fac4d76f2bed0b8d1f035448fc77f6874c0f2f14546e83b68b1be630d51f882c5c2b74f5991ebe", 0xe7) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wg2\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000280)={'syztnl2\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x40, 0x20, 0x8, 0xff, {{0x6, 0x4, 0x2, 0x7, 0x18, 0x65, 0x0, 0x2, 0x29, 0x0, @rand_addr=0x64010101, @empty, {[@noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000380)={'tunl0\x00', &(0x7f00000002c0)={'gretap0\x00', r2, 0x8, 0x40, 0x401, 0xfffff000, {{0x1e, 0x4, 0x0, 0x9, 0x78, 0x64, 0x0, 0x9, 0x4, 0x0, @broadcast, @remote, {[@generic={0x83, 0x7, "9d3f8d3d0b"}, @ssrr={0x89, 0x7, 0xe8, [@remote]}, @timestamp={0x44, 0x10, 0x6f, 0x0, 0x5, [0x400, 0x3, 0x4]}, @timestamp_prespec={0x44, 0x14, 0x63, 0x3, 0xb, [{@empty, 0x8000}, {@local, 0x40}]}, @timestamp={0x44, 0x10, 0xe2, 0x0, 0x6, [0x200, 0x1, 0xfffffffc]}, @rr={0x7, 0x1f, 0x6f, [@local, @multicast2, @multicast2, @multicast1, @remote, @multicast2, @multicast2]}]}}}}}) write$P9_RFSYNC(r0, &(0x7f00000003c0)={0x7, 0x33, 0x1}, 0x7) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_SPLICE={0x1e, 0x3, 0x0, @fd=r0, 0x40, {0x0, r0}, 0x1f, 0xc, 0x1, {0x0, 0x0, r1}}, 0x2cb) r3 = syz_open_dev$vcsn(&(0x7f0000000440), 0x3ff, 0x82000) ioctl$EVIOCGBITSW(r3, 0x80404525, &(0x7f0000000480)=""/55) write$P9_RFSYNC(r3, &(0x7f00000004c0)={0x7, 0x33, 0x2}, 0x7) r4 = syz_open_dev$vcsn(&(0x7f0000000500), 0x9, 0x1ac02) setsockopt$inet_udp_int(r4, 0x11, 0xb, &(0x7f0000000540)=0x3f, 0x4) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000580)={0x14, 0x67, 0x2, {0x0, 0x2, 0x2}}, 0x14) epoll_pwait(r4, &(0x7f00000005c0)=[{}, {}], 0x2, 0x2, &(0x7f0000000600)={[0x7]}, 0x8) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000680)) 22:05:57 executing program 5: ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000000)=""/79) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x1, 0x10, 0x4, 0x3, "cd9bd728cdfb87501cabb30f30e546a6195ee3cf4e57ecb72e47dd8745b3039b"}) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f00000000c0)={0x1000, 0xfffffff8, 0x1f, 0x0, 0x0, 0x1}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000009, 0x4000010, 0xffffffffffffffff, 0x8000000) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/5) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x50000000}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x803, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@uname={'uname', 0x3d, ':$'}}, {@loose}, {@nodevmap}, {@aname={'aname', 0x3d, '+@('}}, {@access_any}, {@version_L}, {@access_any}, {@dfltuid}, {@posixacl}, {@cache_none}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@subj_role={'subj_role', 0x3d, '$,&'}}, {@measure}, {@subj_type}, {@smackfsfloor}]}}) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000380)=""/84) write$P9_RREADDIR(r2, &(0x7f0000000400)={0xa6, 0x29, 0x2, {0x7, [{{0x8, 0x2}, 0x6, 0x80, 0x7, './file0'}, {{0x4, 0x2, 0x7}, 0x800, 0x1, 0x7, './file0'}, {{0x10, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x1, 0x4}, 0x4, 0x36, 0x7, './file0'}, {{0x10, 0x1, 0x2}, 0x8, 0x1f, 0x7, './file0'}]}}, 0xa6) r3 = openat$incfs(r0, &(0x7f00000004c0)='.pending_reads\x00', 0x200c00, 0x14c) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000500)=""/178) syz_mount_image$vfat(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3d8a, 0x4, &(0x7f00000008c0)=[{&(0x7f0000000640)="236dbf0f9973e3dc919bd8b5c985a8f696752af745db513fca7506f7bc29f67bcc6effa48b14cbcdefcea1fdd06918cdac00d7f78cffbc67a2d80fbbc5a26fc11fc8026b1ff3be582da142e694869b3547075489a32cc38701666e6244fc7ae676a11ff289b8a3094331b9bacfed5d6eaf5120a3c579a8bb8520399558f0c2936c02ba1d8da3ce229b81096fe7ae52cd7d47faf6290148157f893dc0b0de553b0b1f6d764b6f3e4c7830940db825e4557155afca728cf1e3b768793935f17ce24c34f05f351ef614", 0xc8, 0x2}, {&(0x7f0000000740)="fad75d4a77cf1cb91d54dae0e04b271123069aa9bca6e80c3b59a15d3d3d522820bddb46b6900d369aef7e9d9d90d9b06ea83a8045b804610088f828f8b0d6fc2790b4ce7f893dcff7b30176dd09c291a8ce91667087f3b0acacdd08aaac02cc6832076857b71a95e859e9c8798c93ded048d06542e8bd5f93743ce82ef04de0b66a96cbfca40d63eef7a6ce8f0434db65992d842a38a2f3a8be2cd22a1906f3073afe66c22e9b5e1cca75756e26811581bee4a74e9fc065c88643596a754c73b26d0a25268ac925bc5450304a6402977653b793390182bbd1fc9d1b36", 0xdd, 0x5}, {&(0x7f0000000840)="d4a910423910907dd89f5558d1fcf666dec9", 0x12, 0x7}, {&(0x7f0000000880)="55e0ebca5162bcd27d3a35f2ff49da246cccd22d8c45b270cfa9bc960e4525b266bb64f346247eb28fc9b2a35680405d", 0x30, 0x9}], 0x24041, &(0x7f0000000940)={[{@nonumtail}, {@numtail}, {@utf8}, {@iocharset={'iocharset', 0x3d, 'iso8859-4'}}], [{@obj_user={'obj_user', 0x3d, 'subj_type'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\xfd\'.'}}, {@seclabel}]}) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f00000009c0)={0x7, 0x7}, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000a00)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$EVIOCGLED(r4, 0x80404519, &(0x7f0000000a40)=""/120) 22:05:57 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000000)=0x80, 0x1) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x2, 0x80010, 0xffffffffffffffff, 0x8000000) r2 = mmap$IORING_OFF_SQES(&(0x7f0000eeb000/0x1000)=nil, 0x1000, 0x2000002, 0x100010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_CLOSE={0x13, 0x4, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x307cbdc9) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.log\x00', 0x0, 0x50) setsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f00000000c0)=0x1, 0x4) io_uring_setup(0x7f90, &(0x7f0000000100)={0x0, 0x333, 0x20, 0x3, 0x3e8, 0x0, r3}) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff}, 0x84000) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f00000001c0)={0x2000}) socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = syz_open_dev$vcsn(&(0x7f0000000200), 0x4, 0x250301) openat$incfs(r5, &(0x7f0000000240)='.log\x00', 0x80000, 0x100) r6 = epoll_create(0xfff) epoll_pwait(r6, &(0x7f0000000280)=[{}, {}], 0x2, 0x1f, &(0x7f00000002c0)={[0xa8da]}, 0x8) syz_open_dev$vcsn(&(0x7f0000000300), 0x5, 0x20000) syz_genetlink_get_family_id$devlink(&(0x7f00000003c0), r5) 22:05:57 executing program 7: write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x79, 0x1}, 0x7) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x49, 0x1, {0x52, 0x0, 0x6}}, 0x14) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x79, 0x1}, 0x7) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) write$P9_RRENAME(r0, &(0x7f0000000100)={0x7, 0x15, 0x1}, 0x7) r1 = syz_open_dev$vcsn(&(0x7f0000000140), 0x92a, 0x4442) write$P9_RCLUNK(r1, &(0x7f0000000180)={0x7, 0x79, 0x1}, 0x7) write$P9_RGETATTR(r0, &(0x7f00000001c0)={0xa0, 0x19, 0x2, {0x28, {0x10, 0x3, 0x1}, 0x20, 0xee00, 0xee00, 0x5, 0x631, 0xffff, 0x3, 0x1, 0x81a1, 0x0, 0x3, 0x10000, 0x0, 0xfff, 0x401, 0x2, 0x3a, 0xffffffff}}, 0xa0) write$P9_RVERSION(r1, &(0x7f0000000280)={0x13, 0x65, 0xffff, 0x1, 0x6, '9P2000'}, 0x13) pipe2$9p(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSYMLINK(r2, &(0x7f0000000300)={0x14, 0x11, 0x1, {0x2, 0x3, 0x5}}, 0x14) write$9p(r1, &(0x7f0000000340)="aa9e2df267450c0625fedbb9951dd3d35551c8cb07ad190185d70c9e7706ea135189402723c7107da568286447f61b58eee330dcddaab61411f6b86ed9ba3b4c37ec74a88078ca0ad694970dbd3d739e0d3ce8347f3ebc565bedaf0878e2b6e102adf9691334078a39f8babead66fa0b52a928235a773e15903429b993673947ad0718cf97476bbf2ee81e880df17e54866cf28ecbf81cbe99b00d875fc03f1a372b6130508507c908a40a170d5d9c6c2912cb3941d26fe8c691b6bd4e88f64422b7fd6c9cf8ba14bef0229fcedfba42a9c65340df3a0030dee613662aeb2d52494fb90eee175f63678c7e72", 0xec) syz_genetlink_get_family_id$devlink(&(0x7f0000000440), r0) write$P9_RFSYNC(r2, &(0x7f0000000480)={0x7, 0x33, 0x1}, 0x7) write$P9_RSETATTR(r2, &(0x7f00000004c0)={0x7, 0x1b, 0x2}, 0x7) inotify_rm_watch(r1, 0x0) inotify_init1(0x80800) keyctl$describe(0x6, 0x0, &(0x7f0000000500)=""/143, 0x8f) openat$autofs(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) 22:05:57 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x800, 0x311800) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000040)=0x8, 0x4) prctl$PR_MCE_KILL_GET(0x22) prctl$PR_MCE_KILL_GET(0x22) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000100)) ioctl$TUNSETOWNER(r1, 0x400454cc, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140), 0x4, 0x1a5201) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) rt_sigqueueinfo(0x0, 0x1b, &(0x7f0000000180)={0x36, 0x2, 0x10}) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000200)={0x5, 0x80}, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000240), 0xff, 0x44200) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000280)={0x40000004}) openat$incfs(r3, &(0x7f00000002c0)='.pending_reads\x00', 0x42000, 0x119) epoll_pwait2(r5, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, &(0x7f0000000400), &(0x7f0000000440)={[0x4]}, 0x8) 22:05:57 executing program 0: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000000)=0x3, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x40, 0x86) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f00000000c0)={0x9, 0x2}, 0x2) ioctl$TUNSETLINK(r0, 0x400454cd, 0x555) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000100)=0x1a, &(0x7f0000000140)=0x1) prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x7fff8) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}, {0xc}, {0xc, 0x90, 0xff}}]}, 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000002c0), 0x3, 0xd0003) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000300)=""/25) write$P9_RFSYNC(r0, &(0x7f0000000340)={0x7, 0x33, 0x1}, 0x7) r3 = gettid() r4 = gettid() r5 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0xe2a5, 0x3, &(0x7f0000000640)=[{&(0x7f0000000400)="135180e5335ab6dbbc54c8e248e20fc2cbf36c32b132fc095f26b9d7ff25809ee0db3fea9fd51c03d9eb6009cf3c9eda6af5d99f27f4fd6d090ce28df4748ef7983c4bd96037469a5d4ca0966c2c642ea76e54135637470b84342d95b39b28b9de900b6a89590378157f34b61a9beabe594780203ebc7d66d59bb2a8554af9ab04ac770506ed6297cb8a76be7d6db172bcab57e227e6506f64aca39daba4b37c39625879cb99c78c16baea599551c47a6dc7106b506c5ccb7748a7666d", 0xbd, 0xffff}, {&(0x7f00000004c0)="2220a69d2edd06df94f76ff3f882e980957360b1f96a732f9b6e58d0ae984df7841d447f75a63dbf3335ed3c9c340b34c84297a429fec8b0f460ebe1bd1ce9334c3ecd7555b1be46f058f5d19f5312a1723858cf6b0e37532f6556888790e2011301bb011f14307d5de607641300675a8dda1e9cdb3f9dc301c3713ca80003d8af32284ab959bf2bfce3c1e2bddf363ff30ca424dc8c1ad07fc09ffac436a0aafd003b6cbbcd3b7be78fdf2fe372846149a3334472d760e37d2af42f0ca20cf8e1b51a2d2c4137724f85503adc4c920f566ae37cce0e15c8c94fa52d66757b21907589216e3f8a0d6bca923545", 0xed, 0x101}, {&(0x7f00000005c0)="ba45ac56af5e0daf4a8cdb87a0f67b87c7f023db6897dda4d520127d9a7c55fc875737f7466f742f8a1895f6166f487102c9f39eade02f55f30a5df38baa418ef36a8752da7c45905db280922f05ded4addcae3334c24ace096c5ed45bd87d626f5b928ef20db6154e2560fc", 0x6c, 0x2}], 0x2, &(0x7f00000006c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}, {@shortname_mixed}, {@rodir}, {@shortname_lower}, {@utf8}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/vcs#\x00'}}, {@measure}, {@fowner_gt={'fowner>', 0xee00}}]}) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r5, &(0x7f0000000740)={r0, r2, 0x3f3}) syz_open_dev$vcsn(&(0x7f0000000800), 0x100, 0x101100) 22:05:57 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x1, 0x2, 0x1}}, 0x14) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000080)=""/78) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000001c0)={0x4, 0x99, &(0x7f0000000100)="98de84c8fc1f3757f657d92a2cafec389481024bd74c10ebb4deddce7a9fc2b3bade12c3563b098db065cff32535da5b4275ab0c97363281046f3c1d227069d58e06e26ac42423b77f5b35964a7d416cb7943c642ac75234bfd0e767b19171f87e874b8afd127ad4332819967e93c4959fe72183de5753db5d0138ceea4f8a974c5bc7d20ddab8a42666859e99a0b44fb6df351782bda5fb2a"}) syz_open_dev$evdev(&(0x7f0000000200), 0x1, 0x10080) write$P9_RSTATu(r0, &(0x7f0000000240)={0x6d, 0x7d, 0x1, {{0x0, 0x58, 0x8, 0x7, {0x10, 0x3, 0x5}, 0x35100000, 0x7, 0x0, 0x5, 0x10, '$&-\\@-},\x01($,,/B}', 0x1, ']', 0x12, '/dev/input/event#\x00', 0x2, '+\''}, 0x0, '', 0xee01, 0xee01, 0xee01}}, 0x6d) write$P9_RVERSION(r0, &(0x7f00000002c0)={0x13, 0x65, 0xffff, 0x6163, 0x6, '9P2000'}, 0x13) waitid(0x1, 0x0, 0x0, 0x1, 0x0) 22:05:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x81880004}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@GTPA_TID={0xc, 0x3, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040004}, 0x4008041) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r1, 0x100, 0x70bd27, 0x25dfdbff, {}, [@GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_VERSION={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @multicast2}, @GTPA_FLOW={0x6, 0x6, 0x2}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000c0}, 0x4) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000240)='.pending_reads\x00', 0x101000, 0x48) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000002c0)={0x5, 0x80, 0x1f, 0x1, 0x3, 0x1, 0x0, 0x6, 0xb204, 0x6, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000280), 0x4}, 0x20060, 0x4, 0x1, 0x5, 0x100000000, 0x7, 0x81, 0x0, 0x5, 0x0, 0x4}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000380)) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f00000003c0)) r4 = gettid() syz_open_procfs$namespace(r4, &(0x7f0000000400)='ns/ipc\x00') r5 = socket(0x5, 0x5, 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000000440)={'wg0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000500)={'erspan0\x00', &(0x7f0000000480)={'gre0\x00', r6, 0x8000, 0x7800, 0x6, 0x4, {{0x14, 0x4, 0x2, 0x19, 0x50, 0x67, 0x0, 0x4, 0x4, 0x0, @multicast2, @private=0xa010101, {[@timestamp_addr={0x44, 0x24, 0xb1, 0x1, 0x4, [{@local, 0x9}, {@local, 0x6}, {@remote, 0x8000}, {@multicast2, 0x1}]}, @end, @ssrr={0x89, 0xf, 0xa6, [@remote, @empty, @local]}, @rr={0x7, 0x7, 0xb5, [@multicast2]}]}}}}}) r7 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x11d001, 0x15) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000600)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x5, 0x0, r7, 0x0, &(0x7f0000000580)="88571343deee7402d7333445b4e1e746179fccb95971dd80da361bfe8d1079be5b951d72e1aa4a4f3a70081c3b5754ca067be0309a7db6d3e06c20992269f93849ba536af0dd532cd9af83cf", 0x4c, 0x20, 0x1}, 0x20) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000640)={0x0}, &(0x7f0000000680)=0xc) kcmp$KCMP_EPOLL_TFD(r4, r8, 0x7, r2, &(0x7f00000006c0)={r2, 0xffffffffffffffff, 0x5}) [ 167.495632] loop5: detected capacity change from 0 to 30 [ 167.540983] loop0: detected capacity change from 0 to 255 [ 167.555361] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4141 comm=syz-executor.4 [ 167.563100] FAT-fs (loop0): Unrecognized mount option "smackfsroot=/dev/vcs#" or missing value 22:05:58 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x1, 0x2, 0x1}}, 0x14) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000080)=""/78) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000001c0)={0x4, 0x99, &(0x7f0000000100)="98de84c8fc1f3757f657d92a2cafec389481024bd74c10ebb4deddce7a9fc2b3bade12c3563b098db065cff32535da5b4275ab0c97363281046f3c1d227069d58e06e26ac42423b77f5b35964a7d416cb7943c642ac75234bfd0e767b19171f87e874b8afd127ad4332819967e93c4959fe72183de5753db5d0138ceea4f8a974c5bc7d20ddab8a42666859e99a0b44fb6df351782bda5fb2a"}) syz_open_dev$evdev(&(0x7f0000000200), 0x1, 0x10080) write$P9_RSTATu(r0, &(0x7f0000000240)={0x6d, 0x7d, 0x1, {{0x0, 0x58, 0x8, 0x7, {0x10, 0x3, 0x5}, 0x35100000, 0x7, 0x0, 0x5, 0x10, '$&-\\@-},\x01($,,/B}', 0x1, ']', 0x12, '/dev/input/event#\x00', 0x2, '+\''}, 0x0, '', 0xee01, 0xee01, 0xee01}}, 0x6d) waitid(0x1, 0x0, 0x0, 0x1, 0x0) 22:05:58 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x800, 0x311800) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000040)=0x8, 0x4) prctl$PR_MCE_KILL_GET(0x22) prctl$PR_MCE_KILL_GET(0x22) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000100)) ioctl$TUNSETOWNER(r1, 0x400454cc, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140), 0x4, 0x1a5201) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) rt_sigqueueinfo(0x0, 0x1b, &(0x7f0000000180)={0x36, 0x2, 0x10}) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000200)={0x5, 0x80}, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000240), 0xff, 0x44200) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000280)={0x40000004}) epoll_pwait2(r5, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, &(0x7f0000000400), &(0x7f0000000440)={[0x4]}, 0x8) 22:05:58 executing program 5: ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000000)=""/79) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x1, 0x10, 0x4, 0x3, "cd9bd728cdfb87501cabb30f30e546a6195ee3cf4e57ecb72e47dd8745b3039b"}) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f00000000c0)={0x1000, 0xfffffff8, 0x1f, 0x0, 0x0, 0x1}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000009, 0x4000010, 0xffffffffffffffff, 0x8000000) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/5) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x50000000}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x803, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@uname={'uname', 0x3d, ':$'}}, {@loose}, {@nodevmap}, {@aname={'aname', 0x3d, '+@('}}, {@access_any}, {@version_L}, {@access_any}, {@dfltuid}, {@posixacl}, {@cache_none}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@subj_role={'subj_role', 0x3d, '$,&'}}, {@measure}, {@subj_type}, {@smackfsfloor}]}}) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000380)=""/84) write$P9_RREADDIR(r2, &(0x7f0000000400)={0xa6, 0x29, 0x2, {0x7, [{{0x8, 0x2}, 0x6, 0x80, 0x7, './file0'}, {{0x4, 0x2, 0x7}, 0x800, 0x1, 0x7, './file0'}, {{0x10, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x1, 0x4}, 0x4, 0x36, 0x7, './file0'}, {{0x10, 0x1, 0x2}, 0x8, 0x1f, 0x7, './file0'}]}}, 0xa6) r3 = openat$incfs(r0, &(0x7f00000004c0)='.pending_reads\x00', 0x200c00, 0x14c) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000500)=""/178) syz_mount_image$vfat(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3d8a, 0x4, &(0x7f00000008c0)=[{&(0x7f0000000640)="236dbf0f9973e3dc919bd8b5c985a8f696752af745db513fca7506f7bc29f67bcc6effa48b14cbcdefcea1fdd06918cdac00d7f78cffbc67a2d80fbbc5a26fc11fc8026b1ff3be582da142e694869b3547075489a32cc38701666e6244fc7ae676a11ff289b8a3094331b9bacfed5d6eaf5120a3c579a8bb8520399558f0c2936c02ba1d8da3ce229b81096fe7ae52cd7d47faf6290148157f893dc0b0de553b0b1f6d764b6f3e4c7830940db825e4557155afca728cf1e3b768793935f17ce24c34f05f351ef614", 0xc8, 0x2}, {&(0x7f0000000740)="fad75d4a77cf1cb91d54dae0e04b271123069aa9bca6e80c3b59a15d3d3d522820bddb46b6900d369aef7e9d9d90d9b06ea83a8045b804610088f828f8b0d6fc2790b4ce7f893dcff7b30176dd09c291a8ce91667087f3b0acacdd08aaac02cc6832076857b71a95e859e9c8798c93ded048d06542e8bd5f93743ce82ef04de0b66a96cbfca40d63eef7a6ce8f0434db65992d842a38a2f3a8be2cd22a1906f3073afe66c22e9b5e1cca75756e26811581bee4a74e9fc065c88643596a754c73b26d0a25268ac925bc5450304a6402977653b793390182bbd1fc9d1b36", 0xdd, 0x5}, {&(0x7f0000000840)="d4a910423910907dd89f5558d1fcf666dec9", 0x12, 0x7}, {&(0x7f0000000880)="55e0ebca5162bcd27d3a35f2ff49da246cccd22d8c45b270cfa9bc960e4525b266bb64f346247eb28fc9b2a35680405d", 0x30, 0x9}], 0x24041, &(0x7f0000000940)={[{@nonumtail}, {@numtail}, {@utf8}, {@iocharset={'iocharset', 0x3d, 'iso8859-4'}}], [{@obj_user={'obj_user', 0x3d, 'subj_type'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\xfd\'.'}}, {@seclabel}]}) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f00000009c0)={0x7, 0x7}, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000a00)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) 22:05:58 executing program 0: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000000)=0x3, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x40, 0x86) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f00000000c0)={0x9, 0x2}, 0x2) ioctl$TUNSETLINK(r0, 0x400454cd, 0x555) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000100)=0x1a, &(0x7f0000000140)=0x1) prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x7fff8) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}, {0xc}, {0xc, 0x90, 0xff}}]}, 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000002c0), 0x3, 0xd0003) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000300)=""/25) write$P9_RFSYNC(r0, &(0x7f0000000340)={0x7, 0x33, 0x1}, 0x7) r3 = gettid() r4 = gettid() r5 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0xe2a5, 0x3, &(0x7f0000000640)=[{&(0x7f0000000400)="135180e5335ab6dbbc54c8e248e20fc2cbf36c32b132fc095f26b9d7ff25809ee0db3fea9fd51c03d9eb6009cf3c9eda6af5d99f27f4fd6d090ce28df4748ef7983c4bd96037469a5d4ca0966c2c642ea76e54135637470b84342d95b39b28b9de900b6a89590378157f34b61a9beabe594780203ebc7d66d59bb2a8554af9ab04ac770506ed6297cb8a76be7d6db172bcab57e227e6506f64aca39daba4b37c39625879cb99c78c16baea599551c47a6dc7106b506c5ccb7748a7666d", 0xbd, 0xffff}, {&(0x7f00000004c0)="2220a69d2edd06df94f76ff3f882e980957360b1f96a732f9b6e58d0ae984df7841d447f75a63dbf3335ed3c9c340b34c84297a429fec8b0f460ebe1bd1ce9334c3ecd7555b1be46f058f5d19f5312a1723858cf6b0e37532f6556888790e2011301bb011f14307d5de607641300675a8dda1e9cdb3f9dc301c3713ca80003d8af32284ab959bf2bfce3c1e2bddf363ff30ca424dc8c1ad07fc09ffac436a0aafd003b6cbbcd3b7be78fdf2fe372846149a3334472d760e37d2af42f0ca20cf8e1b51a2d2c4137724f85503adc4c920f566ae37cce0e15c8c94fa52d66757b21907589216e3f8a0d6bca923545", 0xed, 0x101}, {&(0x7f00000005c0)="ba45ac56af5e0daf4a8cdb87a0f67b87c7f023db6897dda4d520127d9a7c55fc875737f7466f742f8a1895f6166f487102c9f39eade02f55f30a5df38baa418ef36a8752da7c45905db280922f05ded4addcae3334c24ace096c5ed45bd87d626f5b928ef20db6154e2560fc", 0x6c, 0x2}], 0x2, &(0x7f00000006c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}, {@shortname_mixed}, {@rodir}, {@shortname_lower}, {@utf8}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/vcs#\x00'}}, {@measure}, {@fowner_gt={'fowner>', 0xee00}}]}) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r5, &(0x7f0000000740)={r0, r2, 0x3f3}) syz_open_dev$vcsn(&(0x7f0000000800), 0x100, 0x101100) [ 167.864429] loop0: detected capacity change from 0 to 255 [ 167.885602] FAT-fs (loop0): Unrecognized mount option "smackfsroot=/dev/vcs#" or missing value 22:05:58 executing program 7: write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x79, 0x1}, 0x7) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x49, 0x1, {0x52, 0x0, 0x6}}, 0x14) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x79, 0x1}, 0x7) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) write$P9_RRENAME(r0, &(0x7f0000000100)={0x7, 0x15, 0x1}, 0x7) r1 = syz_open_dev$vcsn(&(0x7f0000000140), 0x92a, 0x4442) write$P9_RCLUNK(r1, &(0x7f0000000180)={0x7, 0x79, 0x1}, 0x7) write$P9_RGETATTR(r0, &(0x7f00000001c0)={0xa0, 0x19, 0x2, {0x28, {0x10, 0x3, 0x1}, 0x20, 0xee00, 0xee00, 0x5, 0x631, 0xffff, 0x3, 0x1, 0x81a1, 0x0, 0x3, 0x10000, 0x0, 0xfff, 0x401, 0x2, 0x3a, 0xffffffff}}, 0xa0) write$P9_RVERSION(r1, &(0x7f0000000280)={0x13, 0x65, 0xffff, 0x1, 0x6, '9P2000'}, 0x13) pipe2$9p(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSYMLINK(r2, &(0x7f0000000300)={0x14, 0x11, 0x1, {0x2, 0x3, 0x5}}, 0x14) write$9p(r1, &(0x7f0000000340)="aa9e2df267450c0625fedbb9951dd3d35551c8cb07ad190185d70c9e7706ea135189402723c7107da568286447f61b58eee330dcddaab61411f6b86ed9ba3b4c37ec74a88078ca0ad694970dbd3d739e0d3ce8347f3ebc565bedaf0878e2b6e102adf9691334078a39f8babead66fa0b52a928235a773e15903429b993673947ad0718cf97476bbf2ee81e880df17e54866cf28ecbf81cbe99b00d875fc03f1a372b6130508507c908a40a170d5d9c6c2912cb3941d26fe8c691b6bd4e88f64422b7fd6c9cf8ba14bef0229fcedfba42a9c65340df3a0030dee613662aeb2d52494fb90eee175f63678c7e72", 0xec) syz_genetlink_get_family_id$devlink(&(0x7f0000000440), r0) write$P9_RFSYNC(r2, &(0x7f0000000480)={0x7, 0x33, 0x1}, 0x7) write$P9_RSETATTR(r2, &(0x7f00000004c0)={0x7, 0x1b, 0x2}, 0x7) inotify_rm_watch(r1, 0x0) inotify_init1(0x80800) openat$autofs(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) 22:05:58 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x1, 0x2, 0x1}}, 0x14) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000080)=""/78) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000001c0)={0x4, 0x99, &(0x7f0000000100)="98de84c8fc1f3757f657d92a2cafec389481024bd74c10ebb4deddce7a9fc2b3bade12c3563b098db065cff32535da5b4275ab0c97363281046f3c1d227069d58e06e26ac42423b77f5b35964a7d416cb7943c642ac75234bfd0e767b19171f87e874b8afd127ad4332819967e93c4959fe72183de5753db5d0138ceea4f8a974c5bc7d20ddab8a42666859e99a0b44fb6df351782bda5fb2a"}) syz_open_dev$evdev(&(0x7f0000000200), 0x1, 0x10080) waitid(0x1, 0x0, 0x0, 0x1, 0x0) [ 167.893232] loop5: detected capacity change from 0 to 30 22:05:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x81880004}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@GTPA_TID={0xc, 0x3, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040004}, 0x4008041) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r1, 0x100, 0x70bd27, 0x25dfdbff, {}, [@GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_VERSION={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @multicast2}, @GTPA_FLOW={0x6, 0x6, 0x2}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000c0}, 0x4) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000240)='.pending_reads\x00', 0x101000, 0x48) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000002c0)={0x5, 0x80, 0x1f, 0x1, 0x3, 0x1, 0x0, 0x6, 0xb204, 0x6, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000280), 0x4}, 0x20060, 0x4, 0x1, 0x5, 0x100000000, 0x7, 0x81, 0x0, 0x5, 0x0, 0x4}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000380)) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f00000003c0)) r4 = gettid() syz_open_procfs$namespace(r4, &(0x7f0000000400)='ns/ipc\x00') r5 = socket(0x5, 0x5, 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000000440)={'wg0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000500)={'erspan0\x00', &(0x7f0000000480)={'gre0\x00', r6, 0x8000, 0x7800, 0x6, 0x4, {{0x14, 0x4, 0x2, 0x19, 0x50, 0x67, 0x0, 0x4, 0x4, 0x0, @multicast2, @private=0xa010101, {[@timestamp_addr={0x44, 0x24, 0xb1, 0x1, 0x4, [{@local, 0x9}, {@local, 0x6}, {@remote, 0x8000}, {@multicast2, 0x1}]}, @end, @ssrr={0x89, 0xf, 0xa6, [@remote, @empty, @local]}, @rr={0x7, 0x7, 0xb5, [@multicast2]}]}}}}}) r7 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x11d001, 0x15) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000600)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x5, 0x0, r7, 0x0, &(0x7f0000000580)="88571343deee7402d7333445b4e1e746179fccb95971dd80da361bfe8d1079be5b951d72e1aa4a4f3a70081c3b5754ca067be0309a7db6d3e06c20992269f93849ba536af0dd532cd9af83cf", 0x4c, 0x20, 0x1}, 0x20) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000640)={0x0}, &(0x7f0000000680)=0xc) kcmp$KCMP_EPOLL_TFD(r4, r8, 0x7, r2, &(0x7f00000006c0)={r2, 0xffffffffffffffff, 0x5}) 22:05:58 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x800, 0x311800) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000040)=0x8, 0x4) prctl$PR_MCE_KILL_GET(0x22) prctl$PR_MCE_KILL_GET(0x22) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000100)) ioctl$TUNSETOWNER(r1, 0x400454cc, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000140), 0x4, 0x1a5201) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) rt_sigqueueinfo(0x0, 0x1b, &(0x7f0000000180)={0x36, 0x2, 0x10}) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000200)={0x5, 0x80}, 0x2) r4 = syz_open_dev$vcsn(&(0x7f0000000240), 0xff, 0x44200) epoll_pwait2(r4, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, &(0x7f0000000400), &(0x7f0000000440)={[0x4]}, 0x8) [ 168.113886] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4167 comm=syz-executor.4 22:05:58 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x71, 0x2, {{0x40, 0x0, 0x1}, 0x5}}, 0x18) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x49, 0x2, {0x8, 0x2, 0x3}}, 0x14) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x6d, 0x1}, 0x7) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$9p(r0, &(0x7f0000000100)="bca390dfb2aad74d6f9c27396275f45ae94f6ab4ae4e7ff1f9420e901a91a03c47caed038181e564b1e7124f503a1e7c7b7ecd9d49bfb7a4109df30aa9272cf6a61fa23a1d487a235cc314e3c5a2ca4979242cc62dfa2dabb2ca1cbaf3561e232117b23264d149cfa3ef125f7f7e3edd4f646d9590b5c499afbdf7ae79d177b51ed816e3972bec0d20531a3b2de42de01f02ff85370db8841b9fe741422bd07181127933d744b4b7c71ec6710adcbdba5b48901d670e717b84550f6bdcad29c5fac4d76f2bed0b8d1f035448fc77f6874c0f2f14546e83b68b1be630d51f882c5c2b74f5991ebe", 0xe7) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wg2\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000280)={'syztnl2\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x40, 0x20, 0x8, 0xff, {{0x6, 0x4, 0x2, 0x7, 0x18, 0x65, 0x0, 0x2, 0x29, 0x0, @rand_addr=0x64010101, @empty, {[@noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000380)={'tunl0\x00', &(0x7f00000002c0)={'gretap0\x00', r2, 0x8, 0x40, 0x401, 0xfffff000, {{0x1e, 0x4, 0x0, 0x9, 0x78, 0x64, 0x0, 0x9, 0x4, 0x0, @broadcast, @remote, {[@generic={0x83, 0x7, "9d3f8d3d0b"}, @ssrr={0x89, 0x7, 0xe8, [@remote]}, @timestamp={0x44, 0x10, 0x6f, 0x0, 0x5, [0x400, 0x3, 0x4]}, @timestamp_prespec={0x44, 0x14, 0x63, 0x3, 0xb, [{@empty, 0x8000}, {@local, 0x40}]}, @timestamp={0x44, 0x10, 0xe2, 0x0, 0x6, [0x200, 0x1, 0xfffffffc]}, @rr={0x7, 0x1f, 0x6f, [@local, @multicast2, @multicast2, @multicast1, @remote, @multicast2, @multicast2]}]}}}}}) write$P9_RFSYNC(r0, &(0x7f00000003c0)={0x7, 0x33, 0x1}, 0x7) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_SPLICE={0x1e, 0x3, 0x0, @fd=r0, 0x40, {0x0, r0}, 0x1f, 0xc, 0x1, {0x0, 0x0, r1}}, 0x2cb) r3 = syz_open_dev$vcsn(&(0x7f0000000440), 0x3ff, 0x82000) ioctl$EVIOCGBITSW(r3, 0x80404525, &(0x7f0000000480)=""/55) write$P9_RFSYNC(r3, &(0x7f00000004c0)={0x7, 0x33, 0x2}, 0x7) r4 = syz_open_dev$vcsn(&(0x7f0000000500), 0x9, 0x1ac02) setsockopt$inet_udp_int(r4, 0x11, 0xb, &(0x7f0000000540)=0x3f, 0x4) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000580)={0x14, 0x67, 0x2, {0x0, 0x2, 0x2}}, 0x14) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000680)) 22:05:58 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000000)=0x80, 0x1) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x2, 0x80010, 0xffffffffffffffff, 0x8000000) r2 = mmap$IORING_OFF_SQES(&(0x7f0000eeb000/0x1000)=nil, 0x1000, 0x2000002, 0x100010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_CLOSE={0x13, 0x4, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x307cbdc9) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.log\x00', 0x0, 0x50) setsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f00000000c0)=0x1, 0x4) io_uring_setup(0x7f90, &(0x7f0000000100)={0x0, 0x333, 0x20, 0x3, 0x3e8, 0x0, r3}) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff}, 0x84000) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f00000001c0)={0x2000}) socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = syz_open_dev$vcsn(&(0x7f0000000200), 0x4, 0x250301) openat$incfs(r5, &(0x7f0000000240)='.log\x00', 0x80000, 0x100) r6 = epoll_create(0xfff) epoll_pwait(r6, &(0x7f0000000280)=[{}, {}], 0x2, 0x1f, &(0x7f00000002c0)={[0xa8da]}, 0x8) syz_open_dev$vcsn(&(0x7f0000000300), 0x5, 0x20000) syz_genetlink_get_family_id$devlink(&(0x7f00000003c0), r5) 22:05:58 executing program 0: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000000)=0x3, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x40, 0x86) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f00000000c0)={0x9, 0x2}, 0x2) ioctl$TUNSETLINK(r0, 0x400454cd, 0x555) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000100)=0x1a, &(0x7f0000000140)=0x1) prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x7fff8) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}, {0xc}, {0xc, 0x90, 0xff}}]}, 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000002c0), 0x3, 0xd0003) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000300)=""/25) write$P9_RFSYNC(r0, &(0x7f0000000340)={0x7, 0x33, 0x1}, 0x7) r3 = gettid() r4 = gettid() r5 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0xe2a5, 0x3, &(0x7f0000000640)=[{&(0x7f0000000400)="135180e5335ab6dbbc54c8e248e20fc2cbf36c32b132fc095f26b9d7ff25809ee0db3fea9fd51c03d9eb6009cf3c9eda6af5d99f27f4fd6d090ce28df4748ef7983c4bd96037469a5d4ca0966c2c642ea76e54135637470b84342d95b39b28b9de900b6a89590378157f34b61a9beabe594780203ebc7d66d59bb2a8554af9ab04ac770506ed6297cb8a76be7d6db172bcab57e227e6506f64aca39daba4b37c39625879cb99c78c16baea599551c47a6dc7106b506c5ccb7748a7666d", 0xbd, 0xffff}, {&(0x7f00000004c0)="2220a69d2edd06df94f76ff3f882e980957360b1f96a732f9b6e58d0ae984df7841d447f75a63dbf3335ed3c9c340b34c84297a429fec8b0f460ebe1bd1ce9334c3ecd7555b1be46f058f5d19f5312a1723858cf6b0e37532f6556888790e2011301bb011f14307d5de607641300675a8dda1e9cdb3f9dc301c3713ca80003d8af32284ab959bf2bfce3c1e2bddf363ff30ca424dc8c1ad07fc09ffac436a0aafd003b6cbbcd3b7be78fdf2fe372846149a3334472d760e37d2af42f0ca20cf8e1b51a2d2c4137724f85503adc4c920f566ae37cce0e15c8c94fa52d66757b21907589216e3f8a0d6bca923545", 0xed, 0x101}, {&(0x7f00000005c0)="ba45ac56af5e0daf4a8cdb87a0f67b87c7f023db6897dda4d520127d9a7c55fc875737f7466f742f8a1895f6166f487102c9f39eade02f55f30a5df38baa418ef36a8752da7c45905db280922f05ded4addcae3334c24ace096c5ed45bd87d626f5b928ef20db6154e2560fc", 0x6c, 0x2}], 0x2, &(0x7f00000006c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}, {@shortname_mixed}, {@rodir}, {@shortname_lower}, {@utf8}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/vcs#\x00'}}, {@measure}, {@fowner_gt={'fowner>', 0xee00}}]}) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r5, &(0x7f0000000740)={r0, r2, 0x3f3}) syz_open_dev$vcsn(&(0x7f0000000800), 0x100, 0x101100) 22:05:58 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x1, 0x2, 0x1}}, 0x14) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000080)=""/78) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000001c0)={0x4, 0x99, &(0x7f0000000100)="98de84c8fc1f3757f657d92a2cafec389481024bd74c10ebb4deddce7a9fc2b3bade12c3563b098db065cff32535da5b4275ab0c97363281046f3c1d227069d58e06e26ac42423b77f5b35964a7d416cb7943c642ac75234bfd0e767b19171f87e874b8afd127ad4332819967e93c4959fe72183de5753db5d0138ceea4f8a974c5bc7d20ddab8a42666859e99a0b44fb6df351782bda5fb2a"}) waitid(0x1, 0x0, 0x0, 0x1, 0x0) 22:05:58 executing program 5: ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000000)=""/79) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x1, 0x10, 0x4, 0x3, "cd9bd728cdfb87501cabb30f30e546a6195ee3cf4e57ecb72e47dd8745b3039b"}) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f00000000c0)={0x1000, 0xfffffff8, 0x1f, 0x0, 0x0, 0x1}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000009, 0x4000010, 0xffffffffffffffff, 0x8000000) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/5) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x50000000}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x803, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@uname={'uname', 0x3d, ':$'}}, {@loose}, {@nodevmap}, {@aname={'aname', 0x3d, '+@('}}, {@access_any}, {@version_L}, {@access_any}, {@dfltuid}, {@posixacl}, {@cache_none}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@subj_role={'subj_role', 0x3d, '$,&'}}, {@measure}, {@subj_type}, {@smackfsfloor}]}}) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000380)=""/84) write$P9_RREADDIR(r2, &(0x7f0000000400)={0xa6, 0x29, 0x2, {0x7, [{{0x8, 0x2}, 0x6, 0x80, 0x7, './file0'}, {{0x4, 0x2, 0x7}, 0x800, 0x1, 0x7, './file0'}, {{0x10, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x1, 0x4}, 0x4, 0x36, 0x7, './file0'}, {{0x10, 0x1, 0x2}, 0x8, 0x1f, 0x7, './file0'}]}}, 0xa6) r3 = openat$incfs(r0, &(0x7f00000004c0)='.pending_reads\x00', 0x200c00, 0x14c) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000500)=""/178) syz_mount_image$vfat(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3d8a, 0x4, &(0x7f00000008c0)=[{&(0x7f0000000640)="236dbf0f9973e3dc919bd8b5c985a8f696752af745db513fca7506f7bc29f67bcc6effa48b14cbcdefcea1fdd06918cdac00d7f78cffbc67a2d80fbbc5a26fc11fc8026b1ff3be582da142e694869b3547075489a32cc38701666e6244fc7ae676a11ff289b8a3094331b9bacfed5d6eaf5120a3c579a8bb8520399558f0c2936c02ba1d8da3ce229b81096fe7ae52cd7d47faf6290148157f893dc0b0de553b0b1f6d764b6f3e4c7830940db825e4557155afca728cf1e3b768793935f17ce24c34f05f351ef614", 0xc8, 0x2}, {&(0x7f0000000740)="fad75d4a77cf1cb91d54dae0e04b271123069aa9bca6e80c3b59a15d3d3d522820bddb46b6900d369aef7e9d9d90d9b06ea83a8045b804610088f828f8b0d6fc2790b4ce7f893dcff7b30176dd09c291a8ce91667087f3b0acacdd08aaac02cc6832076857b71a95e859e9c8798c93ded048d06542e8bd5f93743ce82ef04de0b66a96cbfca40d63eef7a6ce8f0434db65992d842a38a2f3a8be2cd22a1906f3073afe66c22e9b5e1cca75756e26811581bee4a74e9fc065c88643596a754c73b26d0a25268ac925bc5450304a6402977653b793390182bbd1fc9d1b36", 0xdd, 0x5}, {&(0x7f0000000840)="d4a910423910907dd89f5558d1fcf666dec9", 0x12, 0x7}, {&(0x7f0000000880)="55e0ebca5162bcd27d3a35f2ff49da246cccd22d8c45b270cfa9bc960e4525b266bb64f346247eb28fc9b2a35680405d", 0x30, 0x9}], 0x24041, &(0x7f0000000940)={[{@nonumtail}, {@numtail}, {@utf8}, {@iocharset={'iocharset', 0x3d, 'iso8859-4'}}], [{@obj_user={'obj_user', 0x3d, 'subj_type'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\xfd\'.'}}, {@seclabel}]}) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f00000009c0)={0x7, 0x7}, 0x2) [ 168.208025] loop0: detected capacity change from 0 to 255 [ 168.229477] FAT-fs (loop0): Unrecognized mount option "smackfsroot=/dev/vcs#" or missing value [ 168.233728] loop5: detected capacity change from 0 to 30 22:05:58 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x800, 0x311800) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000040)=0x8, 0x4) prctl$PR_MCE_KILL_GET(0x22) prctl$PR_MCE_KILL_GET(0x22) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000100)) ioctl$TUNSETOWNER(r1, 0x400454cc, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000140), 0x4, 0x1a5201) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) rt_sigqueueinfo(0x0, 0x1b, &(0x7f0000000180)={0x36, 0x2, 0x10}) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000200)={0x5, 0x80}, 0x2) epoll_pwait2(0xffffffffffffffff, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, &(0x7f0000000400), &(0x7f0000000440)={[0x4]}, 0x8) 22:05:58 executing program 7: write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x79, 0x1}, 0x7) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x49, 0x1, {0x52, 0x0, 0x6}}, 0x14) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x79, 0x1}, 0x7) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) write$P9_RRENAME(r0, &(0x7f0000000100)={0x7, 0x15, 0x1}, 0x7) r1 = syz_open_dev$vcsn(&(0x7f0000000140), 0x92a, 0x4442) write$P9_RCLUNK(r1, &(0x7f0000000180)={0x7, 0x79, 0x1}, 0x7) write$P9_RGETATTR(r0, &(0x7f00000001c0)={0xa0, 0x19, 0x2, {0x28, {0x10, 0x3, 0x1}, 0x20, 0xee00, 0xee00, 0x5, 0x631, 0xffff, 0x3, 0x1, 0x81a1, 0x0, 0x3, 0x10000, 0x0, 0xfff, 0x401, 0x2, 0x3a, 0xffffffff}}, 0xa0) write$P9_RVERSION(r1, &(0x7f0000000280)={0x13, 0x65, 0xffff, 0x1, 0x6, '9P2000'}, 0x13) pipe2$9p(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSYMLINK(r2, &(0x7f0000000300)={0x14, 0x11, 0x1, {0x2, 0x3, 0x5}}, 0x14) write$9p(r1, &(0x7f0000000340)="aa9e2df267450c0625fedbb9951dd3d35551c8cb07ad190185d70c9e7706ea135189402723c7107da568286447f61b58eee330dcddaab61411f6b86ed9ba3b4c37ec74a88078ca0ad694970dbd3d739e0d3ce8347f3ebc565bedaf0878e2b6e102adf9691334078a39f8babead66fa0b52a928235a773e15903429b993673947ad0718cf97476bbf2ee81e880df17e54866cf28ecbf81cbe99b00d875fc03f1a372b6130508507c908a40a170d5d9c6c2912cb3941d26fe8c691b6bd4e88f64422b7fd6c9cf8ba14bef0229fcedfba42a9c65340df3a0030dee613662aeb2d52494fb90eee175f63678c7e72", 0xec) syz_genetlink_get_family_id$devlink(&(0x7f0000000440), r0) write$P9_RFSYNC(r2, &(0x7f0000000480)={0x7, 0x33, 0x1}, 0x7) write$P9_RSETATTR(r2, &(0x7f00000004c0)={0x7, 0x1b, 0x2}, 0x7) inotify_rm_watch(r1, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) 22:05:58 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x1, 0x2, 0x1}}, 0x14) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000080)=""/78) waitid(0x1, 0x0, 0x0, 0x1, 0x0) 22:05:58 executing program 0: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000000)=0x3, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x40, 0x86) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f00000000c0)={0x9, 0x2}, 0x2) ioctl$TUNSETLINK(r0, 0x400454cd, 0x555) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000100)=0x1a, &(0x7f0000000140)=0x1) prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x7fff8) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}, {0xc}, {0xc, 0x90, 0xff}}]}, 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000002c0), 0x3, 0xd0003) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000300)=""/25) write$P9_RFSYNC(r0, &(0x7f0000000340)={0x7, 0x33, 0x1}, 0x7) gettid() gettid() syz_mount_image$vfat(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0xe2a5, 0x3, &(0x7f0000000640)=[{&(0x7f0000000400)="135180e5335ab6dbbc54c8e248e20fc2cbf36c32b132fc095f26b9d7ff25809ee0db3fea9fd51c03d9eb6009cf3c9eda6af5d99f27f4fd6d090ce28df4748ef7983c4bd96037469a5d4ca0966c2c642ea76e54135637470b84342d95b39b28b9de900b6a89590378157f34b61a9beabe594780203ebc7d66d59bb2a8554af9ab04ac770506ed6297cb8a76be7d6db172bcab57e227e6506f64aca39daba4b37c39625879cb99c78c16baea599551c47a6dc7106b506c5ccb7748a7666d", 0xbd, 0xffff}, {&(0x7f00000004c0)="2220a69d2edd06df94f76ff3f882e980957360b1f96a732f9b6e58d0ae984df7841d447f75a63dbf3335ed3c9c340b34c84297a429fec8b0f460ebe1bd1ce9334c3ecd7555b1be46f058f5d19f5312a1723858cf6b0e37532f6556888790e2011301bb011f14307d5de607641300675a8dda1e9cdb3f9dc301c3713ca80003d8af32284ab959bf2bfce3c1e2bddf363ff30ca424dc8c1ad07fc09ffac436a0aafd003b6cbbcd3b7be78fdf2fe372846149a3334472d760e37d2af42f0ca20cf8e1b51a2d2c4137724f85503adc4c920f566ae37cce0e15c8c94fa52d66757b21907589216e3f8a0d6bca923545", 0xed, 0x101}, {&(0x7f00000005c0)="ba45ac56af5e0daf4a8cdb87a0f67b87c7f023db6897dda4d520127d9a7c55fc875737f7466f742f8a1895f6166f487102c9f39eade02f55f30a5df38baa418ef36a8752da7c45905db280922f05ded4addcae3334c24ace096c5ed45bd87d626f5b928ef20db6154e2560fc", 0x6c, 0x2}], 0x2, &(0x7f00000006c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}, {@shortname_mixed}, {@rodir}, {@shortname_lower}, {@utf8}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/vcs#\x00'}}, {@measure}, {@fowner_gt={'fowner>', 0xee00}}]}) syz_open_dev$vcsn(&(0x7f0000000780), 0x81, 0x8000) syz_open_dev$vcsn(&(0x7f0000000800), 0x100, 0x101100) 22:05:58 executing program 5: ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000000)=""/79) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x1, 0x10, 0x4, 0x3, "cd9bd728cdfb87501cabb30f30e546a6195ee3cf4e57ecb72e47dd8745b3039b"}) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f00000000c0)={0x1000, 0xfffffff8, 0x1f, 0x0, 0x0, 0x1}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000009, 0x4000010, 0xffffffffffffffff, 0x8000000) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/5) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x50000000}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x803, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@uname={'uname', 0x3d, ':$'}}, {@loose}, {@nodevmap}, {@aname={'aname', 0x3d, '+@('}}, {@access_any}, {@version_L}, {@access_any}, {@dfltuid}, {@posixacl}, {@cache_none}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@subj_role={'subj_role', 0x3d, '$,&'}}, {@measure}, {@subj_type}, {@smackfsfloor}]}}) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000380)=""/84) write$P9_RREADDIR(r2, &(0x7f0000000400)={0xa6, 0x29, 0x2, {0x7, [{{0x8, 0x2}, 0x6, 0x80, 0x7, './file0'}, {{0x4, 0x2, 0x7}, 0x800, 0x1, 0x7, './file0'}, {{0x10, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x1, 0x4}, 0x4, 0x36, 0x7, './file0'}, {{0x10, 0x1, 0x2}, 0x8, 0x1f, 0x7, './file0'}]}}, 0xa6) r3 = openat$incfs(r0, &(0x7f00000004c0)='.pending_reads\x00', 0x200c00, 0x14c) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000500)=""/178) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f00000009c0)={0x7, 0x7}, 0x2) [ 168.548829] loop0: detected capacity change from 0 to 255 [ 168.561453] FAT-fs (loop0): Unrecognized mount option "smackfsroot=/dev/vcs#" or missing value [ 179.606396] Bluetooth: hci1: command 0x0406 tx timeout [ 179.607544] Bluetooth: hci4: command 0x0406 tx timeout [ 179.608660] Bluetooth: hci5: command 0x0406 tx timeout [ 179.609749] Bluetooth: hci0: command 0x0406 tx timeout [ 179.610871] Bluetooth: hci3: command 0x0406 tx timeout [ 179.611933] Bluetooth: hci2: command 0x0406 tx timeout [ 179.613028] Bluetooth: hci6: command 0x0406 tx timeout [ 180.118483] INFO: task rcu_gp:3 blocked for more than 143 seconds. [ 180.119893] Not tainted 6.0.0-rc7-next-20220930 #1 [ 180.121002] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 180.122544] task:rcu_gp state:I stack:30328 pid:3 ppid:2 flags:0x00004000 [ 180.124663] Call Trace: [ 180.125568] [ 180.126040] __schedule+0x893/0x2470 [ 180.126898] ? io_schedule_timeout+0x150/0x150 [ 180.127787] ? do_raw_spin_lock+0x121/0x260 [ 180.128709] ? rwlock_bug.part.0+0x90/0x90 [ 180.129647] schedule+0xda/0x1b0 [ 180.130407] rescuer_thread+0x851/0xdb0 [ 180.131285] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 180.132341] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 180.133399] ? lockdep_hardirqs_on+0x79/0x100 [ 180.134374] ? worker_thread+0x1260/0x1260 [ 180.135248] kthread+0x2ed/0x3a0 [ 180.135959] ? kthread_complete_and_exit+0x40/0x40 [ 180.137000] ret_from_fork+0x22/0x30 [ 180.137847] [ 180.138383] INFO: task rcu_par_gp:4 blocked for more than 143 seconds. [ 180.139669] Not tainted 6.0.0-rc7-next-20220930 #1 [ 180.140751] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 180.142277] task:rcu_par_gp state:I stack:30944 pid:4 ppid:2 flags:0x00004000 [ 180.143895] Call Trace: [ 180.144443] [ 180.144908] __schedule+0x893/0x2470 [ 180.145733] ? io_schedule_timeout+0x150/0x150 [ 180.146740] ? do_raw_spin_lock+0x121/0x260 [ 180.147662] ? rwlock_bug.part.0+0x90/0x90 [ 180.148599] schedule+0xda/0x1b0 [ 180.149348] rescuer_thread+0x851/0xdb0 [ 180.150223] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 180.151298] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 180.152359] ? lockdep_hardirqs_on+0x79/0x100 [ 180.153332] ? worker_thread+0x1260/0x1260 [ 180.154265] kthread+0x2ed/0x3a0 [ 180.154976] ? kthread_complete_and_exit+0x40/0x40 [ 180.156035] ret_from_fork+0x22/0x30 [ 180.156880] [ 180.157410] INFO: task slub_flushwq:5 blocked for more than 143 seconds. [ 180.158723] Not tainted 6.0.0-rc7-next-20220930 #1 [ 180.159827] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 180.161383] task:slub_flushwq state:I stack:30944 pid:5 ppid:2 flags:0x00004000 [ 180.163058] Call Trace: [ 180.163626] [ 180.164095] __schedule+0x893/0x2470 [ 180.164914] ? io_schedule_timeout+0x150/0x150 [ 180.165869] ? do_raw_spin_lock+0x121/0x260 [ 180.166772] ? rwlock_bug.part.0+0x90/0x90 [ 180.167713] schedule+0xda/0x1b0 [ 180.168464] rescuer_thread+0x851/0xdb0 [ 180.169344] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 180.170418] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 180.171488] ? lockdep_hardirqs_on+0x79/0x100 [ 180.172461] ? worker_thread+0x1260/0x1260 [ 180.173387] kthread+0x2ed/0x3a0 [ 180.174096] ? kthread_complete_and_exit+0x40/0x40 [ 180.175131] ret_from_fork+0x22/0x30 [ 180.175920] [ 180.176409] INFO: task netns:6 blocked for more than 143 seconds. [ 180.177544] Not tainted 6.0.0-rc7-next-20220930 #1 [ 180.178577] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 180.179827] task:netns state:I stack:30944 pid:6 ppid:2 flags:0x00004000 [ 180.181175] Call Trace: [ 180.181588] [ 180.181952] __schedule+0x893/0x2470 [ 180.182635] ? io_schedule_timeout+0x150/0x150 [ 180.183397] ? do_raw_spin_lock+0x121/0x260 [ 180.184073] ? rwlock_bug.part.0+0x90/0x90 [ 180.184791] schedule+0xda/0x1b0 [ 180.185382] rescuer_thread+0x851/0xdb0 [ 180.186024] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 180.186850] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 180.187667] ? lockdep_hardirqs_on+0x79/0x100 [ 180.188409] ? worker_thread+0x1260/0x1260 [ 180.189042] kthread+0x2ed/0x3a0 [ 180.189634] ? kthread_complete_and_exit+0x40/0x40 [ 180.190363] ret_from_fork+0x22/0x30 [ 180.190909] [ 180.191269] INFO: task kworker/0:0:7 blocked for more than 143 seconds. [ 180.192137] Not tainted 6.0.0-rc7-next-20220930 #1 [ 180.192896] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 180.193936] task:kworker/0:0 state:I stack:29592 pid:7 ppid:2 flags:0x00004000 [ 180.195244] Workqueue: 0x0 (rcu_gp) [ 180.195836] Call Trace: [ 180.196288] [ 180.196647] __schedule+0x893/0x2470 [ 180.197302] ? io_schedule_timeout+0x150/0x150 [ 180.198008] ? rwlock_bug.part.0+0x90/0x90 [ 180.198743] schedule+0xda/0x1b0 [ 180.199332] worker_thread+0x15f/0x1260 [ 180.199987] ? process_one_work+0x16a0/0x16a0 [ 180.200742] kthread+0x2ed/0x3a0 [ 180.201333] ? kthread_complete_and_exit+0x40/0x40 [ 180.202105] ret_from_fork+0x22/0x30 [ 180.202768] [ 180.203189] INFO: task kworker/0:0H:8 blocked for more than 143 seconds. [ 180.204252] Not tainted 6.0.0-rc7-next-20220930 #1 [ 180.205052] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 180.206229] task:kworker/0:0H state:I stack:29760 pid:8 ppid:2 flags:0x00004000 [ 180.207551] Workqueue: 0x0 (events_highpri) [ 180.208278] Call Trace: [ 180.208689] [ 180.209057] __schedule+0x893/0x2470 [ 180.209708] ? io_schedule_timeout+0x150/0x150 [ 180.210498] schedule+0xda/0x1b0 [ 180.211039] worker_thread+0x15f/0x1260 [ 180.211741] ? process_one_work+0x16a0/0x16a0 [ 180.212507] kthread+0x2ed/0x3a0 [ 180.213047] ? kthread_complete_and_exit+0x40/0x40 [ 180.213860] ret_from_fork+0x22/0x30 [ 180.214520] [ 180.214872] INFO: task mm_percpu_wq:10 blocked for more than 143 seconds. [ 180.215949] Not tainted 6.0.0-rc7-next-20220930 #1 [ 180.216783] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 180.218000] task:mm_percpu_wq state:I stack:30944 pid:10 ppid:2 flags:0x00004000 [ 180.219232] Call Trace: [ 180.219587] [ 180.219927] __schedule+0x893/0x2470 [ 180.220505] ? io_schedule_timeout+0x150/0x150 [ 180.221239] ? do_raw_spin_lock+0x121/0x260 [ 180.221944] ? rwlock_bug.part.0+0x90/0x90 [ 180.222642] schedule+0xda/0x1b0 [ 180.223224] rescuer_thread+0x851/0xdb0 [ 180.223844] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 180.224625] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 180.225405] ? lockdep_hardirqs_on+0x79/0x100 [ 180.226102] ? worker_thread+0x1260/0x1260 [ 180.226828] kthread+0x2ed/0x3a0 [ 180.227383] ? kthread_complete_and_exit+0x40/0x40 [ 180.228176] ret_from_fork+0x22/0x30 [ 180.228781] [ 180.232327] INFO: task rcu_tasks_kthre:11 blocked for more than 143 seconds. [ 180.233396] Not tainted 6.0.0-rc7-next-20220930 #1 [ 180.234218] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 180.235420] task:rcu_tasks_kthre state:I stack:29272 pid:11 ppid:2 flags:0x00004000 [ 180.236708] Call Trace: [ 180.237097] [ 180.237465] __schedule+0x893/0x2470 [ 180.238057] ? io_schedule_timeout+0x150/0x150 [ 180.238799] ? mark_held_locks+0x9e/0xe0 [ 180.239444] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 180.240264] schedule+0xda/0x1b0 [ 180.240804] rcu_tasks_one_gp+0x3db/0xc10 [ 180.241491] rcu_tasks_kthread+0x80/0xa0 [ 180.242117] ? rcu_tasks_postscan+0x10/0x10 [ 180.242811] kthread+0x2ed/0x3a0 [ 180.243363] ? kthread_complete_and_exit+0x40/0x40 [ 180.244105] ret_from_fork+0x22/0x30 [ 180.244741] [ 180.245097] INFO: task kworker/1:0H:21 blocked for more than 143 seconds. [ 180.246133] Not tainted 6.0.0-rc7-next-20220930 #1 [ 180.246956] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 180.248125] task:kworker/1:0H state:I stack:29376 pid:21 ppid:2 flags:0x00004000 [ 180.249413] Workqueue: 0x0 (kblockd) [ 180.249997] Call Trace: [ 180.250436] [ 180.250798] __schedule+0x893/0x2470 [ 180.251409] ? io_schedule_timeout+0x150/0x150 [ 180.252182] schedule+0xda/0x1b0 [ 180.252722] worker_thread+0x15f/0x1260 [ 180.253378] ? process_one_work+0x16a0/0x16a0 [ 180.254081] kthread+0x2ed/0x3a0 [ 180.254648] ? kthread_complete_and_exit+0x40/0x40 [ 180.255450] ret_from_fork+0x22/0x30 [ 180.256050] [ 180.256428] INFO: task inet_frag_wq:23 blocked for more than 143 seconds. [ 180.257426] Not tainted 6.0.0-rc7-next-20220930 #1 [ 180.258220] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 180.259395] task:inet_frag_wq state:I stack:30704 pid:23 ppid:2 flags:0x00004000 [ 180.261020] Call Trace: [ 180.261590] [ 180.262062] __schedule+0x893/0x2470 [ 180.262730] ? io_schedule_timeout+0x150/0x150 [ 180.263485] ? do_raw_spin_lock+0x121/0x260 [ 180.264194] ? rwlock_bug.part.0+0x90/0x90 [ 180.264840] schedule+0xda/0x1b0 [ 180.265365] rescuer_thread+0x851/0xdb0 [ 180.265987] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 180.266804] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 180.267584] ? lockdep_hardirqs_on+0x79/0x100 [ 180.268331] ? worker_thread+0x1260/0x1260 [ 180.268990] kthread+0x2ed/0x3a0 [ 180.269510] ? kthread_complete_and_exit+0x40/0x40 [ 180.270324] ret_from_fork+0x22/0x30 [ 180.270925] [ 180.271368] [ 180.271368] Showing all locks held in the system: [ 180.272318] 1 lock held by rcu_tasks_kthre/11: [ 180.272998] #0: ffffffff85406850 (rcu_tasks.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x26/0xc10 [ 180.274487] 1 lock held by khungtaskd/25: [ 180.275116] #0: ffffffff85407320 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 [ 180.276546] 2 locks held by in:imklog/199: [ 180.277219] #0: ffff88800d859268 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe7/0x100 [ 180.278489] #1: ffffffff853fa968 (syslog_lock){+.+.}-{3:3}, at: __kmem_cache_alloc_node+0x3d/0x3d0 [ 180.279832] 2 locks held by syz-executor/4196: [ 180.280529] [ 180.280802] ============================================= [ 180.280802] 22:06:12 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000000)=0x80, 0x1) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x2, 0x80010, 0xffffffffffffffff, 0x8000000) r2 = mmap$IORING_OFF_SQES(&(0x7f0000eeb000/0x1000)=nil, 0x1000, 0x2000002, 0x100010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_CLOSE={0x13, 0x4, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x307cbdc9) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.log\x00', 0x0, 0x50) setsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f00000000c0)=0x1, 0x4) io_uring_setup(0x7f90, &(0x7f0000000100)={0x0, 0x333, 0x20, 0x3, 0x3e8, 0x0, r3}) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff}, 0x84000) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f00000001c0)={0x2000}) socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = syz_open_dev$vcsn(&(0x7f0000000200), 0x4, 0x250301) openat$incfs(r5, &(0x7f0000000240)='.log\x00', 0x80000, 0x100) r6 = epoll_create(0xfff) epoll_pwait(r6, &(0x7f0000000280)=[{}, {}], 0x2, 0x1f, &(0x7f00000002c0)={[0xa8da]}, 0x8) syz_open_dev$vcsn(&(0x7f0000000300), 0x5, 0x20000) syz_genetlink_get_family_id$devlink(&(0x7f00000003c0), r5) 22:06:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x81880004}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@GTPA_TID={0xc, 0x3, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040004}, 0x4008041) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r1, 0x100, 0x70bd27, 0x25dfdbff, {}, [@GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_VERSION={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @multicast2}, @GTPA_FLOW={0x6, 0x6, 0x2}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000c0}, 0x4) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000240)='.pending_reads\x00', 0x101000, 0x48) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000002c0)={0x5, 0x80, 0x1f, 0x1, 0x3, 0x1, 0x0, 0x6, 0xb204, 0x6, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000280), 0x4}, 0x20060, 0x4, 0x1, 0x5, 0x100000000, 0x7, 0x81, 0x0, 0x5, 0x0, 0x4}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000380)) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f00000003c0)) r4 = gettid() syz_open_procfs$namespace(r4, &(0x7f0000000400)='ns/ipc\x00') r5 = socket(0x5, 0x5, 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000000440)={'wg0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000500)={'erspan0\x00', &(0x7f0000000480)={'gre0\x00', r6, 0x8000, 0x7800, 0x6, 0x4, {{0x14, 0x4, 0x2, 0x19, 0x50, 0x67, 0x0, 0x4, 0x4, 0x0, @multicast2, @private=0xa010101, {[@timestamp_addr={0x44, 0x24, 0xb1, 0x1, 0x4, [{@local, 0x9}, {@local, 0x6}, {@remote, 0x8000}, {@multicast2, 0x1}]}, @end, @ssrr={0x89, 0xf, 0xa6, [@remote, @empty, @local]}, @rr={0x7, 0x7, 0xb5, [@multicast2]}]}}}}}) r7 = openat$incfs(r2, &(0x7f0000000540)='.pending_reads\x00', 0x11d001, 0x15) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000600)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x5, 0x0, r7, 0x0, &(0x7f0000000580)="88571343deee7402d7333445b4e1e746179fccb95971dd80da361bfe8d1079be5b951d72e1aa4a4f3a70081c3b5754ca067be0309a7db6d3e06c20992269f93849ba536af0dd532cd9af83cf", 0x4c, 0x20, 0x1}, 0x20) r8 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) kcmp$KCMP_EPOLL_TFD(r4, 0x0, 0x7, r2, &(0x7f00000006c0)={r2, r8, 0x5}) 22:06:12 executing program 1: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x71, 0x2, {{0x40, 0x0, 0x1}, 0x5}}, 0x18) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x49, 0x2, {0x8, 0x2, 0x3}}, 0x14) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x6d, 0x1}, 0x7) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$9p(r0, &(0x7f0000000100)="bca390dfb2aad74d6f9c27396275f45ae94f6ab4ae4e7ff1f9420e901a91a03c47caed038181e564b1e7124f503a1e7c7b7ecd9d49bfb7a4109df30aa9272cf6a61fa23a1d487a235cc314e3c5a2ca4979242cc62dfa2dabb2ca1cbaf3561e232117b23264d149cfa3ef125f7f7e3edd4f646d9590b5c499afbdf7ae79d177b51ed816e3972bec0d20531a3b2de42de01f02ff85370db8841b9fe741422bd07181127933d744b4b7c71ec6710adcbdba5b48901d670e717b84550f6bdcad29c5fac4d76f2bed0b8d1f035448fc77f6874c0f2f14546e83b68b1be630d51f882c5c2b74f5991ebe", 0xe7) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wg2\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000280)={'syztnl2\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x40, 0x20, 0x8, 0xff, {{0x6, 0x4, 0x2, 0x7, 0x18, 0x65, 0x0, 0x2, 0x29, 0x0, @rand_addr=0x64010101, @empty, {[@noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000380)={'tunl0\x00', &(0x7f00000002c0)={'gretap0\x00', r2, 0x8, 0x40, 0x401, 0xfffff000, {{0x1e, 0x4, 0x0, 0x9, 0x78, 0x64, 0x0, 0x9, 0x4, 0x0, @broadcast, @remote, {[@generic={0x83, 0x7, "9d3f8d3d0b"}, @ssrr={0x89, 0x7, 0xe8, [@remote]}, @timestamp={0x44, 0x10, 0x6f, 0x0, 0x5, [0x400, 0x3, 0x4]}, @timestamp_prespec={0x44, 0x14, 0x63, 0x3, 0xb, [{@empty, 0x8000}, {@local, 0x40}]}, @timestamp={0x44, 0x10, 0xe2, 0x0, 0x6, [0x200, 0x1, 0xfffffffc]}, @rr={0x7, 0x1f, 0x6f, [@local, @multicast2, @multicast2, @multicast1, @remote, @multicast2, @multicast2]}]}}}}}) write$P9_RFSYNC(r0, &(0x7f00000003c0)={0x7, 0x33, 0x1}, 0x7) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_SPLICE={0x1e, 0x3, 0x0, @fd=r0, 0x40, {0x0, r0}, 0x1f, 0xc, 0x1, {0x0, 0x0, r1}}, 0x2cb) r3 = syz_open_dev$vcsn(&(0x7f0000000440), 0x3ff, 0x82000) ioctl$EVIOCGBITSW(r3, 0x80404525, &(0x7f0000000480)=""/55) write$P9_RFSYNC(r3, &(0x7f00000004c0)={0x7, 0x33, 0x2}, 0x7) r4 = syz_open_dev$vcsn(&(0x7f0000000500), 0x9, 0x1ac02) setsockopt$inet_udp_int(r4, 0x11, 0xb, &(0x7f0000000540)=0x3f, 0x4) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000680)) 22:06:12 executing program 7: write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x79, 0x1}, 0x7) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x49, 0x1, {0x52, 0x0, 0x6}}, 0x14) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x79, 0x1}, 0x7) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) write$P9_RRENAME(r0, &(0x7f0000000100)={0x7, 0x15, 0x1}, 0x7) r1 = syz_open_dev$vcsn(&(0x7f0000000140), 0x92a, 0x4442) write$P9_RCLUNK(r1, &(0x7f0000000180)={0x7, 0x79, 0x1}, 0x7) write$P9_RGETATTR(r0, &(0x7f00000001c0)={0xa0, 0x19, 0x2, {0x28, {0x10, 0x3, 0x1}, 0x20, 0xee00, 0xee00, 0x5, 0x631, 0xffff, 0x3, 0x1, 0x81a1, 0x0, 0x3, 0x10000, 0x0, 0xfff, 0x401, 0x2, 0x3a, 0xffffffff}}, 0xa0) write$P9_RVERSION(r1, &(0x7f0000000280)={0x13, 0x65, 0xffff, 0x1, 0x6, '9P2000'}, 0x13) pipe2$9p(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSYMLINK(r2, &(0x7f0000000300)={0x14, 0x11, 0x1, {0x2, 0x3, 0x5}}, 0x14) write$9p(r1, &(0x7f0000000340)="aa9e2df267450c0625fedbb9951dd3d35551c8cb07ad190185d70c9e7706ea135189402723c7107da568286447f61b58eee330dcddaab61411f6b86ed9ba3b4c37ec74a88078ca0ad694970dbd3d739e0d3ce8347f3ebc565bedaf0878e2b6e102adf9691334078a39f8babead66fa0b52a928235a773e15903429b993673947ad0718cf97476bbf2ee81e880df17e54866cf28ecbf81cbe99b00d875fc03f1a372b6130508507c908a40a170d5d9c6c2912cb3941d26fe8c691b6bd4e88f64422b7fd6c9cf8ba14bef0229fcedfba42a9c65340df3a0030dee613662aeb2d52494fb90eee175f63678c7e72", 0xec) syz_genetlink_get_family_id$devlink(&(0x7f0000000440), r0) write$P9_RFSYNC(r2, &(0x7f0000000480)={0x7, 0x33, 0x1}, 0x7) write$P9_RSETATTR(r2, &(0x7f00000004c0)={0x7, 0x1b, 0x2}, 0x7) openat$autofs(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) 22:06:12 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x1, 0x2, 0x1}}, 0x14) waitid(0x1, 0x0, 0x0, 0x1, 0x0) 22:06:12 executing program 0: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000000)=0x3, 0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x40, 0x86) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f00000000c0)={0x9, 0x2}, 0x2) ioctl$TUNSETLINK(r0, 0x400454cd, 0x555) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000100)=0x1a, &(0x7f0000000140)=0x1) prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x7fff8) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}, {0xc}, {0xc, 0x90, 0xff}}]}, 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000002c0), 0x3, 0xd0003) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000300)=""/25) write$P9_RFSYNC(r0, &(0x7f0000000340)={0x7, 0x33, 0x1}, 0x7) gettid() gettid() syz_open_dev$vcsn(&(0x7f0000000780), 0x81, 0x8000) syz_open_dev$vcsn(&(0x7f0000000800), 0x100, 0x101100) 22:06:12 executing program 5: ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000000)=""/79) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x1, 0x10, 0x4, 0x3, "cd9bd728cdfb87501cabb30f30e546a6195ee3cf4e57ecb72e47dd8745b3039b"}) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f00000000c0)={0x1000, 0xfffffff8, 0x1f, 0x0, 0x0, 0x1}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000009, 0x4000010, 0xffffffffffffffff, 0x8000000) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/5) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x50000000}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x803, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@uname={'uname', 0x3d, ':$'}}, {@loose}, {@nodevmap}, {@aname={'aname', 0x3d, '+@('}}, {@access_any}, {@version_L}, {@access_any}, {@dfltuid}, {@posixacl}, {@cache_none}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@subj_role={'subj_role', 0x3d, '$,&'}}, {@measure}, {@subj_type}, {@smackfsfloor}]}}) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000380)=""/84) write$P9_RREADDIR(r2, &(0x7f0000000400)={0xa6, 0x29, 0x2, {0x7, [{{0x8, 0x2}, 0x6, 0x80, 0x7, './file0'}, {{0x4, 0x2, 0x7}, 0x800, 0x1, 0x7, './file0'}, {{0x10, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x1, 0x4}, 0x4, 0x36, 0x7, './file0'}, {{0x10, 0x1, 0x2}, 0x8, 0x1f, 0x7, './file0'}]}}, 0xa6) r3 = openat$incfs(r0, &(0x7f00000004c0)='.pending_reads\x00', 0x200c00, 0x14c) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f00000009c0)={0x7, 0x7}, 0x2) 22:06:12 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x800, 0x311800) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000040)=0x8, 0x4) prctl$PR_MCE_KILL_GET(0x22) prctl$PR_MCE_KILL_GET(0x22) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000100)) ioctl$TUNSETOWNER(r1, 0x400454cc, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000140), 0x4, 0x1a5201) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) rt_sigqueueinfo(0x0, 0x1b, &(0x7f0000000180)={0x36, 0x2, 0x10}) epoll_pwait2(0xffffffffffffffff, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, &(0x7f0000000400), &(0x7f0000000440)={[0x4]}, 0x8) [ 182.405874] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4226 comm=syz-executor.4 [ 183.702544] Bluetooth: hci7: command 0x0406 tx timeout VM DIAGNOSIS: 22:06:10 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=ffff888017e88910 RCX=ffffffff818df4b2 RDX=ffff8880176e1ac0 RSI=0000000000000000 RDI=0000000000000000 RBP=0000000000001000 RSP=ffff88801885fad8 R8 =0000000000000001 R9 =0000000000000000 R10=0000000000000000 R11=0000000000000001 R12=0000000000000000 R13=dffffc0000000000 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff814608e4 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 00000000 00000000 DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f065e19e900 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f065d60eef0 CR3=000000000eea6000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 7563723a6b736174 3d4547415353454d YMM01=0000000000000000 0000000000000000 38323330333a6b63 61747320493a6574 YMM02=0000000000000000 0000000000000000 202020202020323a 6469707020202020 YMM03=0000000000000000 0000000000000000 747320493a657461 7473202020202020 YMM04=0000000000000000 0000000000000000 f8623533e15c3513 000000000013a0d8 YMM05=0000000000000000 0000000000000000 d3fdd5f48436fbd7 00000000000aead0 YMM06=0000000000000000 0000000000000000 416a09107c8b2fb9 00000000000ae988 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 44495f474f4c5359 530069253d595449 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 2000000000000000 2000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=dffffc0000000005 RBX=00000000000003f9 RCX=0000000000000000 RDX=00000000000003f9 RSI=ffffffff823bb06c RDI=ffffffff8765a9a0 RBP=ffffffff8765a960 RSP=ffff88800902f8a0 R8 =0000000000000001 R9 =ffff88800902f82b R10=ffffed1001205f05 R11=0000000000000001 R12=000000000000001b R13=ffffffff8765a960 R14=ffffffff8765a9b0 R15=ffffffff8765ac10 RIP=ffffffff823bb0c1 RFL=00000006 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055e22bdb9648 CR3=000000000d3d2000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM02=0000000000000000 0000000000000000 0000000000000000 41516b2800000000 YMM03=0000000000000000 0000000000000000 0000ff0000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 732f6c61636f6c2f 7273752f3d485441 YMM05=0000000000000000 0000000000000000 622f6c61636f6c2f 7273752f3a6e6962 YMM06=0000000000000000 0000000000000000 73752f3a6e696273 2f7273752f3a6e69 YMM07=0000000000000000 0000000000000000 6e69622f3a6e6962 732f3a6e69622f72 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000