='/proc/diskstats\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r2 = socket$nl_audit(0x10, 0x3, 0x9) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r5, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @remote, @broadcast}}}], 0x20}, 0x0) r8 = socket$inet6(0xa, 0x8000e, 0x3ff) sendmsg$inet(r8, &(0x7f0000000740)={&(0x7f0000000380)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000400)="407e39c6bec875d1631245f6f392116280fecf10cc61a45d979517c534dae139978066aab9ca54be263130926e984152fa3fe45678b405d6430eb69015bda1a29f1205996d985052b4420053f2160a28af18079165021549b619cf4b5d38863f58643b1ef099ae8046b10fbdf0bfda4d125a8500de798ec6fd69c25b4ff647701df3d00b9511445199d4916b476ebe021802bb976a54509ef400613e25343cba8642582c44d372c4a4f0783a01196c874359cd20b1c1793a24ebc8525c600ee506bd37261fce87", 0xc7}, {&(0x7f0000000500)="dd501a300c5aa3632b279705013c5b9534b5d53daced9a223341f122be580f34340cad9fdf747340887bd0c040053e0d594ae237701f818d534d1dfa1e094db3ce43e2485035de941897049f0d85694f3c66de4f8e5666a5bbd43ecd3efc64618607678744e07348fd2f4ddff0882f477030874bf70a474dc7c6fa2aa39188dff9b0d2132bb87bd31de94aaab5e7bd66b8bbb617f31a05c268fc10cc", 0x9c}, {&(0x7f00000005c0)="79aa8a8d0623cdbc9e8ed1cde9f75ed334b06488ced16063736f999cb8b5cef6e09b89a677e12c8a07d58586be84088835cd18011f542efe409cb298af91c1c4485655b737aef1bd96500907d7a21e932e96aab2e04a43bef29d91f4", 0x5c}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f0000000640)="b46022d21b49e67943", 0x9}], 0x5, &(0x7f00000017c0)=ANY=[@ANYBLOB="8c000000000000000000000007000000891b7ee00000027f00000164010100ac1414bb0a010101ac1414aa00891734ffffffff6401010164010100e0000001ffffffff890b5dac141444ac14141d94040000441c1bb3ac1414bb0000002900000000000000087f000001fffffdec831bae00000000ac1e0101ac1e0001ac1414aa7f000001ac1414bb0000000000000014000000000000000000000002000000e9040000000000001c000000000000000000000008000000", @ANYRES32=r3, @ANYBLOB="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"], 0x1d0}, 0x8800) setsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000000080)={@empty, @dev={0xac, 0x14, 0x14, 0x3a}, r7}, 0xc) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000200)={@rand_addr=' \x01\x00', @private0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x9, 0x34, 0x6, 0x400, 0x1, 0x200088, r7}) fstatfs(r2, &(0x7f0000000100)=""/227) 08:35:14 executing program 6: execveat(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x194) execveat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000080)=']/\x00', &(0x7f00000000c0)='&\\\x00'], &(0x7f0000000200)=[&(0x7f0000000140)='(:\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)], 0x800) 08:35:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r3, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r4, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) close_range(r3, r4, 0x2) close(r2) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 08:35:15 executing program 3: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) ioctl$SNAPSHOT_FREE(r1, 0x3305) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200), &(0x7f00000003c0)=ANY=[@ANYBLOB="ea086e661f99c0d12113081f0a1280409416cfae43a4e5e45ad48a150a9a669c42c9ce54a1ebf6b7dd434dd3bb52694264285b8ef3b8d152dd64e5a65500ba28fd382893a407b7feeaa41a6eb2dfbb89a115"], 0x4, 0x1) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) openat(r0, &(0x7f0000000280)='./file1\x00', 0x102, 0x0) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x19df) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) sendfile(r2, r0, 0x0, 0xfffffdef) [ 357.135229] loop3: detected capacity change from 0 to 40 08:35:30 executing program 0: r0 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000540)={@in6={{0xa, 0x4e20, 0xffff, @mcast2, 0x4}}, 0x0, 0x0, 0x15, 0x0, "b25da62d685a38083e45ab1950001ca46105939b4b3d83bd945bed03b30b62897693132cb6e12788b1d58f9b2fff886055bea488ee0e2918a8c961a2684924dfa9841132b1916476e31d06d76d34a918"}, 0xd8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r4, 0x5390, &(0x7f0000002340)) r5 = fsopen(&(0x7f0000000000)='sysfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000200)={{0x1, 0x1, 0x18, r5, {0xfffffffc}}, './file0\x00'}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x370d, 0x3, &(0x7f0000000640)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643", 0x67, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e1aaf3fc569ad2624610b7f", 0x21, 0x7}], 0x2010008, &(0x7f0000000400)=ANY=[@ANYBLOB="726f6469722c6e6f6e756d7461696c3d302c696f6861727365743d6b6f69382d752c7569643dbd62dea2bc3f3ce404528c96c8e9f351a4a8383cc7fb311bac391793d9646842f06d3cb6aaf5fae8683b10db97f652fa19276d0f419b00a5ff25bf9ff1d925a54182d8ab1234520cdc36e6ca40fd0b72a4ce939be7a1258165ec69f17551271de1c25d71912f0f07e68ce4d30b98f17a43c256a9b7de46493605f47a0e06dac739ec71511fc3d2edb5870ac0f74eddb04979d3eae571ddfc544500", @ANYRESOCT=r5, @ANYBLOB="2c6673636f81746562743d73797361646d5f752c00aebc6dfc"]) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3}, './file1\x00'}) fsmount(r6, 0x0, 0x8) ioctl$AUTOFS_IOC_EXPIRE(r3, 0x810c9365, &(0x7f00000006c0)={{0xc4c8, 0x7}, 0x100, './file1\x00'}) fcntl$getown(r0, 0x9) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) 08:35:30 executing program 2: ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="010400ce588173002e2f66696c653000"]) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000380)={0x6, {{0x2, 0x4e23, @remote}}, 0x1, 0x6, [{{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e23, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e24, @rand_addr=0x64010102}}, {{0x2, 0x4e20, @rand_addr=0x64010102}}, {{0x2, 0x4e23, @loopback}}]}, 0x390) r1 = socket$nl_route(0x10, 0x3, 0x0) accept4$unix(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x6e, 0x80800) sendmmsg(r1, &(0x7f00000082c0)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000340)="05", 0x1}], 0x1}}, {{&(0x7f0000003780)=@nl=@proc={0x10, 0x0, 0x25dfdbfe}, 0x80, &(0x7f0000003a40)=[{&(0x7f0000003800)="1b", 0x1}], 0x1}}], 0x2, 0x0) r2 = getpid() pidfd_open(r2, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x7ff}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(r3, 0x4040942c, &(0x7f0000000040)={0x0, 0xf, [0x2, 0x156280000000000, 0x8001, 0x1, 0x7a]}) flistxattr(r1, &(0x7f0000000100)=""/35, 0x23) r4 = socket$nl_route(0x10, 0x3, 0x0) readahead(r4, 0x8, 0xffff) fork() pidfd_open(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000001000)={{0x1, 0x1, 0x18, r0, {0xee00, 0xffffffffffffffff}}, './file0\x00'}) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:35:30 executing program 6: pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000180)}, {&(0x7f0000000280)}], 0x2, 0x9e74, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) splice(0xffffffffffffffff, &(0x7f0000000000)=0x7, 0xffffffffffffffff, &(0x7f0000000040)=0xfff, 0x9, 0x4) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r1, &(0x7f0000000080)={[0x5]}, 0x8, 0x80800) creat(&(0x7f0000000240)='./file1\x00', 0x119) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 08:35:30 executing program 7: pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x7fffffe, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000480)="5c406124d656d653eb92d0363c8c34efd13e4bcc3826661a27a7a2ff551239ff531a914407e946da29f9ae6f2b7650bc48c04b19d8d911020e8ee9411e279de4f9e29afd3a16e432abbc724beeb46dc0b98b4da776a20a47eb5ad062a0", 0x5d}], 0x1, 0x2, 0x9c4) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000007c0)={0xf8, 0x4, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_COUNTERS={0x58, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x6bd7}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x3fe}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x100}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x4}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x2}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x2d3b}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x8}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_TYPE={0xa, 0x7, 'route\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0x40, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x26c1e726}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x346cdf49}, @NFTA_HOOK_DEV={0x14, 0x3, 'ip6erspan0\x00'}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4082a08b}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x519632f6}]}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0xf8}, 0x1, 0x0, 0x0, 0x840}, 0x10) r1 = add_key$keyring(&(0x7f0000000680), &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) dup3(r3, 0xffffffffffffffff, 0xd774a71f66e40cd3) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r1) r4 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, r2) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="18419cc68448de3ae8f97ea6a46d823d4f19cecbf569a58b79851d91f3da031fecf4dfebf4ac3b13988a048b4e35761cb05a5d5b28e1ca6ceebae02cbbf7e894098749d5f99cb226f14f00b6034bfb02a7a5af409f531820bd319b9d7c3405022b550d32ad368fdbbddb8ed631d1dde9a4ed", 0xff10, r4) add_key(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000340)="0756a67223b549211a384f454d8895eec0834b210ce844bb6221e437c1483e256bdbe295c3600c3ab47a0325168e0753c1ca8a446128ae25e332191af4bdb24b53547d14c59b468bd166a7c864b34f25d4df23a3f401a0eb24e1ae74e619b22a3c3b2b99e91fa80c56dd805ce37303bfb97e4e7245ab1e71d92db8f4c2dfacb40d4bd3f89c6b9a6c7aa9c5d651f0935a85ae12d79042ae", 0x97, r4) 08:35:30 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffff9dd6b571e1f844780f0fffffffff840e4e38ecf3781efc9a2dc422b584ffbfa6087482d6677c2b1d04000200000000000007"], 0x0) 08:35:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r3, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r4, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) close_range(r3, r4, 0x2) close(r2) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) 08:35:30 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000000)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xbe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x411, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x42060, 0x2, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002480)='fd/3\x00') mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7766646e6f3d014f29ef99ad8b2ee6ab88d3ddf9f64fb3263bd7d202acf75f549842835dcf4ecacd3bf6ef28ae3dc96c80ff23", @ANYRESHEX, @ANYBLOB]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000240)={0xc0000008}) epoll_wait(0xffffffffffffffff, &(0x7f0000000300)=[{}, {}, {}], 0x3, 0x5) acct(&(0x7f00000001c0)='./file1\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fsopen(&(0x7f0000000040)='rpc_pipefs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x6, 0x0, 0x0, 0x0) 08:35:30 executing program 1: sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f0000000040)={0x2c8, 0x0, 0x300, 0x70bd25, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x2f}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_REG_RULES={0x48, 0x22, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x7}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x9}]}, {0x14, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x4}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x3}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x2}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x6}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0xbe9}]}]}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x3}, @NL80211_ATTR_REG_RULES={0x1e4, 0x22, 0x0, 0x1, [{0x2c, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x400}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x38cd}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x1}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x7}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x526f}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x1}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x8}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x9}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x2}]}, {0x44, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0xff}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x6}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x2}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x3}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x7}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x6}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0xff}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xe0000000}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x1d0}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0xffff}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x8}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x7fffffff}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0xff}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x3}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x1}]}, {0x44, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x3}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x5}, @NL80211_ATTR_FREQ_RANGE_END={0x8}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x4}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x9}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x8000}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xb1dc}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x8001}]}, {0x14, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x3}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x8}]}, {0x44, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xff}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x9}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x7}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x2}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x7}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x81}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x8}]}, {0x54, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x72f}, @NL80211_ATTR_FREQ_RANGE_END={0x8}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x1000}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x9}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x20}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x8}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x2}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x4}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x6}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x7}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0xbf4}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x5}]}]}, @NL80211_ATTR_REG_RULES={0x5c, 0x22, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x1ff}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x200}]}, {0x44, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x9}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x80000001}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x8f60}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x7f}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x714}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x401}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xd}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x80000000}]}]}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x4}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x2c8}, 0x1, 0x0, 0x0, 0x2000c802}, 0x8001) 08:35:30 executing program 5: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)=ANY=[@ANYRES32=0x0]) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="590000007d00000000400800000000000010000000000000000000000000000000000000000001000100010000000000000002002d2306000202020202020500257d25403a0000040002000000", @ANYRES32=0xee01, @ANYRES32=0xee00], 0x59) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x400) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) recvmmsg$unix(r1, &(0x7f0000001540)=[{{&(0x7f0000000180), 0x6e, &(0x7f0000000400)=[{&(0x7f0000000200)=""/61, 0x3d}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000300)=""/121, 0x79}, {&(0x7f0000000380)=""/58, 0x3a}, {&(0x7f00000003c0)=""/50, 0x32}], 0x5, &(0x7f0000000480)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}], 0x1, 0x40000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000540)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) r4 = openat(r3, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) syncfs(r4) r5 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r5, 0x0, 0x1, &(0x7f0000000000), 0x4) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r6, 0x0, 0x1, &(0x7f0000000000), 0x4) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x228842, 0x120) sendfile(r7, 0xffffffffffffffff, 0x0, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r8, 0x0, 0x30, 0x0, &(0x7f0000000900)) ioctl$AUTOFS_DEV_IOCTL_VERSION(r7, 0xc0189371, &(0x7f0000001580)={{0x1, 0x1, 0x18, r8}, './file1\x00'}) [ 372.237795] loop3: detected capacity change from 0 to 40 [ 372.238723] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2564 sclass=netlink_route_socket pid=10809 comm=syz-executor.7 [ 372.261097] audit: type=1400 audit(1668414930.614:11): avc: denied { tracepoint } for pid=10812 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 372.361864] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2564 sclass=netlink_route_socket pid=10824 comm=syz-executor.7 [ 372.459269] loop3: detected capacity change from 0 to 40 08:35:46 executing program 6: pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000180)}, {&(0x7f0000000280)}], 0x2, 0x9e74, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) splice(0xffffffffffffffff, &(0x7f0000000000)=0x7, 0xffffffffffffffff, &(0x7f0000000040)=0xfff, 0x9, 0x4) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r1, &(0x7f0000000080)={[0x5]}, 0x8, 0x80800) creat(&(0x7f0000000240)='./file1\x00', 0x119) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 08:35:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x2c0480, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fsetxattr$system_posix_acl(r2, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0200000001000000000000d052733989e400040000000000000010000000000000002000"], 0x24, 0x0) renameat(r1, &(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file1\x00') r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_aout(r4, &(0x7f0000001180)=ANY=[], 0x220) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000240)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0xc}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r4, r0, 0x0, 0xfffffdef) 08:35:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="6828b1fbcd4f3e82efc97033e5dd89"]) pwrite64(r0, &(0x7f0000000140)="01", 0x1, 0x7fff) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x9, 0x12, r0, 0x0) syz_io_uring_submit(r1, 0x0, 0x0, 0x0) 08:35:46 executing program 0: mmap$IORING_OFF_CQ_RING(&(0x7f0000ff4000/0xa000)=nil, 0xa000, 0x2000006, 0x4000010, 0xffffffffffffffff, 0x8000000) syz_open_dev$rtc(&(0x7f0000000100), 0x48ec, 0x181042) r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f00000012c0)='smaps_rollup\x00') ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000001280)=0x0) r3 = gettid() r4 = syz_open_procfs(r3, &(0x7f00000012c0)='smaps_rollup\x00') clone3(&(0x7f0000001200)={0x50200800, &(0x7f00000002c0)=0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080), {0x40}, &(0x7f0000000140)=""/185, 0xb9, &(0x7f0000002400)=""/4104, &(0x7f0000001300)=[r3, 0x0, r2, r2], 0x4}, 0x58) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r7, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={r6, r7, 0xee01}, 0xc) ftruncate(r5, 0x0) 08:35:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r3, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r4, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) close_range(r3, r4, 0x2) close(r2) 08:35:46 executing program 5: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)=ANY=[@ANYRES32=0x0]) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="590000007d00000000400800000000000010000000000000000000000000000000000000000001000100010000000000000002002d2306000202020202020500257d25403a0000040002000000", @ANYRES32=0xee01, @ANYRES32=0xee00], 0x59) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x400) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) recvmmsg$unix(r1, &(0x7f0000001540)=[{{&(0x7f0000000180), 0x6e, &(0x7f0000000400)=[{&(0x7f0000000200)=""/61, 0x3d}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000300)=""/121, 0x79}, {&(0x7f0000000380)=""/58, 0x3a}, {&(0x7f00000003c0)=""/50, 0x32}], 0x5, &(0x7f0000000480)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}], 0x1, 0x40000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000540)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) r4 = openat(r3, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) syncfs(r4) r5 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r5, 0x0, 0x1, &(0x7f0000000000), 0x4) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r6, 0x0, 0x1, &(0x7f0000000000), 0x4) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x228842, 0x120) sendfile(r7, 0xffffffffffffffff, 0x0, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r8, 0x0, 0x30, 0x0, &(0x7f0000000900)) ioctl$AUTOFS_DEV_IOCTL_VERSION(r7, 0xc0189371, &(0x7f0000001580)={{0x1, 0x1, 0x18, r8}, './file1\x00'}) 08:35:46 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f00000001c0)=""/83, 0x53, 0x4) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000300)={0xffff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xcf, "206eb222b5051f"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000100)={{r2, 0x20, 0xac9, 0x3f, 0x0, 0x7, 0x800, 0x6, 0x8001, 0x4a5, 0x7, 0x4, 0x4, 0xc298}, 0x8, [0x0]}) 08:35:46 executing program 7: pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x7fffffe, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000480)="5c406124d656d653eb92d0363c8c34efd13e4bcc3826661a27a7a2ff551239ff531a914407e946da29f9ae6f2b7650bc48c04b19d8d911020e8ee9411e279de4f9e29afd3a16e432abbc724beeb46dc0b98b4da776a20a47eb5ad062a0", 0x5d}], 0x1, 0x2, 0x9c4) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000007c0)={0xf8, 0x4, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_COUNTERS={0x58, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x6bd7}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x3fe}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x100}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x4}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x2}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x2d3b}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x8}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_TYPE={0xa, 0x7, 'route\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0x40, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x26c1e726}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x346cdf49}, @NFTA_HOOK_DEV={0x14, 0x3, 'ip6erspan0\x00'}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4082a08b}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x519632f6}]}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0xf8}, 0x1, 0x0, 0x0, 0x840}, 0x10) r1 = add_key$keyring(&(0x7f0000000680), &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) dup3(r3, 0xffffffffffffffff, 0xd774a71f66e40cd3) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r1) r4 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, r2) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="18419cc68448de3ae8f97ea6a46d823d4f19cecbf569a58b79851d91f3da031fecf4dfebf4ac3b13988a048b4e35761cb05a5d5b28e1ca6ceebae02cbbf7e894098749d5f99cb226f14f00b6034bfb02a7a5af409f531820bd319b9d7c3405022b550d32ad368fdbbddb8ed631d1dde9a4ed", 0xff10, r4) add_key(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000340)="0756a67223b549211a384f454d8895eec0834b210ce844bb6221e437c1483e256bdbe295c3600c3ab47a0325168e0753c1ca8a446128ae25e332191af4bdb24b53547d14c59b468bd166a7c864b34f25d4df23a3f401a0eb24e1ae74e619b22a3c3b2b99e91fa80c56dd805ce37303bfb97e4e7245ab1e71d92db8f4c2dfacb40d4bd3f89c6b9a6c7aa9c5d651f0935a85ae12d79042ae", 0x97, r4) [ 388.057508] loop2: detected capacity change from 0 to 40 [ 388.062585] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2564 sclass=netlink_route_socket pid=10847 comm=syz-executor.7 08:35:46 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x410, &(0x7f0000000140)=ANY=[]) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file2\x00', 0x800, 0x10) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x30, 0xffffffffffffffff, 0xec465000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 08:35:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r3, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) close_range(r2, r3, 0x2) 08:35:46 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:35:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x428, 0x1, 0x0, 0x0, 0x6, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x28}}, 0x0) r2 = dup3(r0, 0xffffffffffffffff, 0x80000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="00000000dd5fb75c1a8dd8060000000000000004fe", @ANYRES16=r3, @ANYBLOB="00082abd7000fddbdf25170000003ae41a00ffffffffffff00000a001a00080211000e0000000a001a00ffffffffffff00000a000600ffffffffffff00000a0006000802110000010000"], 0x50}}, 0x885) ioctl$SNAPSHOT_SET_SWAP_AREA(r2, 0x400c330d, &(0x7f0000000180)={0xb3, 0x718}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) r6 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x3d, 0x0, &(0x7f00000002c0)) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e24, 0x7, @remote, 0x8}, 0x1c) setsockopt$sock_int(r6, 0x1, 0x7, &(0x7f0000000040)=0x4, 0x4) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080)=0x101) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000000)={0x0, 0xffff, 0x0, 0x1}, 0xc) 08:35:46 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x40210}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'xfrm0\x00'}) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @broadcast}}}], 0x20}, 0x0) 08:35:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r2, r1, 0x0, 0xfffffdef) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) ioctl$BTRFS_IOC_QUOTA_CTL(r0, 0xc0109428, &(0x7f0000000000)={0x1, 0x7fff}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x284000, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0xc0189436, &(0x7f0000000080)) 08:35:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r3, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) 08:35:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000008f40)={0x2, &(0x7f0000008f00)=[{0x54}, {0x6}]}) r0 = gettid() syz_open_procfs(r0, &(0x7f00000012c0)='smaps_rollup\x00') perf_event_open(0x0, r0, 0x100000000, 0xffffffffffffffff, 0x9) 08:35:46 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f00000001c0)=""/83, 0x53, 0x4) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000300)={0xffff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xcf, "206eb222b5051f"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000100)={{r2, 0x20, 0xac9, 0x3f, 0x0, 0x7, 0x800, 0x6, 0x8001, 0x4a5, 0x7, 0x4, 0x4, 0xc298}, 0x8, [0x0]}) [ 388.587956] audit: type=1326 audit(1668414946.940:12): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10880 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f66d3f6eb19 code=0x0 [ 388.966515] syz-executor.2: attempt to access beyond end of device [ 388.966515] loop2: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 388.967426] buffer_io_error: 22 callbacks suppressed [ 388.967436] Buffer I/O error on dev loop2, logical block 10, lost async page write [ 389.108576] syz-executor.0 (10859) used greatest stack depth: 22872 bytes left [ 389.410913] audit: type=1326 audit(1668414947.764:13): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10880 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f66d3f6eb19 code=0x0 [ 396.684551] Bluetooth: hci7: command 0x0406 tx timeout [ 402.590230] loop2: detected capacity change from 0 to 40 08:36:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:36:00 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f00000001c0)=""/83, 0x53, 0x4) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000300)={0xffff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xcf, "206eb222b5051f"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000100)={{r2, 0x20, 0xac9, 0x3f, 0x0, 0x7, 0x800, 0x6, 0x8001, 0x4a5, 0x7, 0x4, 0x4, 0xc298}, 0x8, [0x0]}) 08:36:00 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x428, 0x1, 0x0, 0x0, 0x6, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x28}}, 0x0) r2 = dup3(r0, 0xffffffffffffffff, 0x80000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="00000000dd5fb75c1a8dd8060000000000000004fe", @ANYRES16=r3, @ANYBLOB="00082abd7000fddbdf25170000003ae41a00ffffffffffff00000a001a00080211000e0000000a001a00ffffffffffff00000a000600ffffffffffff00000a0006000802110000010000"], 0x50}}, 0x885) ioctl$SNAPSHOT_SET_SWAP_AREA(r2, 0x400c330d, &(0x7f0000000180)={0xb3, 0x718}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) r6 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x3d, 0x0, &(0x7f00000002c0)) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e24, 0x7, @remote, 0x8}, 0x1c) setsockopt$sock_int(r6, 0x1, 0x7, &(0x7f0000000040)=0x4, 0x4) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080)=0x101) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000000)={0x0, 0xffff, 0x0, 0x1}, 0xc) 08:36:00 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x428, 0x1, 0x0, 0x0, 0x6, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x28}}, 0x0) r2 = dup3(r0, 0xffffffffffffffff, 0x80000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="00000000dd5fb75c1a8dd8060000000000000004fe", @ANYRES16=r3, @ANYBLOB="00082abd7000fddbdf25170000003ae41a00ffffffffffff00000a001a00080211000e0000000a001a00ffffffffffff00000a000600ffffffffffff00000a0006000802110000010000"], 0x50}}, 0x885) ioctl$SNAPSHOT_SET_SWAP_AREA(r2, 0x400c330d, &(0x7f0000000180)={0xb3, 0x718}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) r6 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x3d, 0x0, &(0x7f00000002c0)) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e24, 0x7, @remote, 0x8}, 0x1c) setsockopt$sock_int(r6, 0x1, 0x7, &(0x7f0000000040)=0x4, 0x4) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080)=0x101) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000000)={0x0, 0xffff, 0x0, 0x1}, 0xc) 08:36:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x2c0480, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fsetxattr$system_posix_acl(r2, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0200000001000000000000d052733989e400040000000000000010000000000000002000"], 0x24, 0x0) renameat(r1, &(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file1\x00') r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_aout(r4, &(0x7f0000001180)=ANY=[], 0x220) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000240)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0xc}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r4, r0, 0x0, 0xfffffdef) 08:36:00 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:36:00 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x40210}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'xfrm0\x00'}) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @broadcast}}}], 0x20}, 0x0) 08:36:00 executing program 5: setfsuid(0xee01) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000001580)='./file0\x00') stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) setresuid(0x0, r0, 0x0) ioprio_get$uid(0x0, r0) 08:36:01 executing program 5: sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(0xffffffffffffffff, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x40210}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x410880, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000003c0)={'veth0_macvtap\x00'}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000500)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000400)=0x80, &(0x7f0000000300)=@isdn, 0x0, 0x80800}, 0x3) r2 = syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x39a}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) syz_io_uring_setup(0xa7b, &(0x7f0000000540)={0x0, 0xb480, 0x8, 0x2, 0x1ec}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) syz_io_uring_setup(0xcb8, &(0x7f0000000180)={0x0, 0x388b, 0x10, 0x1, 0x1fb}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f00000006c0)=0x0, &(0x7f0000000700)) syz_io_uring_submit(r3, 0x0, &(0x7f0000000680)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000640)}, 0xd1) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) ioctl$SG_EMULATED_HOST(r4, 0x80081270, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_POWER_SAVE(r4, &(0x7f00000004c0)={&(0x7f0000000200), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r5, 0x200, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x62, 0x7d}}}}, [@NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x855}, 0x20044801) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) 08:36:01 executing program 1: ioctl$CDROMREADMODE1(0xffffffffffffffff, 0x530d, &(0x7f0000000800)={0x6, 0x0, 0x20, 0x81, 0x6, 0x89}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448cb, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f00000004c0)) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000001600), 0x400000, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$CDROMREADALL(r2, 0x5318, &(0x7f0000001640)) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000004b80)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @private}}}, 0x108) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) bind$bt_hci(r2, &(0x7f0000000000)={0x1f, 0x3, 0x3}, 0x6) 08:36:01 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x428, 0x1, 0x0, 0x0, 0x6, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x28}}, 0x0) r2 = dup3(r0, 0xffffffffffffffff, 0x80000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="00000000dd5fb75c1a8dd8060000000000000004fe", @ANYRES16=r3, @ANYBLOB="00082abd7000fddbdf25170000003ae41a00ffffffffffff00000a001a00080211000e0000000a001a00ffffffffffff00000a000600ffffffffffff00000a0006000802110000010000"], 0x50}}, 0x885) ioctl$SNAPSHOT_SET_SWAP_AREA(r2, 0x400c330d, &(0x7f0000000180)={0xb3, 0x718}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) r6 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x3d, 0x0, &(0x7f00000002c0)) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e24, 0x7, @remote, 0x8}, 0x1c) setsockopt$sock_int(r6, 0x1, 0x7, &(0x7f0000000040)=0x4, 0x4) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080)=0x101) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000000)={0x0, 0xffff, 0x0, 0x1}, 0xc) 08:36:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) 08:36:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) 08:36:01 executing program 3: prctl$PR_SET_DUMPABLE(0x4, 0x2) prctl$PR_SET_DUMPABLE(0x4, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) prctl$PR_SET_DUMPABLE(0x4, 0x2) keyctl$clear(0x7, 0xfffffffffffffffa) getpriority(0x2, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_GETPARAMS(0xffffffffffffffff, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$HIDIOCGFLAG(0xffffffffffffffff, 0x8004480e, &(0x7f00000003c0)) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, 0x0, 0x20004000) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x400, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc) sync() ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan4\x00', 0x0}) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000300), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_TX_POWER(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="a5eb6457be3818edb356eaa23d2bbde803b00856", @ANYRES16=r1, @ANYBLOB="856c00000000000000000c000000080001000100000008000300a11ebd80566b592d99f4b6a632a90896c28d39e141342c493a12d1b2d3d51b371cf6e3f2498e1fe1ea2599ab96ab289675afbde0cd9ba19295fb1eac57444eff23e885d7211b0e9fc40a1f9aa678c706de96afaa84d2cf2b9918adfaeabc404d54d155de57a0fbf726250f58eceff8efabd837063e2af0fb54655e7f0000d90bcd1dd29f721cb4b8aa030854d95618e469d99a45d2c81dbfa117c2f0c3cb2c6e81515f1248c683947ec8b5", @ANYRES32=r2, @ANYBLOB="42ee238162b6c8bc3a8dcad42617866a76c855722068c1513a1e88e767a7f7b4f0c895b7"], 0x24}}, 0x0) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x48, 0x0, 0x4, 0x70bd28, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r0}, @NL802154_ATTR_PAN_ID={0x6}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000010}, 0x4008840) 08:36:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) 08:36:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:36:01 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:36:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x2c0480, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fsetxattr$system_posix_acl(r2, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0200000001000000000000d052733989e400040000000000000010000000000000002000"], 0x24, 0x0) renameat(r1, &(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file1\x00') r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_aout(r4, &(0x7f0000001180)=ANY=[], 0x220) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000240)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0xc}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r4, r0, 0x0, 0xfffffdef) 08:36:01 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x1, 0x0, 0x0, 0x292c820, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access', 0x3d, 0xee00}}]}}) 08:36:16 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000400)='./file0\x00', 0x40000020) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getuid() getuid() setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0)=@v3={0x3000000, [{0x0, 0x3f}, {0xffffffff}], r4}, 0x18, 0x0) mount(&(0x7f0000000180)=@nullb, &(0x7f0000000200)='./file1\x00', &(0x7f0000000380)='logfs\x00', 0x2000000, &(0x7f00000003c0)='/dev/loop') pwrite64(r1, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) mount(&(0x7f0000000880)=@loop={'/dev/loop', 0x0}, &(0x7f00000008c0)='./file1\x00', &(0x7f0000000900)='ceph\x00', 0x4860, &(0x7f0000000940)='system.posix_acl_access\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000005d80)=ANY=[@ANYBLOB="010000e10200000018000000", @ANYRES32=r0, @ANYBLOB="0500ff7f0000ff0000"]) accept4$unix(r3, &(0x7f0000000300)=@abs, &(0x7f0000005e40)=0x17, 0x800) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r2, &(0x7f0000000440)={0x20000000}) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x7, 0x6, 0xf9, 0x1, 0x0, 0x8001, 0x2002, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f0000000240), 0x9}, 0x1002, 0x9, 0x4, 0x5, 0x9, 0x20, 0x1ff, 0x0, 0x2, 0x0, 0x859}, 0x0, 0x1, 0xffffffffffffffff, 0xb) 08:36:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:36:16 executing program 5: sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(0xffffffffffffffff, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x40210}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x410880, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000003c0)={'veth0_macvtap\x00'}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000500)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000400)=0x80, &(0x7f0000000300)=@isdn, 0x0, 0x80800}, 0x3) r2 = syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x39a}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) syz_io_uring_setup(0xa7b, &(0x7f0000000540)={0x0, 0xb480, 0x8, 0x2, 0x1ec}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) syz_io_uring_setup(0xcb8, &(0x7f0000000180)={0x0, 0x388b, 0x10, 0x1, 0x1fb}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f00000006c0)=0x0, &(0x7f0000000700)) syz_io_uring_submit(r3, 0x0, &(0x7f0000000680)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000640)}, 0xd1) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) ioctl$SG_EMULATED_HOST(r4, 0x80081270, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_POWER_SAVE(r4, &(0x7f00000004c0)={&(0x7f0000000200), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r5, 0x200, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x62, 0x7d}}}}, [@NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x855}, 0x20044801) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) 08:36:16 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000400)='./file0\x00', 0x40000020) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') unlink(&(0x7f0000000440)='./file0\x00') lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) getuid() setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0)=@v3={0x3000000, [{0x0, 0x3f}, {0xffffffff}], r2}, 0x18, 0x0) mount(&(0x7f0000000180)=@nullb, &(0x7f0000000200)='./file1\x00', &(0x7f0000000380)='logfs\x00', 0x2000000, &(0x7f00000003c0)='/dev/loop') pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) mount(&(0x7f0000000880)=@loop={'/dev/loop', 0x0}, &(0x7f00000008c0)='./file1\x00', &(0x7f0000000900)='ceph\x00', 0x0, &(0x7f0000000940)='system.posix_acl_access\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, &(0x7f0000000300)=@abs, &(0x7f0000005e40)=0x17, 0x800) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000240)={0xd0002006}) 08:36:16 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:36:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x44142, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x80, 0x2, 0x36, 0x8, 0x3f, 0x0, 0x8001, 0x8000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0xb}, 0x2040, 0x1f, 0xc500, 0x9, 0xfffffffffffffff8, 0xfffffff7, 0x7f, 0x0, 0x2e8b0e, 0x0, 0x200}, r0, 0x9, 0xffffffffffffffff, 0x7) r1 = pidfd_open(0x0, 0x0) r2 = signalfd(r1, &(0x7f0000000080)={[0xffffffff]}, 0x8) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file1\x00'}) read$ptp(r0, &(0x7f0000000380)=""/4096, 0x1000) 08:36:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001840)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x400, 0x100000001}, 0x50119, 0x0, 0x0, 0xc, 0x0, 0x0, 0xafd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r1, &(0x7f0000001140)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x80800) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000040)=0xfc6, 0x4) r3 = getpgrp(0x0) setpriority(0x2, r3, 0x401) perf_event_open(&(0x7f00000011c0)={0x0, 0x80, 0x1, 0x80, 0x0, 0x2, 0x0, 0x80, 0x21100, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x1000, 0xd3}, 0x10000, 0x9, 0x1ff, 0x5, 0x5d36b58d, 0x20, 0x5, 0x0, 0x2, 0x0, 0x2}, r3, 0x10, r1, 0x2) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000140)=0xffffffffffffffd2, 0x12) r4 = openat$cgroup_ro(r0, &(0x7f0000000100)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_START_AP(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="2c12777ed56afa6a87e843000000", @ANYRES16=0x0, @ANYBLOB="050000000000000000000f00000008000300", @ANYRES32=0x0, @ANYBLOB="060096000200000008000d0000000000"], 0x2c}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r5, 0xd000943e, &(0x7f0000000500)={r6, r7, "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", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH(r4, 0xd0009411, &(0x7f00000018c0)={{r7, 0x1f, 0x8, 0x7, 0x100, 0x5, 0x5, 0x500a, 0x0, 0x4, 0x5, 0x23, 0x67, 0x374, 0x80}}) 08:36:16 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:36:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 418.109823] loop3: detected capacity change from 0 to 264192 [ 418.180791] loop3: detected capacity change from 0 to 256 08:36:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:36:16 executing program 1: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0xfe, 0x3, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff8}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f0000000380)=""/9) read(r0, &(0x7f00000003c0)=""/4096, 0x1000) shmat(0x0, &(0x7f0000ff6000/0x1000)=nil, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) shmget$private(0x0, 0x1000, 0x8, &(0x7f0000ffe000/0x1000)=nil) shmat(0xffffffffffffffff, &(0x7f0000ff2000/0xe000)=nil, 0x5000) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x1, @perf_config_ext={0xe6eb, 0x10001}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x8, r0, 0x1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x20, 0x5, 0xdd, 0xda, 0x0, 0x1, 0x24, 0xd, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_bp={&(0x7f0000000180), 0x1}, 0x480c0, 0x2, 0x9, 0x4, 0xc, 0x2, 0x120, 0x0, 0x400, 0x0, 0xd273}, 0x0, 0xe, r1, 0xc) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000005, 0x40010, 0xffffffffffffffff, 0xf871a000) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000300)=""/69) socket$netlink(0x10, 0x3, 0x0) mbind(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000)=0x35, 0x1000, 0x1) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x9, 0x0, 0x7, 0x11, 0x0, 0x7fff, 0x8000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x6, 0xfff}, 0x40, 0x10001, 0x20, 0x8, 0x73e, 0xffffffff, 0x9, 0x0, 0x9, 0x0, 0x3}, 0x0, 0x9, r0, 0x1) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 08:36:16 executing program 2: perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x8) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="e69595f873ac99d1e17c237274667a00"/30], 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xd}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsopen(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000001340)={0x0, 0x0, "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", "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"}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x581882) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000003280)={0x0, 0x0, "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", "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"}) write$sndseq(r2, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0xfd, @tick, {0x6}, {0x2}, @quote={{0xf7, 0x1f}, 0x2, &(0x7f0000000100)={0x3f, 0x7, 0x65, 0x20, @time={0x2, 0xf364}, {0x3, 0x4}, {0x5, 0x1}, @note={0x1, 0x6, 0x1, 0x7, 0x9f}}}}], 0x1c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) [ 418.356700] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 08:36:31 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) 08:36:31 executing program 1: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000001f00)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000440)=""/171, 0xab}, {&(0x7f0000001d80)=""/236, 0xec}, {&(0x7f0000001e80)=""/83, 0x53}, {&(0x7f00000001c0)=""/61, 0x3d}], 0x5, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x40}, 0x40) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xbe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4309}, r0, 0x9, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x101000, 0x20) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000200)=0xc) getpgrp(r1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) syz_io_uring_setup(0x92e, &(0x7f0000001f80)={0x0, 0x2, 0x0, 0x0, 0xd5}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000500)) 08:36:31 executing program 5: sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(0xffffffffffffffff, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x40210}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x410880, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000003c0)={'veth0_macvtap\x00'}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000500)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000400)=0x80, &(0x7f0000000300)=@isdn, 0x0, 0x80800}, 0x3) r2 = syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x39a}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) syz_io_uring_setup(0xa7b, &(0x7f0000000540)={0x0, 0xb480, 0x8, 0x2, 0x1ec}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) syz_io_uring_setup(0xcb8, &(0x7f0000000180)={0x0, 0x388b, 0x10, 0x1, 0x1fb}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f00000006c0)=0x0, &(0x7f0000000700)) syz_io_uring_submit(r3, 0x0, &(0x7f0000000680)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000640)}, 0xd1) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) ioctl$SG_EMULATED_HOST(r4, 0x80081270, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_POWER_SAVE(r4, &(0x7f00000004c0)={&(0x7f0000000200), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r5, 0x200, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x62, 0x7d}}}}, [@NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x855}, 0x20044801) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) 08:36:31 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:36:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:36:31 executing program 6: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000001600)=""/229, 0xe5, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002034f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) syz_io_uring_setup(0x2c27, 0x0, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, &(0x7f0000000440)) openat(0xffffffffffffffff, 0x0, 0x0, 0x25) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x401, 0x9) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r1, r0, 0x0, 0xfffffdef) 08:36:31 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x49, 0x1, 0x59, 0x0, 0x101, 0x4010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000100)}, 0x230, 0xfffffffffffffffb, 0xfffffffc, 0x7, 0x20, 0x9, 0x3, 0x0, 0x8, 0x0, 0xfffffffffffffe01}, r1, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x2, 0x5, 0x81, 0x6, 0x0, 0x101, 0x20100, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x80000000}, 0x14104, 0x7, 0x1, 0x9, 0x8147, 0x2, 0x8001, 0x0, 0x7, 0x0, 0x40}, 0x0, 0x10, 0xffffffffffffffff, 0x1) 08:36:31 executing program 2: syz_emit_ethernet(0x362, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) syz_emit_ethernet(0x22, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000001803700000c030000800e0300008c0d204f247a9454"], &(0x7f0000000040)={0x1, 0x2, [0x60c, 0x6d5, 0xe81, 0xcd8]}) [ 432.774231] loop3: detected capacity change from 0 to 264192 08:36:31 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) 08:36:31 executing program 0: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) r1 = socket$inet6(0xa, 0x5, 0x10000) sendfile(r0, r1, &(0x7f0000000000)=0x8, 0x81) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f00000004c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_ASYNC_CANCEL, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x37a1, 0xfffffffb}}, './file0\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r3, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x2, 0x0, r2, 0x0, r3, 0x2, 0x0, 0x1, {0x0, r4}}, 0x458e) epoll_create(0x4) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup(0xffffffffffffffff) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_mtu(r5, 0x29, 0x31, &(0x7f0000000000), 0x4) setsockopt$inet6_IPV6_RTHDR(r5, 0x29, 0x39, &(0x7f0000000040)={0x3a, 0x10, 0x1, 0x7, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @empty, @loopback, @mcast1, @private0]}, 0x88) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000000000}}, 0x0, 0xc, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:36:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 433.169103] loop3: detected capacity change from 0 to 256 [ 433.267022] Process accounting resumed 08:36:31 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000400)=ANY=[@ANYBLOB="08000000d3000000b2c487db10fb72d2ae6f2092a818ccf13470fc8fb68392f8d8a936f80d9680a3f3ccc417590435f9ae79d5a5c01e044c810790a4f62381e796c4f2c31f62acd86d898ddad163bf26c302a32bf7a7bf16e2c35e747b2a1ac8e412171b72aab647b34ce934435fce467542cc2f90391b940a40ad80e62de6c73fb38296d04a0a2b5945da9c76fae5941559d5059a488fb17085657b64533528d174238c5c03127c8a29fe43af9303e1dc88555c000020436f84cf6f50d5122ce92fec05eba2c591d5d590e3abe4d38f4d43b9efdefbaec5f9dbae1990d820af9a59ffb7"]) mq_open(0x0, 0xc1, 0xb2, &(0x7f0000000040)={0x0, 0x7, 0x8001, 0x8}) preadv2(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/126, 0x7e}, {&(0x7f0000000180)=""/102, 0x66}], 0x2, 0xffff, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x4d031, 0xffffffffffffffff, 0x0) 08:36:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 433.449568] Process accounting resumed 08:36:31 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) lseek(r0, 0x0, 0x4) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, @perf_bp={0x0}, 0x0, 0x4, 0x4000000}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000005e2c0)={0x0, 0x0, "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", "950b8bbc34bf9b44a5f783e82416e13437591aaea9e99d56d9fa2b62c996fb937ef8e5bb361a4eb72e3b338b3d456d93c2993fc14a84c9df4fca9a60ad24fe51c5a3fc272feb82e0053d62793dcbb53a9aac338c90f5cdae9589decd38f50a09d93770fe9fffa2570bae21a6c16607cb009087b6f6850ff959c7cde98a4e32896d4e19a961e665ed3624ef5c69dc0964b4e762a597e962c8f0c77006ae2c2e61c9d589d8075d51ad024b5e6af6d9ad992d0bf7c9b663e91485d32a9e7ee3febf65c5d7f7d8cf1d6ee7a1d12df1d9a056d2c44371e7d7376e0baa911ce2fb91f811506149e1b2bcf3dc0e9c94a294388d4636547a098e57bad5c0bf1ee2d21aabc22fc193ed1e85886abdeb6944ead2082984e3b7724633f58c76185a0e7814cf6745bb5ca89b88abdf102a0bcf9fb0c1b2eed6553ee3a0eab3b9bcebf70187adf95f5a2564a6d081679f6988f7e0fffda8c75027eec9fd9177d245704a2f1348f6aa2141357964efb85de30e3be48ba72b34f46a53c393aacb648b728316adf6edc89a128dac296e8022e3457cda709d3f4ee82e744910890ba79420b32572d19d21d965bb5f7be6713d2aff1c6a47589d00d173a4f7f75c191247fb6eea511c85f1f2ca3389aeec86fa05b79a53eadd44f6928fd6492e18d1de7614e68ab21dfd71508786e535de92de39236ea42fbaa81ae85784b5c24c89f6bee084493fc227b3c9f620efa3b7c13b48c1bd1bc20f5972f2a94a68b6717e2f0524741ee7d55a39eee078436f0af9a982a0953bd1cd57849007d08bfbf1dfe814c8448539baa1c5b8ced883da94c7b946cb9e205c83941172aa1bc8e710fe6efec7ef16639408348485e6890ea289fabb6a872c634aa21059ca2bd3cf3deae4bfada536780a9f11ef2a84a17bc2e5ffefc8b7f1aa708f2d89e496578b78381a82916a7a2b36413b76171af62915c76d20d2ec695f0d7dd0ae6a5a890e1070500a62f4267321900efe7073474e030a3ab8086275b552ac0ca8e94f438307b354e39005cddc582c5da0f3753b37643cc13bdff1efef66055f16e871e8ad26a502e5e7509d05f98f32f3f0b5d563c498e860b5b931e36ccd1e7d7f5a0904288aecd9c6a5bbda28d43169cb7967d69d124f5cf6fd1574ba9a9eabd5b8b0b27bb48ac5659c2734e21eb8cd71ba8c7fd8ff7b7cb65d7d127ff0f53fc25d2f3eb05586d7299eb8cb1eb255a460c9a05151ceead842b1c21e8c19ebecf6cb1a7f9a19a254c9e39bfbcb905d6d0265b37fae4d15ef8e4c56f82bf976662e0d258c2e7ba2ebe6ca3e9ea3d0ea52ee8b67d8f318a2a27a716977d4fe916264e11788a1e80dde6a0100b156b89f11e4e3bf78c66d535e46477fcd9f568578523406f21a6796ac3c1e0f6ba31a471f359579b103299799606a766a1ca7148c153d85c5420bd1e1ee0564c08c88dec5d248eccf1f63cf01015197f6a3fa61a598e8ad327cd6dfe3cf9f0b4e685dc0e9b10908f68b2290a3741a90991e1f67c04015a780a87c89644280b032722ceb2531bbed8e4459edad3409cbe1ddfd071052277cd908cebe5c00009c3f3a33b9ec60b200e700eb9d48954461c82591a5ffeec87f12d081d30e4c61999879c607cc653a3b2478439b42ea05b469534f20653d8d61a55e9761dd331386109af0b2453eb2e8ba54e7c16e890727c133b442956db67278d661166a9290d4fe8008821649eeefba119ba3776597654a546611693db7b3fc63aa2d01047dbf8a6db146b0fcf3afc8d819575f642dc87ffbd0a42bb68c20f1ea1dac2804db95adab571d2ca60c679a8db02ba3cd5765713e5c3748205b56fd3f6f6e32f628c5b986b1f9d218df36b03db78ee74544555dfa7506a939f48c10a9df0620a841f7e9c67cbf5b367c4c0bbd69b76956326f1737d143d49619691433473fd5fed20fc5710ff0f7c6288a4071f02f741532e3080d59b039466ab62972ecc563ee511e8a9d56fa7179569f1d2420ddc90c62d654331771dd8515ecb6d9030901de113996870c1d921fca0d39a5da13183ab12506008f3074a26ef1990fdabfea0d42d346748959a35e0e07c447c03a591c54ae61186cf579e2636e89d3b3f06c5a019330dbb2d313cff036624a789abb4d5a76ea83e31774be2280de447a053e29a2cb6c4fe62292b61e6513098cc0269a6d526aab3dba820ebe9408839a8f96a5cd09bb29dd6e1b2bdfd31d6b93ceb47976f6650f0c294b061fd25118d364cb0654b0f87741953c3fb2a590394179678b1fab1390db08d599bc418f168f4aa56ebbf3fc9f1597151c83e989770349402695c8b2bfd2b488e0735a071650d4fe1420804c66ce4261424f60424c0390397e7eea3ca904173b8620d74799ae84204abc9548801f3ca29973a33110c6b13d0aaaf316948e1d6fb99ca3150864361418d7f05f39ba7b9026a356f185ad23542e6f0af8d71989486bde21d7451acf86bab6ed27271f395ab31e88e6cd6ff6da710e6ae680fc1711a1319694f9ac56cdcfd46a10db35295627a7dcd4c605e98e455164ff21927b904929973b7520f752b76e6cd3732e540371fd78a5a42611f42d0b185d213a47abd2dfdc37c79894d3323900631655bc263fb5e8aa6b6f32c9f8ced4acc81c6d4bc95fa48faee5697d4221cc576bae07afe10057cf40423318fcd32c3158d65eb770728028f8e5354069ec4f4f63b9a4cd68172397bfa5371a43697e7bc26d777c55ce5f0a225324397a7567b0b969604db7d32c95b05017db53bad3cc1ac3f3d3bc0287d7794f9baf0f1a7064258586e39743dc150637d84c47fce0feb9e9f3c1fbddcdc9de4a1011a54cf9a74fd28b029f0bfb45f723e4dbe9910a203e98fdbe6fa0d562ead671d5ecaba5f2f29d8e37dcae6b3b6e0cc4917ef4da6b9f0baacbc51840ebaf85f0f7d11897d8887a35d99f50eedefcb07913a665d0843f68a73767df874c5995936bf5c03bf40ff54e179c094127af6254e22da82484472eca7a48bf932c2470ad5c6bc43b2392ebae24692e73ae1c6e0c03eb958b78952531156d7509da69cfd9d8e5068e560fc7f28a974490ecbbc79aafb65f525e5b8d04aaed3b683c6b23703d6ff361f5bd57a9b62ffa5e994b9bbaaf582688f78bc13ef909f9634324fbf6859646b673e2b1d80f56a58bffdac390c245d8cc3036da0e6656f24af365da36ec6cc74847ccfb4a36115c1f19cc6e848f909089a2ac660d1223765295f37c442f987ed98b3f7b3b963213d2e6289b147c80dfc239800f0d48d37fc4739fa521dd686f5413261a9cd06f1c09c598d3d91e66db106ef212c3a1b8c02834f9cc3634ca938df7a478c25b55f0c654bc4f70057a60a7bbf02706f048329d3ad3052f23b698b8ffb97085f121249359320efff2add0c35db60e7cf74e0169e9cf13c0c3725768fea6e928a213e61bae007bc307e4fe63b0905772c469747b5884509acce8b7c368b417b44460d6e5d3ab9dec690c43a029122ba37216d48a0d7eb519fcd0257df3a693711ffa60c8a3855713f359c3780f4a40694982d7ce84e40f03faaf942730e9daa8777d7a8909999df47955ea430bb443789f047066426df0a7fe04f741420b0db3c5e54f0b03e60b5897e96c4bf34f324ef899b9ea4b36c44b2496f043e7be07f3a58bb094caab78f168d9486d0dfd1adc97ae3ce5e710a9e47e6b5f8360417d1462acb4062057dda820c5d4b4cc90a13732fc2b52b12b2d255cb01f529a597e5ee29eb36e0c479896ae189103580a633c4a09621043df2205d00b45a84cd8ebe81c483cdf66994827672942dba7674e2090829a33744394e7b9c81ff273a5df6e0eceaa9b2abad932c8740d3b0b977e91fc03f4020a4459fa582d48673215c14f0da08a82a67b8bb804915c9d1218d7a9de94033a32725f30f9f9e81987d63cca018d12c3894b7fbeb95901f382bdee8595b2e6b7f42d0ada636db6e000625dfaa79a6309b2dd279fff258cefcc044a06bdbe489230ffdd90efdda0df2da52742a59e24b8c50ec68790fc62207ac2cd6d4997d6a4faa5e2645e30228f39094750eef3ce56b1569438750ff50130c64e8f37d8ff49fa9d9c0d409e9f60f347cb386946ce117b4c40a9a53c7359d3a966c7326263270eb16876ff1e6da42a73a634ac661327a916b8416bac1bb49a5e9b8da0dc7170d833d07df1fab73a7f202aaa768049efefc4b399611a6fdbe29aaccfb6416be56f30e9fce9602d0cf57c1c70b321974e3518434ca828f1a51d4191b99e0e0a7451ba3b4f2b5cf95b44fc417abcc5b0b13bae366614f75c98aade49013475086a48d9e64ba7701d6aa7997132e56b97b962921a73e7a70de0f32c06d0117b24708867f7247024a28096607669001e87ec188812d0eab256b0296e0f70c47c6ca89dd511c1362523930a546a44ebc421e03e979a5bba49732d437d82e7555e5a10c4a1fd933c6c50380d3d7a147586e4033005f533f7ade992af2696c4d122311a473f97644095805a18da9d0b52e2f72dd386a3d14f478c7ba144503ee2e94bfb3853fb37adca2f7bf51872fd3a54e392c8b6dbf142c6ae83ca21575ca6a1d3fa1b1de90f4a816d093561f88f6e6aaf782d08c798147a64851759b8667a1531da2d571e1457edd13d7d0929ae02daed710e9ae1a2796e38a1c2921dd2fd57f825f4cf95f02e34e9cf3e894d57cfde113224210caec0b4ab2901262b6e36d96ea1febc8c73a12f0e40f6b47b13709cfecbec1420fcb5cdc2b5986d0a54fe0459ba5f77b90bc9d2cbdd86663910fed740f6f41d94cb1b3818a550f8da00f6d17b150e4872fec8712a7490a1782a82b9680ceeeb41fdb8c95c1d3d574437d3bd1915020d96e411978c1738d7683b62f5dbf6280dc72860a2b6fa1de548e6a22987f1d3b5eb010172d7c684e9943e32b140fc51cd8c7046a2cc604244a7aad63a9edd2f64c31c8fe127a2cb965ac0a374b24e475bc78f4cbdda40b39b282af1d192bd2a967fc6b7811f8ef8be8d65cd8d3ddbf1e69989c073a16c9c1896ca8a734bc6a4df17d39d30a8b8c1ec3d93534747e8e9a769f60a9e10cc69ea5903993bc481630e1df50eedc1a1a51d96de8fcd27a3ba4108349c92d52b81886d19217b10508527634c58af2806b2dae8c71aaeb6946896decd03266a75bccf676d86064188d0da683b3b38a3c03fc22bbf6c8d8bdea829bc5aa5d5521da096718aa6a629f174e510b1215b49f27db3c145555baa329d15de80976748b68648482cb8cf9e79cc3acefe4d8436c04e882934abc30ac5886d10a54b759f1b4407d1ea9d8cc1049e4f60c9dc96dbda9dbc581d31bb3dcfe32598bac97974d6c8625a2be3d48ef98edfbf0725cc18f21b50a67b0de8ff6544cd67ce0d43fcc1d248"}) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x6, 0x7, 0x4, 0x59, 0x0, 0x6, 0x4, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_config_ext={0x2, 0x2}, 0x11040, 0xffffffff, 0x7f, 0x3, 0x1, 0xb3, 0x5, 0x0, 0x5, 0x0, 0x2}, 0xffffffffffffffff, 0xc, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf470, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) waitid$P_PIDFD(0x2, r2, 0x0, 0x80000009, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r3, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) process_vm_readv(r4, &(0x7f0000000a00)=[{&(0x7f0000000600)=""/252, 0xfc}, {&(0x7f0000000140)}, {&(0x7f0000000700)=""/121, 0x79}, {&(0x7f0000000840)=""/171, 0xab}, {0x0}, {&(0x7f0000000900)=""/209, 0xd1}], 0x6, &(0x7f0000000400), 0x0, 0x0) clone3(&(0x7f0000000480)={0x100008100, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), {0x3}, &(0x7f00000003c0)=""/147, 0x93, &(0x7f0000000240)=""/28, &(0x7f0000000300)=[r1, 0x0, r4], 0x3}, 0x58) [ 433.571158] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 08:36:32 executing program 0: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) getpeername(r0, &(0x7f00000003c0)=@hci, &(0x7f0000000440)=0x80) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r2, r1, 0x0, 0xfffffdef) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8982, &(0x7f0000000480)={0x8, 'syzkaller1\x00', {'wg2\x00'}, 0x7}) r3 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x410600, 0x60) fcntl$getownex(r1, 0x10, &(0x7f0000000280)={0x0, 0x0}) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x2, 0x6, 0x0, 0x1f, 0x0, 0x7f, 0x58188, 0x5, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xffff7fff, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x1001, 0xec, 0xc1, 0x0, 0x3, 0x2f76eb2b, 0x4, 0x0, 0x9, 0x0, 0x7f}, r4, 0x10, 0xffffffffffffffff, 0x8) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012abd7000fedb050000000000000c001473797a30000000000000000000000000b6532d7ad3545ae62c0279db29e0a30ed5c4a38b302ac824cd87dc1c41940279f016c2628519cdf8fd7bef5fc62e5fc880b8aa8c561f650fa46cbcc53489adda1f1e72562ff4cd4e1b53ada26de6e4b1dd84fbd7f8f45f58e6f863423b63836c39bbab6f66c7bbcf6e35568dc21c7afdad4163a2"], 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x4044800) r5 = socket$inet_udp(0x2, 0x2, 0x0) bind$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x200, @any, 0x5bd}, 0xe) setsockopt$sock_timeval(r5, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) fallocate(r5, 0x30, 0x52, 0x2) syz_io_uring_setup(0x1df8, &(0x7f0000000000)={0x0, 0xa844, 0x8, 0x0, 0xc}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f00000000c0), &(0x7f00000001c0)) 08:36:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:36:32 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:36:32 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r3 = syz_open_procfs(0x0, 0x0) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="000000edff0000002e2f66696c13dc00"]) r7 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETAW(r7, 0x5407, &(0x7f0000000000)={0x1000, 0x0, 0x0, 0x0, 0x10, "ddab93e1adcbd470"}) ioctl$VT_DISALLOCATE(r7, 0x5608) ioctl$VT_DISALLOCATE(r7, 0x5608) io_submit(r2, 0x4, &(0x7f00000005c0)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x3, 0xffffffffffffffff, &(0x7f0000000300)="666fd6fb7c4c8e8bf4059397e83e5ca7e7a13e2dbc305703a2c6a90bba95bb649867b6deabc9", 0x26, 0x4, 0x0, 0x3, r6}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x1000, 0xffffffffffffffff, &(0x7f0000000400)="bcf3b4f072b97e9c8e5e4369e898ea7d3b9aaf8d0633f79e97d0826da4635d97340e117a758d18b9fe61c37ab2832aa388c707228965f582216544e3d9b9e1d50f2085b8b532a2d6", 0x48, 0x1, 0x0, 0x1, r0}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x3, r7, &(0x7f00000004c0)="457e9ecce6f0e6267ca821ea89e945294a9d2c204cfc7e6ab54c199887166c29b9dd581d3b99a5afd0", 0x29, 0xffff, 0x0, 0x1, r0}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x7, 0x1, 0xffffffffffffffff, &(0x7f00000006c0)="caab5ab60cec2af461a1c275cab0df2622d311b22d15515e3c4d26fe7dddedecf8b1d9938e233d24e9941337524c7aaaa1ee7e747d80fbc3cca3eeec", 0x3c, 0xffffffffffffffff, 0x0, 0x1, r3}]) r8 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x101042, 0x1) r9 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r9, r8, 0x0, 0xfffffdef) r10 = openat$incfs(r5, &(0x7f0000000180)='.pending_reads\x00', 0x8c00, 0x2) fsconfig$FSCONFIG_SET_PATH_EMPTY(r9, 0x4, &(0x7f0000000040)='mountinfo\x00', &(0x7f0000000140)='./file1\x00', r10) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0x220) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2", 0x61, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="77221143c97f4c864ad65d770dc2067ba0a2c44e985ba474503529d64113a38dc3547de30cd58fb038b12681f7139b3c0e94799d85c31b1eb4cca3ac500be88e48b4b4d80b17892765096df72a8987ad00010000bf7099aaa496a71f67bb59e1fc0b94a6f5ce11f33c88d4f47a33149fbc027916bfb2e6da56af44f1810bdd60c907505a6e2e6c3a2ca760378c761d2d47d9a449d6fe040e79dffd0006486ceba33e9b5d5fed7cd480d56e5bd2c9b8dc86e35a926b80d823fbbc76cdeaef96169073909774d28d600432b5025e9486b7b1882cf91d61e2938893e19d240eaf7ac7bdd1e4a41d55802d521c89ed25f256f789831a996895ed18d628b4801f5620c7a9ff"]) 08:36:32 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) [ 434.033638] loop3: detected capacity change from 0 to 264192 08:36:32 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r2, r1, 0x0, 0xfffffdef) perf_event_open(&(0x7f00000006c0)={0x3, 0x80, 0x8, 0x3f, 0x7f, 0x7f, 0x0, 0xb2, 0x10, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000680), 0x8}, 0x8800, 0x2e, 0x3ff, 0x8, 0x3, 0x800, 0x7, 0x0, 0x10000, 0x0, 0x100000000}, 0x0, 0xffffffffffffffff, r2, 0x2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f00000004c0)=0xe8) setsockopt$sock_timeval(r4, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x600280, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000500)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB="1f000020f90000613000"]) setsockopt$inet6_int(r6, 0x29, 0x11, &(0x7f0000000540)=0x8, 0x4) r7 = socket$inet_udp(0x2, 0x2, 0x0) r8 = syz_io_uring_complete(0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000580)='-}/\x00') setsockopt$sock_timeval(r7, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) io_submit(0x0, 0x3, &(0x7f0000000240)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0xfff, r4, &(0x7f0000000040)="9c0db3e5f8dbdaa1b7015ba3a74058465dde4a28ff801e7b216fccad51cf5cdbf140be5b8630e69be1cfaecbb2a0e6a123df04e9b78d0ff2d72a519946ebfd90f83dbe17d0407ecc853e1feb97355ad923c0a41c9572b10c03c2cf70b4ec0d76b0a2cbfa643f6413b3f84415aebb272025f8831449a519b8819aa338a35ad57b7fb07c5b90eaf23e613dac5d6b16fd95028f53d8f54801fe", 0x98, 0x7, 0x0, 0x0, r5}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2, 0x7, r3, &(0x7f0000000180)="e9e996cc9accfd1f5dffd29bbd969cf0e53b1b", 0x13, 0x344, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x1f, r7, &(0x7f0000000300)="9c18ded1c52dac1cd59b40f5399f874c475e21489fe0e38077c7965bb18b43c5121557e3be8715b5a8923783edaa9a262a04d09eb4a569629ad0e91d53b131b4c7e9f287fc36c36b6c6f133b608b8b77858a4246ab5cbcff9d189d3dacdfc02c56270c6fa2cd447339b80fec77e341763a41abc1ca1a6ae1960999c786c8d8d27e4d359bcb58358b855acfb1ff71ab8bbfd301657098bddf8ad76fc910c723", 0x9f, 0xffff, 0x0, 0x2, r3}]) close_range(r0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000005c0)=ANY=[@ANYBLOB="014000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\a\x00\x00./fie0\x00\x00']) ioctl$sock_SIOCADDRT(r9, 0x890b, &(0x7f0000000600)={0x0, @qipcrtr={0x2a, 0x0, 0x1}, @generic={0x8, "068447e8de708a677ccf490f3918"}, @llc={0x1a, 0x313, 0x1, 0xd2, 0x7f, 0x5, @random="0154d5233b74"}, 0x7, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x40, 0x1d}) 08:36:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 434.092778] loop3: detected capacity change from 0 to 256 [ 434.185365] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 434.569943] Process accounting resumed 08:36:47 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) 08:36:47 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) 08:36:47 executing program 1: pkey_alloc(0x0, 0x3) pkey_alloc(0x0, 0x3) pkey_alloc(0x0, 0x2) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000007, r0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000007c0)}, 0xcc80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pkey_free(0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2, 0xffffffffffffffff) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r1, 0x40089413, &(0x7f0000000100)=0x8) r2 = openat2(r1, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x4641, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff], 0x4) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x200000a, r0) syz_io_uring_setup(0x75c8, &(0x7f0000000200)={0x0, 0x6d55, 0x8, 0x3, 0x35}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000380), &(0x7f0000000400)) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1) 08:36:47 executing program 6: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x1000, 0x401}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) utime(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)={0x1, 0x2}) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() socket$inet6_udp(0xa, 0x2, 0x0) fsetxattr$system_posix_acl(r3, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=r4, @ANYBLOB="02003f53", @ANYRES32=r5, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000002000020000000000"], 0x3c, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0)=@v3={0x3000000, [{0x0, 0x3f}, {0xffffffff}], r4}, 0x18, 0x0) r6 = epoll_create1(0x0) pwrite64(r2, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) mount(&(0x7f0000000880)=@loop={'/dev/loop', 0x0}, &(0x7f00000008c0)='./file1\x00', &(0x7f0000000900)='ceph\x00', 0x4860, &(0x7f0000000940)='system.posix_acl_access\x00') dup2(r6, r6) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000005d80)={{0x1, 0x1, 0x18, r1, {0x5}}, '\x00'}) syz_open_procfs(0x0, &(0x7f00000012c0)='smaps_rollup\x00') fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f00000003c0)={0x0, 0x0, 0x100, 0xfffffffffffff000}) 08:36:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:36:47 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:36:47 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000300), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000200)={'wpan1\x00'}) sendmsg$NL802154_CMD_SET_TX_POWER(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="a5eb6457be3818edb356eaa23d2bbde803b00856", @ANYRES16=r1, @ANYBLOB="856c00000000000000000c000000080001000100000008000300", @ANYRESDEC, @ANYBLOB="42ee238162b6c8bc3a8dcad42617866a76c855722068c1513a1e88e767a7f7b4f0c895b7"], 0x24}}, 0x4001) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r1, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x44004}, 0x40c1) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000001000)={&(0x7f0000000f80)={0x20, 0x0, 0x1, 0x0, 0x0, {0x22}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x20}}, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0), r2) [ 449.263948] loop3: detected capacity change from 0 to 264192 08:36:47 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) acct(&(0x7f0000000300)='./file0\x00') lsetxattr$trusted_overlay_nlink(0x0, &(0x7f0000000400), 0x0, 0x0, 0x1) chdir(&(0x7f0000000000)='./file0\x00') openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x800, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x100) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000001580)={&(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000540)="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", 0x1000}, {&(0x7f00000001c0)="1a68981495e89dd114332a526d5c43cf334a50754375f3b7bfad3c5bc8", 0x1d}, {&(0x7f0000000340)="b261bf83ea49967496189f4d92b33d8edb228c20", 0x14}], 0x3, &(0x7f0000001840)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r1]}}, @rights={{0x24, 0x1, 0x1, [r2, r1, r1, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40, 0x4000001}, 0x4040) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1255c2, 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) write$binfmt_aout(r1, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x245) openat(r0, &(0x7f0000000480)='./file1\x00', 0x14e81, 0x44) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1255c2, 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r3, &(0x7f0000000000)="1c", 0xf}]) io_submit(0x0, 0x53, &(0x7f0000001540)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x109023, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)) 08:36:49 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:36:49 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) 08:36:50 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000100)) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 452.077983] audit: type=1400 audit(1668415010.431:14): avc: denied { write } for pid=11099 comm="syz-executor.1" name="task" dev="proc" ino=20299 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 [ 452.082598] audit: type=1400 audit(1668415010.434:15): avc: denied { add_name } for pid=11099 comm="syz-executor.1" name="11107" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 [ 452.084250] audit: type=1400 audit(1668415010.435:16): avc: denied { create } for pid=11099 comm="syz-executor.1" name="11107" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:kernel_t:s0 tclass=file permissive=1 08:36:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) close(0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:36:50 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:36:50 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000100)) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 452.320768] loop3: detected capacity change from 0 to 264192 [ 452.331140] loop3: detected capacity change from 0 to 256 [ 452.346352] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 452.571241] Process accounting resumed 08:37:06 executing program 6: ioctl$CDROMREADMODE1(0xffffffffffffffff, 0x530d, &(0x7f0000000800)={0x6, 0x0, 0x20, 0x81, 0x6, 0x89}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) r0 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r4, r3, 0x0, 0xfffffdef) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000000)={0x80000000}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) epoll_create(0x5) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:37:06 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0xffffffffffffff67, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000040)='macvlan0\x00') sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 08:37:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) pread64(r0, &(0x7f0000000380)=""/52, 0x34, 0x9) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r3, r2, 0x0, 0xfffffdef) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r4, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) r5 = epoll_create(0x9) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) ioctl$FICLONE(r5, 0x40049409, r6) fallocate(r4, 0x5, 0x4, 0x6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r8 = epoll_create(0x80000001) r9 = creat(&(0x7f00000003c0)='./file0\x00', 0x3c) dup3(r8, r9, 0x80000) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x2000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@fscache}, {@posixacl}, {@cache_mmap}, {@privport}, {@cache_loose}, {@version_9p2000}], [{@smackfsfloor={'smackfsfloor', 0x3d, '(][%'}}, {@subj_user={'subj_user', 0x3d, '(,#!\a*'}}, {@euid_gt={'euid>', r7}}, {@seclabel}, {@dont_appraise}, {@context={'context', 0x3d, 'staff_u'}}]}}) mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='transno=\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',cache=fscache,\x00']) 08:37:06 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000100)) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:37:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) close(0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:37:06 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:37:06 executing program 1: io_uring_setup(0x443b, &(0x7f00000000c0)={0x0, 0x85c6, 0x2, 0x3, 0x1}) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x66, 0x424000) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TIOCL_SCROLLCONSOLE(r1, 0x560a, &(0x7f0000000f40)={0xd, 0x47}) 08:37:06 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) [ 467.833089] loop3: detected capacity change from 0 to 264192 08:37:06 executing program 5: openat(0xffffffffffffff9c, 0x0, 0x0, 0x80) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x7e12c0, 0x4) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) r2 = gettid() syz_open_procfs(r2, &(0x7f00000012c0)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000002, 0xc820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) [ 467.914724] loop3: detected capacity change from 0 to 256 [ 467.936543] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 08:37:06 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaaea788cce3fc4ee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xa0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ff3000/0x4000)=nil, 0x4000) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000140)=""/237) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) shmctl$IPC_RMID(0xffffffffffffffff, 0x0) finit_module(r0, 0x0, 0x0) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) r2 = fcntl$getown(0xffffffffffffffff, 0x9) r3 = shmget$private(0x0, 0x11000, 0x0, &(0x7f0000fef000/0x11000)=nil) shmat(r3, &(0x7f0000fef000/0x2000)=nil, 0x4000) shmat(r3, &(0x7f0000ffb000/0x2000)=nil, 0x1000) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0xff, 0x2, 0x0, 0x2, 0x0, 0x2, 0x100a, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x6, 0x9}, 0x4000, 0x4000, 0x3, 0x5, 0x2e77, 0xaf7d, 0x36d9, 0x0, 0xfffffffa, 0x0, 0x7}, r2, 0x1, 0xffffffffffffffff, 0x2) shmctl$SHM_STAT_ANY(r1, 0xf, &(0x7f0000000340)=""/95) shmctl$IPC_RMID(r1, 0x0) r4 = shmget(0x0, 0x2000, 0x10, &(0x7f0000ff9000/0x2000)=nil) shmat(r4, &(0x7f0000ffe000/0x2000)=nil, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ff2000/0x3000)=nil) 08:37:06 executing program 1: r0 = syz_io_uring_setup(0x2b2, &(0x7f0000000080)={0x0, 0x4, 0x0, 0x0, 0x184}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_io_uring_setup(0x2175, &(0x7f0000000680)={0x0, 0x1def, 0x4, 0x102, 0x283}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f00000003c0)) io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000005c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x2, 0x4000, @fd_index=0x8, 0x100, &(0x7f0000000240)=[{&(0x7f0000000540)=""/81, 0x51}, {&(0x7f0000000700)=""/233, 0xe9}, {&(0x7f0000000040)}], 0x3, 0xe45a319f251632af, 0x1, {0x0, r4}}, 0x9) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000500)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r1, &(0x7f0000000400)=0x80, &(0x7f0000000300)=@isdn, 0x0, 0x80800, 0x0, {0x0, r5}}, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup/syz1\x00', 0x200002, 0x0) r7 = syz_open_dev$tty20(0xc, 0x4, 0x1) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000800)=[r6, r7], 0x2) setsockopt$inet_tcp_int(r1, 0x6, 0x4, &(0x7f0000000140)=0x23ca, 0x4) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file1/file0\x00', 0x0, 0x2c) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r9, 0x0, 0x0, 0x87ffffc) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x6, 0x4, 0x2, 0x2, 0x0, 0x7fff, 0x10048, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000180), 0x9}, 0xc41, 0x3, 0x0, 0x4, 0x5bd, 0x8, 0x4, 0x0, 0x4, 0x0, 0x9}, 0xffffffffffffffff, 0xa, r8, 0xa) io_uring_enter(r0, 0x100001, 0x0, 0x0, 0x0, 0x0) 08:37:06 executing program 6: r0 = syz_io_uring_setup(0x2b2, &(0x7f0000000080)={0x0, 0x4, 0x0, 0x2, 0x184}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x2175, &(0x7f0000000680)={0x0, 0x1df2, 0x4, 0xfe, 0x200285}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000380), &(0x7f00000003c0)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) syz_open_dev$tty20(0xc, 0x4, 0x1) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000800)=[0xffffffffffffffff], 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file1/file0\x00', 0x0, 0x2c) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r5, 0x2c, 0x9, 0x87ffff8) r6 = dup2(r4, r4) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r7, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r7, 0x6, 0x13, &(0x7f0000000000), 0x4) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r6, 0xc018937e, &(0x7f0000000140)={{0x1, 0x1, 0x18, r7, @in_args={0x4}}, './file1\x00'}) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_CONNECT={0x10, 0x2, 0x0, r3, 0x80, &(0x7f0000000280)=@l2tp={0x2, 0x0, @loopback}}, 0x0) io_uring_enter(r0, 0x100001, 0x0, 0x0, 0x0, 0x0) 08:37:06 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:37:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) close(0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:37:06 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0xc) r1 = getpid() ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000004c0)=0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) fsetxattr$security_selinux(r3, &(0x7f0000000700), &(0x7f0000000740)='system_u:object_r:netcontrol_device_t:s0\x00', 0x29, 0x3) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)=[{&(0x7f00000000c0)={0x194, 0x31, 0x2, 0x70bd2d, 0x25dfdbfb, "", [@nested={0x184, 0x81, 0x0, 0x1, [@typed={0x7, 0x6f, 0x0, 0x0, @str='\'+\x00'}, @generic="21ac718b5f14eebcaeceab5d64bc813e2df26e4c4ae9f8425fae66072402a10738be4b59", @typed={0x8, 0x5e, 0x0, 0x0, @pid}, @typed={0x44, 0x47, 0x0, 0x0, @binary="e32ff41fc54eb83bf4524cb36172ef6df57168a773902d399041d4afcd15543bd3b089ecd9c5f52fb2004c12bf4f3f6f2720af4a021f6353becad57e2ea7dcf5"}, @typed={0x8, 0x57, 0x0, 0x0, @u32=0xffffffe1}, @typed={0x4, 0x2a}, @generic="cba01911bf90f84103ab6c3e6d78a40a95eba4d8cb0dda29543c169f6551a7c465332c81e0f173e617f81822c9f6d392b87f649c03ca63dd770d1894dd3d2ba26ec6da0687eaa257602eb80b955966d3ae2a9ff828180715cfcfc9c595d8c76009bc5f0c51eb0547f16be86999ac2a15c8033056c0338afc487b5c3a98be66c8981eec10b5f35264cc7b9e8ae1ff7880847388a887448951c3879438e7b633a17d6a19c4508dc6fcf8144fa8a2a2c510ee35e1502c5e8deb53c984ef5c4fea4eab7078b2b6a76a54af7ae04f23fd588b476ad3621d3d961edb3ed917ef44775f7ab10127124ad12b522a558cee09cf07", @typed={0xb, 0x7b, 0x0, 0x0, @str='.[](-[\x00'}]}]}, 0x194}, {&(0x7f0000000300)={0x164, 0x3e, 0x10, 0x70bd29, 0x25dfdbfb, "", [@nested={0x8, 0x56, 0x0, 0x1, [@typed={0x4, 0x28}]}, @nested={0x124, 0x2c, 0x0, 0x1, [@generic="d09c84e429df9c58121ab216e60438a142d2fc8ac925d8857c91e72a1b51e63e4501dacc4b3504ee7705da1e1b9226a4aaf2c94406f04299cc75f12e83a17dc0fdf789c4d5f29b59773e0c53a4dc36d5fe8b1ede978d596e38571be8713a378758283e655071716d52f2638f5a50fc379db27c31bbfd5155cf721abaee65b5ae2bde0837bee177b42e", @generic="e5c3cd32a01573022df6d308342860b3532d002072efa34529fe22548b1eca5f2bbcb48af2520eb9be087b50150e3e17ed46e39e3e6873e57149980df61b28e60d18b4542b72266f439815a43b746144987cb8badd489c145d8c434c9648a664988138eb7c0e1056a29f34b9ed6cc7980d9bf1ac090abec63ee8b05b59d9f22fa0e47930f60f09fd88337588fdebe5c0f1105974b7e237"]}, @typed={0x1e, 0x75, 0x0, 0x0, @str='cpuset.memory_spread_slab\x00'}, @typed={0x8, 0x57, 0x0, 0x0, @pid=r0}]}, 0x164}], 0x2, &(0x7f00000005c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r4}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r5, 0xffffffffffffffff}}}], 0x40, 0x4000}, 0x10) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r7, r6, 0x0, 0xfffffdef) mknodat$loop(r6, &(0x7f0000000780)='./file0\x00', 0x40, 0x0) io_uring_setup(0x5ff7, &(0x7f0000000a80)) r8 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0) ioctl$FS_IOC_GETVERSION(r8, 0x80087601, &(0x7f0000000040)) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) 08:37:06 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 468.142577] audit: type=1400 audit(1668415026.495:17): avc: denied { relabelto } for pid=11201 comm="syz-executor.5" name="NETLINK" dev="sockfs" ino=21361 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:pmqos_device_t:s0 tclass=netlink_route_socket permissive=1 08:37:06 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() syz_open_procfs(r1, &(0x7f00000012c0)='smaps_rollup\x00') kcmp$KCMP_EPOLL_TFD(0x0, r1, 0x7, r0, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x4b}) read(r0, &(0x7f0000000000)=""/61, 0x3d) [ 468.290075] audit: type=1400 audit(1668415026.643:18): avc: denied { read } for pid=11216 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 08:37:06 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r0, &(0x7f0000000240)="01", 0x1) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:37:06 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x9, 0x8001, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) r3 = dup(0xffffffffffffffff) bind$bt_hci(r3, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000380)=']p\"\xae\x06\xc40\x1a\x1a\\\x9e\x8a\x17@)#\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004I\x1c4P\x0e\xc4!\xc9\xece\x84\x85\xf2\xdb\xd3\xa7_\xe5\x95\x04\xdae\xca\xfd\xe2\xd1\xc5\x13\xf3u\xea\xc0\xb5b[\x9adH~\n\xe1\x86\x1f\xe7s\x04\xe8\xf2$\xae\xa8\xe7\xbd\x05\xb0B\xf2\x9cp\xc73\x9db\xc4\xe8EC\xbd\xc9\xf8\x0e\xd7\x1b\x11\xaf\xbf0x0}, &(0x7f0000000340)=0xc) sendmsg$ETHTOOL_MSG_TSINFO_GET(r4, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000540)={&(0x7f0000000440)={0xcc, r5, 0x2, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x40880}, 0x20040800) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(0xffffffffffffffff, 0x80286722, &(0x7f0000000180)={0x0, 0x0, 0x81, 0xffff5b4b}) preadv2(r2, &(0x7f0000000100)=[{&(0x7f0000000000)=""/97, 0x61}], 0x1, 0x70e, 0x7, 0x8) r7 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r7, 0x40247007, &(0x7f0000000000)) [ 468.483920] loop3: detected capacity change from 0 to 256 [ 468.704102] random: crng reseeded on system resumption [ 468.910035] random: crng reseeded on system resumption [ 469.139657] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 469.624075] Process accounting resumed 08:37:22 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x9, 0x8001, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) r3 = dup(0xffffffffffffffff) bind$bt_hci(r3, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000380)=']p\"\xae\x06\xc40\x1a\x1a\\\x9e\x8a\x17@)#\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004I\x1c4P\x0e\xc4!\xc9\xece\x84\x85\xf2\xdb\xd3\xa7_\xe5\x95\x04\xdae\xca\xfd\xe2\xd1\xc5\x13\xf3u\xea\xc0\xb5b[\x9adH~\n\xe1\x86\x1f\xe7s\x04\xe8\xf2$\xae\xa8\xe7\xbd\x05\xb0B\xf2\x9cp\xc73\x9db\xc4\xe8EC\xbd\xc9\xf8\x0e\xd7\x1b\x11\xaf\xbf0x0}, &(0x7f0000000340)=0xc) sendmsg$ETHTOOL_MSG_TSINFO_GET(r4, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000540)={&(0x7f0000000440)={0xcc, r5, 0x2, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x40880}, 0x20040800) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(0xffffffffffffffff, 0x80286722, &(0x7f0000000180)={0x0, 0x0, 0x81, 0xffff5b4b}) preadv2(r2, &(0x7f0000000100)=[{&(0x7f0000000000)=""/97, 0x61}], 0x1, 0x70e, 0x7, 0x8) r7 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r7, 0x40247007, &(0x7f0000000000)) 08:37:22 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:37:22 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:37:22 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r0, &(0x7f0000000240)="01", 0x1) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:37:22 executing program 1: recvmsg(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_setup(0x1cc0, &(0x7f0000000140)={0x0, 0x0, 0x20, 0x0, 0x2f1}, &(0x7f0000ca4000/0x3000)=nil, &(0x7f0000ca2000/0x4000)=nil, &(0x7f00000001c0), 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), 0xffffffffffffffff) 08:37:22 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) 08:37:22 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaaea788cce3fc4ee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xa0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ff3000/0x4000)=nil, 0x4000) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000140)=""/237) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) shmctl$IPC_RMID(0xffffffffffffffff, 0x0) finit_module(r0, 0x0, 0x0) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) r2 = fcntl$getown(0xffffffffffffffff, 0x9) r3 = shmget$private(0x0, 0x11000, 0x0, &(0x7f0000fef000/0x11000)=nil) shmat(r3, &(0x7f0000fef000/0x2000)=nil, 0x4000) shmat(r3, &(0x7f0000ffb000/0x2000)=nil, 0x1000) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0xff, 0x2, 0x0, 0x2, 0x0, 0x2, 0x100a, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x6, 0x9}, 0x4000, 0x4000, 0x3, 0x5, 0x2e77, 0xaf7d, 0x36d9, 0x0, 0xfffffffa, 0x0, 0x7}, r2, 0x1, 0xffffffffffffffff, 0x2) shmctl$SHM_STAT_ANY(r1, 0xf, &(0x7f0000000340)=""/95) shmctl$IPC_RMID(r1, 0x0) r4 = shmget(0x0, 0x2000, 0x10, &(0x7f0000ff9000/0x2000)=nil) shmat(r4, &(0x7f0000ffe000/0x2000)=nil, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ff2000/0x3000)=nil) 08:37:22 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaaea788cce3fc4ee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xa0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ff3000/0x4000)=nil, 0x4000) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000140)=""/237) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) shmctl$IPC_RMID(0xffffffffffffffff, 0x0) finit_module(r0, 0x0, 0x0) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) r2 = fcntl$getown(0xffffffffffffffff, 0x9) r3 = shmget$private(0x0, 0x11000, 0x0, &(0x7f0000fef000/0x11000)=nil) shmat(r3, &(0x7f0000fef000/0x2000)=nil, 0x4000) shmat(r3, &(0x7f0000ffb000/0x2000)=nil, 0x1000) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0xff, 0x2, 0x0, 0x2, 0x0, 0x2, 0x100a, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x6, 0x9}, 0x4000, 0x4000, 0x3, 0x5, 0x2e77, 0xaf7d, 0x36d9, 0x0, 0xfffffffa, 0x0, 0x7}, r2, 0x1, 0xffffffffffffffff, 0x2) shmctl$SHM_STAT_ANY(r1, 0xf, &(0x7f0000000340)=""/95) shmctl$IPC_RMID(r1, 0x0) r4 = shmget(0x0, 0x2000, 0x10, &(0x7f0000ff9000/0x2000)=nil) shmat(r4, &(0x7f0000ffe000/0x2000)=nil, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ff2000/0x3000)=nil) [ 483.987017] loop3: detected capacity change from 0 to 264192 [ 484.043919] loop3: detected capacity change from 0 to 256 08:37:22 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r0, &(0x7f0000000240)="01", 0x1) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 484.219527] random: crng reseeded on system resumption [ 484.265923] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 484.466916] Process accounting resumed 08:37:37 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:37:37 executing program 4: close(0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r0, &(0x7f0000000240)="01", 0x1) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:37:37 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:37:37 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaaea788cce3fc4ee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xa0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ff3000/0x4000)=nil, 0x4000) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000140)=""/237) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) shmctl$IPC_RMID(0xffffffffffffffff, 0x0) finit_module(r0, 0x0, 0x0) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) r2 = fcntl$getown(0xffffffffffffffff, 0x9) r3 = shmget$private(0x0, 0x11000, 0x0, &(0x7f0000fef000/0x11000)=nil) shmat(r3, &(0x7f0000fef000/0x2000)=nil, 0x4000) shmat(r3, &(0x7f0000ffb000/0x2000)=nil, 0x1000) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0xff, 0x2, 0x0, 0x2, 0x0, 0x2, 0x100a, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x6, 0x9}, 0x4000, 0x4000, 0x3, 0x5, 0x2e77, 0xaf7d, 0x36d9, 0x0, 0xfffffffa, 0x0, 0x7}, r2, 0x1, 0xffffffffffffffff, 0x2) shmctl$SHM_STAT_ANY(r1, 0xf, &(0x7f0000000340)=""/95) shmctl$IPC_RMID(r1, 0x0) r4 = shmget(0x0, 0x2000, 0x10, &(0x7f0000ff9000/0x2000)=nil) shmat(r4, &(0x7f0000ffe000/0x2000)=nil, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ff2000/0x3000)=nil) 08:37:37 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:37:37 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaaea788cce3fc4ee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xa0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ff3000/0x4000)=nil, 0x4000) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000140)=""/237) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) shmctl$IPC_RMID(0xffffffffffffffff, 0x0) finit_module(r0, 0x0, 0x0) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) r2 = fcntl$getown(0xffffffffffffffff, 0x9) r3 = shmget$private(0x0, 0x11000, 0x0, &(0x7f0000fef000/0x11000)=nil) shmat(r3, &(0x7f0000fef000/0x2000)=nil, 0x4000) shmat(r3, &(0x7f0000ffb000/0x2000)=nil, 0x1000) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0xff, 0x2, 0x0, 0x2, 0x0, 0x2, 0x100a, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x6, 0x9}, 0x4000, 0x4000, 0x3, 0x5, 0x2e77, 0xaf7d, 0x36d9, 0x0, 0xfffffffa, 0x0, 0x7}, r2, 0x1, 0xffffffffffffffff, 0x2) shmctl$SHM_STAT_ANY(r1, 0xf, &(0x7f0000000340)=""/95) shmctl$IPC_RMID(r1, 0x0) r4 = shmget(0x0, 0x2000, 0x10, &(0x7f0000ff9000/0x2000)=nil) shmat(r4, &(0x7f0000ffe000/0x2000)=nil, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ff2000/0x3000)=nil) 08:37:37 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x9, 0x8001, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) r3 = dup(0xffffffffffffffff) bind$bt_hci(r3, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000380)=']p\"\xae\x06\xc40\x1a\x1a\\\x9e\x8a\x17@)#\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004I\x1c4P\x0e\xc4!\xc9\xece\x84\x85\xf2\xdb\xd3\xa7_\xe5\x95\x04\xdae\xca\xfd\xe2\xd1\xc5\x13\xf3u\xea\xc0\xb5b[\x9adH~\n\xe1\x86\x1f\xe7s\x04\xe8\xf2$\xae\xa8\xe7\xbd\x05\xb0B\xf2\x9cp\xc73\x9db\xc4\xe8EC\xbd\xc9\xf8\x0e\xd7\x1b\x11\xaf\xbf0x0}, &(0x7f0000000340)=0xc) sendmsg$ETHTOOL_MSG_TSINFO_GET(r4, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000540)={&(0x7f0000000440)={0xcc, r5, 0x2, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x40880}, 0x20040800) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(0xffffffffffffffff, 0x80286722, &(0x7f0000000180)={0x0, 0x0, 0x81, 0xffff5b4b}) preadv2(r2, &(0x7f0000000100)=[{&(0x7f0000000000)=""/97, 0x61}], 0x1, 0x70e, 0x7, 0x8) r7 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r7, 0x40247007, &(0x7f0000000000)) 08:37:37 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) [ 499.449570] loop3: detected capacity change from 0 to 264192 08:37:38 executing program 4: close(0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r0, &(0x7f0000000240)="01", 0x1) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:37:38 executing program 4: close(0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r0, &(0x7f0000000240)="01", 0x1) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:37:38 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:37:39 executing program 6: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r0, 0x1, 0x70bd27, 0x25dfdbff, {{}, {@val={0x8, 0x3, r2}, @void}}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x90}, 0x8850) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_PROTOCOL_FEATURES(r3, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000700)={0x14, r0, 0x1}, 0x14}}, 0x0) 08:37:45 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:37:45 executing program 6: sendmsg$IPCTNL_MSG_CT_DELETE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x154, 0x2, 0x1, 0x3, 0x0, 0x0, {0x7, 0x0, 0x2}, [@CTA_TUPLE_MASTER={0x2c, 0xe, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x29}}, {0x8, 0x2, @local}}}]}, @CTA_SEQ_ADJ_REPLY={0x14, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x3ff}]}, @CTA_PROTOINFO={0x4c, 0x4, 0x0, 0x1, @CTA_PROTOINFO_DCCP={0x48, 0x2, 0x0, 0x1, [@CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc, 0x3, 0x1, 0x0, 0x1ff}, @CTA_PROTOINFO_DCCP_STATE={0x5, 0x1, 0x7}, @CTA_PROTOINFO_DCCP_ROLE={0x5, 0x2, 0x7}, @CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc, 0x3, 0x1, 0x0, 0x7ff}, @CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc, 0x3, 0x1, 0x0, 0x100000001}, @CTA_PROTOINFO_DCCP_ROLE={0x5, 0x2, 0x1f}, @CTA_PROTOINFO_DCCP_ROLE={0x5, 0x2, 0x5d}]}}, @CTA_ID={0x8, 0xc, 0x1, 0x0, 0x4}, @CTA_LABELS={0xc, 0x16, 0x1, 0x0, [0xc7, 0x3ff]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x3ff}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x794d}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x80000001}, @CTA_SYNPROXY_ISN={0x8}]}, @CTA_TUPLE_MASTER={0x4c, 0xe, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @remote}}}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_LABELS_MASK={0x10, 0x17, [0x3, 0x1f, 0x80000000]}]}, 0x154}, 0x1, 0x0, 0x0, 0xf9476e2b4278d801}, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f0000001180)=ANY=[], 0x220) [ 507.501001] Process accounting resumed 08:37:45 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) [ 508.856905] random: crng reseeded on system resumption 08:37:47 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaaea788cce3fc4ee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xa0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ff3000/0x4000)=nil, 0x4000) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000140)=""/237) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) shmctl$IPC_RMID(0xffffffffffffffff, 0x0) finit_module(r0, 0x0, 0x0) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) r2 = fcntl$getown(0xffffffffffffffff, 0x9) r3 = shmget$private(0x0, 0x11000, 0x0, &(0x7f0000fef000/0x11000)=nil) shmat(r3, &(0x7f0000fef000/0x2000)=nil, 0x4000) shmat(r3, &(0x7f0000ffb000/0x2000)=nil, 0x1000) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0xff, 0x2, 0x0, 0x2, 0x0, 0x2, 0x100a, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x6, 0x9}, 0x4000, 0x4000, 0x3, 0x5, 0x2e77, 0xaf7d, 0x36d9, 0x0, 0xfffffffa, 0x0, 0x7}, r2, 0x1, 0xffffffffffffffff, 0x2) shmctl$SHM_STAT_ANY(r1, 0xf, &(0x7f0000000340)=""/95) shmctl$IPC_RMID(r1, 0x0) r4 = shmget(0x0, 0x2000, 0x10, &(0x7f0000ff9000/0x2000)=nil) shmat(r4, &(0x7f0000ffe000/0x2000)=nil, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ff2000/0x3000)=nil) [ 544.769411] Process accounting resumed 08:38:40 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) 08:38:40 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0xd5, 0x0, 0x74, 0x8, 0x0, 0x2, 0x40808, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0x8}, 0x5541, 0x0, 0x4, 0x0, 0x0, 0x8, 0x51d, 0x0, 0x8000, 0x0, 0x200}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r4, r3, 0x0, 0xfffffdef) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x81, 0x9, 0x4, 0x3f, 0x0, 0x101, 0x4, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000100), 0x1}, 0x4000, 0x53cc, 0x81, 0x8, 0x3, 0x9, 0x8001, 0x0, 0x3, 0x0, 0x6}, 0x0, 0xe, r3, 0x2) dup3(r2, r1, 0x0) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000000200)) r5 = syz_io_uring_setup(0x190b, &(0x7f0000000180), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000000540), &(0x7f0000000280)) fcntl$F_SET_RW_HINT(r5, 0x40c, &(0x7f0000000180)=0x1) 08:38:40 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x86200, 0x0) finit_module(r0, &(0x7f00000000c0)='!$', 0x2) r1 = gettid() r2 = syz_open_procfs(r1, &(0x7f00000012c0)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x5}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x24e1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000000)=0x2) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x515081, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x28, r6, 0x87d27e71721737b5, 0x0, 0x0, {{0x6b}, {@void, @val={0x8, 0x6}, @val={0xc}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000700)={0x5c, r6, 0x400, 0x70bd2a, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x4, 0x65}}}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x5c, r7, 0xe0a, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x18, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x4008011) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000380)='./file0\x00', 0x7, 0x1, &(0x7f00000004c0)=[{&(0x7f00000003c0)="04f94517b04c0d27ee5455d9a7bae601d452ededf9730343eab1fb8e7276bf779da1cddf563d22a23d291deca493faab9c24f7bcefaf48052f76626ef7ef742b08bed44cc2e7b42f9345dd911c633de6f1ddfb538e3ebd3a7426547ee6344db1aab2ec1d6c4391cd3f7063e8e4093c8ae75911725b9aee021498136e0485534ccdd39eefacfc5793e2d83f9a76d88f4435a0aa9b52e1941185beb61babaf185ae09d41e2ef2e811908b3da522c98f71908e794680c47a505b7caeff3556fceef8364d19489dd2ba72232c1deee2e53aa3b1baef5dafc900f34371e6fb3c23a23cbec2cc20b6a5e2cca2e5df828d3ee0078831d560345119ecd89aa", 0xfb, 0x1ff}], 0x3201800, &(0x7f0000000500)={[{@fat=@fmask={'fmask', 0x3d, 0xfff}}, {@nonumtail}], [{@permit_directio}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x66, 0x52, 0x62, 0x61, 0x31, 0x65, 0x66], 0x2d, [0x33, 0x32, 0x0, 0x34], 0x2d, [0x64, 0x33, 0x54, 0x34], 0x2d, [0x31, 0x66, 0x30, 0x32], 0x2d, [0x64, 0x66, 0x36, 0x63, 0x31, 0x37, 0x35, 0x32]}}}]}) 08:38:40 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:38:40 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:38:40 executing program 6: syz_emit_ethernet(0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa000000000000430545000028000000000006907800000000ac1414aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="6100000090780000"], 0x0) 08:38:40 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:38:40 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:38:40 executing program 6: r0 = syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(0xffffffffffffffff, 0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') write$binfmt_aout(r2, &(0x7f0000000500)={{0x10b, 0x3, 0x5, 0xc6, 0x3b, 0x5, 0x15f, 0x1ea44656}, "8f50ba5b8d22b679908b5f67d23a437bceeff6412c8a120c7222669424424991a77225898b55ca6befbff3fd276bd7d165410f4b51bf5436816f782662ab3db5d5e6062bc14262802b8f1e16e79b32a69b1e8f3fbd63ce3d6d3e3b66fad7", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000380)={r0, 0x0, 0x1, 0x400}) ioctl$BTRFS_IOC_BALANCE(r3, 0x5000940c, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) ioctl$BTRFS_IOC_RESIZE(r4, 0x50009403, &(0x7f0000000000)={{r5}, {@void, @max}}) r6 = gettid() perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x6, 0x7f, 0x0, 0x1, 0x0, 0x63151cbe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x401, 0x4, @perf_config_ext={0xfff, 0x7}, 0x410, 0x100000000, 0x0, 0x4, 0x5, 0x3f, 0x401, 0x0, 0x80000000, 0x0, 0x49}, r6, 0x6, r1, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r7, &(0x7f0000000080)="01", 0x292e9) [ 562.347749] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 562.619664] loop3: detected capacity change from 0 to 264192 08:38:41 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 562.703120] loop3: detected capacity change from 0 to 256 [ 562.753068] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 08:38:41 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:38:41 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:38:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:38:41 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:38:41 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:38:41 executing program 0: sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(0xffffffffffffffff, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x7f, 0x7, 0x0, 0x3, 0x0, 0x1a7, 0x40, 0xd, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000200), 0xe}, 0x2080, 0x8, 0x4, 0x0, 0x2, 0x9, 0x0, 0x0, 0x5, 0x0, 0xffffffffffff8356}, r2, 0x10, r1, 0xe) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x40210}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x73, 0x45, 0x8, 0x54, 0x0, 0x1, 0x0, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x2}, 0x1080, 0x8, 0x2, 0x7, 0x2, 0x200, 0x8000, 0x0, 0x1d7, 0x0, 0x100}, 0x0, 0xb, 0xffffffffffffffff, 0x8) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x39a}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) r3 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000140)) io_uring_enter(r3, 0x2bd, 0x0, 0x0, 0x0, 0x0) ioctl$FIONCLEX(r3, 0x5450) [ 563.140878] loop3: detected capacity change from 0 to 264192 [ 563.235571] Process accounting resumed [ 563.246596] loop3: detected capacity change from 0 to 256 [ 563.255025] loop5: detected capacity change from 0 to 264192 [ 563.302910] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 563.544334] loop5: detected capacity change from 0 to 256 08:38:42 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) 08:38:42 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)) rmdir(&(0x7f0000003b00)='./file0\x00') 08:38:42 executing program 6: r0 = syz_open_dev$loop(0x0, 0x40000000000002, 0x38d40) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(0xffffffffffffffff, 0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') write$binfmt_aout(r2, &(0x7f0000000500)={{0x10b, 0x3, 0x5, 0xc6, 0x3b, 0x5, 0x15f, 0x1ea44656}, "8f50ba5b8d22b679908b5f67d23a437bceeff6412c8a120c7222669424424991a77225898b55ca6befbff3fd276bd7d165410f4b51bf5436816f782662ab3db5d5e6062bc14262802b8f1e16e79b32a69b1e8f3fbd63ce3d6d3e3b66fad7", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x97e) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000380)={r0, 0x0, 0x1, 0x400}) ioctl$BTRFS_IOC_BALANCE(r3, 0x5000940c, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) ioctl$BTRFS_IOC_RESIZE(r4, 0x50009403, &(0x7f0000000000)={{r5}, {@void, @max}}) r6 = gettid() perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x6, 0x7f, 0x0, 0x1, 0x0, 0x63151cbe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x401, 0x4, @perf_config_ext={0xfff, 0x7}, 0x410, 0x100000000, 0x0, 0x4, 0x5, 0x3f, 0x401, 0x0, 0x80000000, 0x0, 0x49}, r6, 0x6, r1, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r7, &(0x7f0000000080)="01", 0x292e9) 08:38:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:38:42 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:38:42 executing program 0: sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(0xffffffffffffffff, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x7f, 0x7, 0x0, 0x3, 0x0, 0x1a7, 0x40, 0xd, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000200), 0xe}, 0x2080, 0x8, 0x4, 0x0, 0x2, 0x9, 0x0, 0x0, 0x5, 0x0, 0xffffffffffff8356}, r2, 0x10, r1, 0xe) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x40210}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x73, 0x45, 0x8, 0x54, 0x0, 0x1, 0x0, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x2}, 0x1080, 0x8, 0x2, 0x7, 0x2, 0x200, 0x8000, 0x0, 0x1d7, 0x0, 0x100}, 0x0, 0xb, 0xffffffffffffffff, 0x8) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x39a}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) r3 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000140)) io_uring_enter(r3, 0x2bd, 0x0, 0x0, 0x0, 0x0) ioctl$FIONCLEX(r3, 0x5450) 08:38:42 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 563.712287] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 563.824836] loop3: detected capacity change from 0 to 264192 08:38:42 executing program 1: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) 08:38:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 564.272480] Process accounting resumed [ 564.308125] loop3: detected capacity change from 0 to 256 [ 564.407242] Process accounting resumed [ 564.525722] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 08:38:58 executing program 1: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) 08:38:58 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:38:58 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:38:58 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) 08:38:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:38:58 executing program 6: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) 08:38:58 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:38:58 executing program 0: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) [ 579.996994] loop3: detected capacity change from 0 to 264192 [ 580.029634] loop5: detected capacity change from 0 to 264192 [ 580.119244] loop3: detected capacity change from 0 to 256 08:38:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r0, &(0x7f0000000240)="01", 0x1) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 580.150125] loop5: detected capacity change from 0 to 256 [ 580.225542] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 580.288097] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 08:38:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r0, &(0x7f0000000240)="01", 0x1) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:38:58 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:38:58 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 580.652673] loop5: detected capacity change from 0 to 264192 [ 580.657993] loop3: detected capacity change from 0 to 264192 [ 580.730023] loop5: detected capacity change from 0 to 256 08:38:59 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r0, &(0x7f0000000240)="01", 0x1) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 580.785094] loop3: detected capacity change from 0 to 256 [ 580.828292] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 08:38:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 581.030454] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 581.144873] Process accounting resumed [ 581.231996] Process accounting resumed [ 581.617117] Process accounting resumed [ 581.851952] Process accounting resumed 08:39:16 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) 08:39:16 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:39:16 executing program 1: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) 08:39:16 executing program 0: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) 08:39:16 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000100)) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:39:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:39:16 executing program 6: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) 08:39:16 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 598.076039] loop5: detected capacity change from 0 to 264192 [ 598.124229] loop5: detected capacity change from 0 to 256 08:39:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 598.135853] loop3: detected capacity change from 0 to 264192 [ 598.154300] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 598.272753] loop3: detected capacity change from 0 to 256 08:39:16 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000100)) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 598.476450] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 598.827183] Process accounting resumed [ 598.962636] Process accounting resumed [ 598.976756] Process accounting resumed [ 599.715607] Process accounting resumed [ 613.722652] loop5: detected capacity change from 0 to 264192 [ 613.727053] loop3: detected capacity change from 0 to 264192 08:39:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:39:32 executing program 0: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) 08:39:32 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:39:32 executing program 6: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) 08:39:32 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000100)) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:39:32 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:39:32 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:39:32 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, 0xffffffffffffffff, 0xa) [ 613.752652] loop5: detected capacity change from 0 to 256 [ 613.774679] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 08:39:32 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:39:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 614.181730] loop5: detected capacity change from 0 to 264192 [ 614.196502] loop3: detected capacity change from 0 to 256 [ 614.233986] loop5: detected capacity change from 0 to 256 [ 614.271869] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 08:39:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 614.290266] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 08:39:32 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 614.383645] Process accounting resumed 08:39:32 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:39:32 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:39:32 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 614.471309] loop3: detected capacity change from 0 to 264192 [ 614.479007] loop5: detected capacity change from 0 to 264192 08:39:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 614.528999] loop5: detected capacity change from 0 to 256 [ 614.553934] loop3: detected capacity change from 0 to 256 08:39:33 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) [ 614.763261] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 614.767648] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 615.112872] Process accounting resumed [ 616.024275] Process accounting resumed 08:39:52 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:39:52 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:39:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:39:52 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, 0xffffffffffffffff, 0xa) 08:39:52 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:39:52 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:39:52 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:39:52 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 633.944584] loop5: detected capacity change from 0 to 264192 08:39:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 634.052291] loop5: detected capacity change from 0 to 256 08:39:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, 0x0, 0x0) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 634.154854] loop3: detected capacity change from 0 to 256 [ 634.159191] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 08:39:52 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:39:52 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:39:52 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 634.390620] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 08:39:52 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:39:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, 0x0, 0x0) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:39:52 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:39:52 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 634.531883] loop5: detected capacity change from 0 to 264192 [ 634.803706] loop5: detected capacity change from 0 to 256 [ 635.130304] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 635.403232] Process accounting resumed 08:40:08 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:08 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, 0xffffffffffffffff, 0xa) 08:40:08 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:08 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, 0x0, 0x0) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:40:08 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:08 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:08 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) [ 650.426027] loop5: detected capacity change from 0 to 264192 [ 650.597444] loop5: detected capacity change from 0 to 256 08:40:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240), 0x0) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 650.756635] loop3: detected capacity change from 0 to 256 08:40:09 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:09 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:09 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240), 0x0) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 651.157625] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 651.229347] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 08:40:09 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:09 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:40:09 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) [ 654.427707] Process accounting resumed 08:40:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240), 0x0) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:40:26 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) 08:40:26 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:40:26 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:26 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:26 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:26 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) [ 667.751856] loop3: detected capacity change from 0 to 256 08:40:26 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:26 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 667.839082] loop5: detected capacity change from 0 to 264192 [ 667.894797] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 08:40:26 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:40:26 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 668.158609] loop5: detected capacity change from 0 to 256 08:40:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:40:26 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 668.301191] loop3: detected capacity change from 0 to 256 [ 668.390699] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 668.678770] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 668.750888] Process accounting resumed 08:40:42 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:42 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:40:42 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) 08:40:42 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:42 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:42 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:40:42 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 684.124002] loop5: detected capacity change from 0 to 264192 08:40:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 684.294037] loop5: detected capacity change from 0 to 256 [ 684.308281] loop3: detected capacity change from 0 to 256 [ 684.447768] Process accounting resumed 08:40:42 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:42 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:42 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:40:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 684.930730] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 684.941271] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 08:40:43 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:40:43 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x0, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:40:43 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:43 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 685.238506] loop5: detected capacity change from 0 to 264192 [ 685.253356] loop3: detected capacity change from 0 to 256 [ 685.373318] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 08:40:43 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:43 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:43 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x0, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:40:43 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:43 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:40:43 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) [ 685.639119] loop3: detected capacity change from 0 to 256 08:40:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x0, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 685.670219] loop5: detected capacity change from 0 to 264192 08:40:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) [ 685.809179] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 08:40:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 08:40:44 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 686.172242] loop5: detected capacity change from 0 to 256 [ 686.342454] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 686.659339] Process accounting resumed 08:41:11 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:41:11 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r2, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r1, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r3 = gettid() syz_open_procfs(r3, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r3, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r4, 0xa) 08:41:11 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:41:11 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:41:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 08:41:11 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:41:11 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:41:11 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 712.950591] loop5: detected capacity change from 0 to 256 08:41:11 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:41:11 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:41:11 executing program 0: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) [ 713.285524] loop4: detected capacity change from 0 to 264192 [ 713.397129] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 713.403894] loop3: detected capacity change from 0 to 256 [ 713.556624] loop4: detected capacity change from 0 to 256 [ 714.068009] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 714.681434] Process accounting resumed [ 714.744121] Process accounting resumed 08:41:27 executing program 0: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) 08:41:27 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:41:27 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r2, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r1, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r3 = gettid() syz_open_procfs(r3, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r3, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r4, 0xa) 08:41:27 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:41:27 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:41:27 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:41:27 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:41:27 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 729.062134] loop4: detected capacity change from 0 to 264192 08:41:28 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) [ 729.804006] loop3: detected capacity change from 0 to 256 [ 729.853928] loop4: detected capacity change from 0 to 256 [ 730.016226] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 730.148814] loop5: detected capacity change from 0 to 256 [ 730.213573] Process accounting resumed [ 730.468611] Process accounting resumed 08:41:46 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:41:46 executing program 0: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) 08:41:46 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r2, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r1, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r3 = gettid() syz_open_procfs(r3, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r3, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r4, 0xa) 08:41:46 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:41:46 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:41:46 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:41:46 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:41:46 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 747.784964] loop4: detected capacity change from 0 to 264192 08:41:47 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) [ 749.603890] loop4: detected capacity change from 0 to 256 08:41:48 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:41:48 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:41:48 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 749.850646] loop3: detected capacity change from 0 to 256 [ 749.861350] loop4: detected capacity change from 0 to 264192 08:41:48 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) [ 750.616093] loop5: detected capacity change from 0 to 264192 08:41:49 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:41:49 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 751.139233] loop3: detected capacity change from 0 to 256 [ 758.621618] Process accounting resumed [ 770.320136] Process accounting resumed 08:42:24 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:42:24 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:42:24 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) 08:42:24 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:42:24 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:42:24 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:42:24 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:42:24 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 786.703268] loop5: detected capacity change from 0 to 264192 [ 786.724979] loop4: detected capacity change from 0 to 264192 08:42:25 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:42:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) (fail_nth: 1) socket$inet_udp(0x2, 0x2, 0x0) [ 787.520932] loop3: detected capacity change from 0 to 256 08:42:25 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:42:25 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() syz_open_procfs(r1, &(0x7f00000012c0)='smaps_rollup\x00') perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xff, 0x0, 0x1, 0x7, 0x0, 0x9, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8fd, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x8000, 0x5, 0xad23, 0x9, 0x1, 0x9, 0x7, 0x0, 0x9a5, 0x0, 0x4}, r1, 0x7, r0, 0x1) msgctl$IPC_RMID(0x0, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000480)={{0x2, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0xffffffffffffffff}) msgsnd(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="02"], 0xfd1, 0x0) msgrcv(r2, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(r2, 0x0) 08:42:25 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:42:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 787.903996] loop4: detected capacity change from 0 to 256 [ 787.915959] loop5: detected capacity change from 0 to 264192 08:42:26 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() syz_open_procfs(r1, &(0x7f00000012c0)='smaps_rollup\x00') perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xff, 0x0, 0x1, 0x7, 0x0, 0x9, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8fd, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x8000, 0x5, 0xad23, 0x9, 0x1, 0x9, 0x7, 0x0, 0x9a5, 0x0, 0x4}, r1, 0x7, r0, 0x1) msgctl$IPC_RMID(0x0, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000480)={{0x2, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0xffffffffffffffff}) msgsnd(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="02"], 0xfd1, 0x0) msgrcv(r2, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(r2, 0x0) [ 788.124261] loop3: detected capacity change from 0 to 256 [ 788.130092] loop5: detected capacity change from 0 to 256 [ 788.134553] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 788.613659] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 791.997071] Process accounting resumed 08:42:44 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x2, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:42:44 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:42:44 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) 08:42:44 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:42:44 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:42:44 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:42:44 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:42:44 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 806.725202] loop5: detected capacity change from 0 to 264192 [ 806.742670] loop4: detected capacity change from 0 to 264192 [ 806.787225] loop3: detected capacity change from 0 to 256 [ 806.804151] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 08:42:45 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x3, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:42:45 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 809.878835] Process accounting resumed [ 809.893054] loop4: detected capacity change from 0 to 256 08:42:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x4, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:42:48 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) 08:42:48 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:42:48 executing program 4: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) 08:42:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x5, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 815.053306] Process accounting resumed [ 845.366349] Process accounting resumed 08:43:38 executing program 4: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) 08:43:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x6, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:43:38 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:43:38 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:43:38 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:43:38 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:43:38 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) 08:43:38 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:43:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x7, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 860.591866] loop5: detected capacity change from 0 to 264192 08:43:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x8, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 861.333596] loop5: detected capacity change from 0 to 256 [ 861.370968] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 08:43:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x9, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 861.424105] Process accounting resumed 08:43:39 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:43:39 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:43:39 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:43:39 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:43:39 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) [ 861.536075] loop5: detected capacity change from 0 to 264192 [ 861.544269] loop4: detected capacity change from 0 to 256 08:43:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:43:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0xa, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 861.607584] loop3: detected capacity change from 0 to 256 [ 861.635070] loop5: detected capacity change from 0 to 256 [ 861.637118] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 861.672489] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 08:43:40 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:43:40 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:43:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0xc, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:43:40 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) flock(r0, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x6}}, './file0\x00'}) dup2(r3, 0xffffffffffffffff) [ 861.782688] loop5: detected capacity change from 0 to 264192 [ 861.819228] loop5: detected capacity change from 0 to 256 [ 861.823972] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 861.893255] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 862.056054] Process accounting resumed 08:43:40 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) 08:43:40 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, '\x00', 0x2}}}, {{0xa, 0x0, 0x1, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x7c6, {{0xa, 0x4e20, 0x4, @mcast1, 0x401}}, {{0xa, 0x4e24, 0xb8fb, @private0={0xfc, 0x0, '\x00', 0x1}}}}, 0x108) dup2(r0, r1) 08:43:40 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x80800, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) 08:43:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0xd, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:43:40 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:43:40 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:43:40 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 862.144818] loop5: detected capacity change from 0 to 264192 [ 862.176690] loop3: detected capacity change from 0 to 256 08:43:40 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:43:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_io_uring_complete(0x0) execveat(r1, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000300)=[&(0x7f0000000140)='*&\x9c%^\'\x00', &(0x7f0000000180)='*(\\%:*+:\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='&\\\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)='-{^\x00'], &(0x7f00000004c0)=[&(0x7f0000000340)='\\%*).}]-%{%\x00', &(0x7f0000000380)='}*,\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='#,\x00', &(0x7f0000000440)='$\x00', &(0x7f0000000480)='[\x00'], 0x100) setresuid(0x0, r0, 0x0) stat(&(0x7f0000000980)='./file0/file0\x00', 0x0) [ 862.210277] loop5: detected capacity change from 0 to 256 [ 862.272030] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 862.291217] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 862.592845] Process accounting resumed 08:43:57 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:43:57 executing program 4: process_vm_readv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000100)}, {&(0x7f0000000140)=""/214, 0xd6}, {&(0x7f0000000340)=""/187, 0xbb}, {&(0x7f0000000400)=""/237, 0xed}, {&(0x7f0000000700)=""/86, 0x56}, {&(0x7f0000000780)=""/170, 0xaa}, {&(0x7f0000000840)=""/224, 0xe0}], 0x7, &(0x7f0000000b40)=[{&(0x7f0000000240)=""/30, 0x1e}, {&(0x7f00000009c0)=""/78, 0x4e}, {&(0x7f0000000a40)=""/5, 0x5}, {&(0x7f0000000a80)}, {&(0x7f0000000ac0)=""/28, 0x1c}, {&(0x7f0000000b00)}], 0x6, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0xfe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x65c2}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x64, 0x6, 0x1, 0x2, 0x0, 0xf8a, 0x11200, 0x19, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x4, 0xca}, 0x8822, 0x8, 0x80000001, 0x5, 0x9, 0xffffffff, 0xea2d, 0x0, 0x3, 0x0, 0x4}, 0xffffffffffffffff, 0x3, r0, 0x1) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r1, 0x400448cb, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:43:57 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:43:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0xf, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:43:57 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:43:57 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:43:57 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = gettid() rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) 08:43:57 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 878.917879] loop5: detected capacity change from 0 to 264192 08:43:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x10, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 878.977222] loop3: detected capacity change from 0 to 256 [ 878.986599] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 08:43:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x13, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:43:58 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:43:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x14, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:43:58 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:43:58 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r1 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r1}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 880.193606] loop5: detected capacity change from 0 to 264192 [ 880.261816] Bluetooth: hci0: Opcode 0x c03 failed: -4 [ 880.297681] Bluetooth: hci0: Opcode 0x c03 failed: -4 [ 880.522679] loop5: detected capacity change from 0 to 256 [ 880.684539] loop3: detected capacity change from 0 to 256 [ 881.146505] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 884.210093] Process accounting resumed 08:44:19 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:44:19 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:44:19 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:44:19 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) syz_open_procfs(0x0, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(0x0, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r4, 0xa) 08:44:19 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:44:19 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:44:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r1 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r1}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:44:19 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1a, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 900.743649] loop4: detected capacity change from 0 to 264192 [ 900.805145] loop5: detected capacity change from 0 to 264192 08:44:19 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x29, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:44:19 executing program 1: time(&(0x7f0000000000)) 08:44:19 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x88, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:44:19 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x80, 0x0, 0x0, 0x2080000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1001, 0x20003fd}, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r2, r1, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x7f, 0x8, 0x1, 0x1, 0x0, 0x0, 0x93500, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x4, 0x2}, 0x8, 0x20, 0x1, 0x5, 0x1, 0x1, 0x9, 0x0, 0x1f}, 0x0, 0xe, r1, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) readv(r0, &(0x7f0000000240)=[{&(0x7f0000000300)=""/202, 0xca}, {&(0x7f0000000400)=""/137, 0x89}, {&(0x7f00000004c0)=""/83, 0x53}], 0x3) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0xfffffff9}, 0x1c) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fstatfs(0xffffffffffffffff, &(0x7f0000000040)=""/60) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0xb2, 0x2, 0x47, 0x1, 0x0, 0x7fffffff, 0x98088, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000180), 0x5}, 0x0, 0x200, 0x6, 0x9, 0x10000, 0x200, 0x7ff, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x70) sched_setaffinity(0x0, 0x0, 0x0) fcntl$lock(r4, 0x7, &(0x7f0000000140)={0x1, 0x0, 0xc707, 0x6485e967}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000005c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="0d19f7a483a6df00cdfdd7010000000012530e2b187d68a423b34b4e977bca6da3508d57086a5a38bd5aed6faa374fe4fe62eded2982184b103c92dc20b0657d6b3935f4c2fc6de46ab6af2507f02aef82"]) kcmp$KCMP_EPOLL_TFD(0x0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000680)={0xffffffffffffffff, r5, 0xff}) 08:44:19 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0xfe, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:44:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x300, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 903.103932] loop5: detected capacity change from 0 to 256 [ 903.127612] loop4: detected capacity change from 0 to 256 [ 903.145835] loop3: detected capacity change from 0 to 256 08:44:21 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:44:21 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r1 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r1}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:44:21 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 903.273545] loop5: detected capacity change from 0 to 264192 [ 904.307548] Process accounting resumed 08:44:39 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:44:39 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:44:39 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:44:39 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:44:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x500, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:44:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r1 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r1}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:44:39 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) syz_open_procfs(0x0, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(0x0, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r4, 0xa) 08:44:39 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 920.831915] loop5: detected capacity change from 0 to 264192 [ 920.863859] loop4: detected capacity change from 0 to 264192 08:44:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x600, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:44:39 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:44:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x700, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 921.235460] loop4: detected capacity change from 0 to 256 [ 921.309083] loop3: detected capacity change from 0 to 256 [ 921.372646] loop5: detected capacity change from 0 to 256 08:44:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x900, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 921.660684] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 921.669154] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 930.026917] Process accounting resumed 08:45:05 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:45:05 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:45:05 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) syz_open_procfs(0x0, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(0x0, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r4, 0xa) 08:45:05 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0xa00, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:45:05 executing program 3: io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:45:05 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:45:05 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:45:05 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) [ 947.535239] loop5: detected capacity change from 0 to 264192 [ 947.543182] loop4: detected capacity change from 0 to 264192 08:45:06 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0xfffe, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 947.746406] loop3: detected capacity change from 0 to 256 08:45:06 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x7735a, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 949.176715] loop5: detected capacity change from 0 to 256 08:45:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x80000, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:45:07 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:45:07 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:45:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0xfffffffe, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 949.437011] loop5: detected capacity change from 0 to 264192 [ 951.520260] Process accounting resumed 08:45:26 executing program 3: io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:45:26 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:45:26 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r1 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r1}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:45:26 executing program 4: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) syz_open_procfs(0x0, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(0x0, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r4, 0xa) 08:45:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0xffffffff, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:45:26 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_config_ext={0x4, 0x8}, 0x0, 0xffffffff, 0x5, 0x0, 0x0, 0x9, 0x8001, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, r0, 0x3) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) r3 = dup(0xffffffffffffffff) bind$bt_hci(r3, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000380)=']p\"\xae\x06\xc40\x1a\x1a\\\x9e\x8a\x17@)#\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004I\x1c4P\x0e\xc4!\xc9\xece\x84\x85\xf2\xdb\xd3\xa7_\xe5\x95\x04\xdae\xca\xfd\xe2\xd1\xc5\x13\xf3u\xea\xc0\xb5b[\x9adH~\n\xe1\x86\x1f\xe7s\x04\xe8\xf2$\xae\xa8\xe7\xbd\x05\xb0B\xf2\x9cp\xc73\x9db\xc4\xe8EC\xbd\xc9\xf8\x0e\xd7\x1b\x11\xaf\xbf0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) 08:45:26 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) [ 967.964337] loop5: detected capacity change from 0 to 264192 08:45:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x2, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:45:26 executing program 0: io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:45:26 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0xb31}) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000000c0)) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0xfff, 0x402400) ioctl$TIOCL_SELLOADLUT(r1, 0x541c, &(0x7f0000000080)={0x5, 0x100, 0x0, 0x1000, 0x8e51}) 08:45:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x5, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 969.795244] loop3: detected capacity change from 0 to 256 08:45:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x6, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:45:28 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x805, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{0x2, 0x0, r2}, {0x2, 0x1}, {0x2, 0x4}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fsetxattr$system_posix_acl(r3, &(0x7f0000000440)='system.posix_acl_access\x00', &(0x7f0000001900)={{}, {0x1, 0x4}, [{}, {0x2, 0x5}], {0x4, 0x3}, [{0x8, 0x6}], {0x10, 0x4}, {0x20, 0x5}}, 0x3c, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000240)={0x90000000}) 08:45:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x7, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:45:28 executing program 3: io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:45:28 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), 0x0, 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000001c0)}, {0x0}], 0x0, &(0x7f0000000740)) socketpair(0x26, 0x6, 0x401, &(0x7f0000000100)={0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r2, r1, 0x0, 0xfffffdef) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', 0x9, 0x7, &(0x7f0000000940)=[{&(0x7f0000000200)="f88669392d34dc47826b3689691ffaec008902e15a91eef32fec2df202f323ba93367219bc28412b10a47a950810b4ce356b8681f8dab1c9c3a2f0e950789f503d79a01c662d3e68dbb55f8efb0d669747", 0x51}, {&(0x7f0000000280)="4225d1768827c30d27d8f874921528f598e2ce27ccc0a9c4e6ef5db01f0a1a5e554ae0feec402ff78db6d3d6333d8168544e1946ed7a2d37211626177a870deb485a39d23465a1fee428dde8035c68db61e5719b9fc8abd1135d6ac7a1c887c47b7104b3888bb257cf388ddb8f07b11de0d09e61434b1014dd13f58dd41e86a3b0401e90226d0ce045571fd64952a2a4f68b6e03adc0440a526be427eb6c6ea835c2798cb3a5e0e3169783f02dfe5bf81c70f9", 0xb3, 0x79}, {&(0x7f0000000340)="18da8800c2503c0826750149471b3b9a520509b7bd0ee221088b2021d6311fe24a7a3ddf3beae442da1e333dd5b4e0434867013c519f729d9a290f942ca474b923eb1d7c13c52faab3e5c97b2de9a40a98f3cad6b755a219fd43a945d231819b1499", 0x62, 0x8001}, {&(0x7f0000000840)="f5bd2ad34f62230e29e8a147c537c2c944a44c8b5a2d70d7b26af8f8fa3a87a5875cef7a63e83a0946860fd5d6c9d1d15e37bf9471e77bf6701797b53310b418236dd410a2654b3f26ff1dda5853801eafd095550d54d0a36eb5a81d2108b0f404efd6d3f61e978fc9f2531ad2c519d979bf9c6a76a0b55e12e2dc5d4aa7d1e8e262b9425e3b14683b633bbc8b9704e789401109f61e247a24a100dc87426211f44e390cd25b4a3b35f1c63f638b63d1815495056363cbdc1967c72dfb9e5c5e66ee398f7e6037fc5b", 0xc9, 0x1}, {&(0x7f0000000440)="9c39dd1053a396c5eea135832afbeb2196fd65d2a8966b6e89b39c2e4fa47d0f4336f88c22b604aa58843cacd6e0b8ebeda9dd3fa93e2754bd1a7a58ab357c3f23ae002be6b11ad2f1c06487ff6d42e4c1b3b999954c8d11f8f30560d1cfa040834807e5c4ed4b6c58865dfe8ddff9372f34268610718e52e6bf81f4ba000000", 0x80, 0xffffffffffffffff}, {&(0x7f0000000540)="aa9471df1bc6998278ac65a36c894bd638f7bccfee0b9c36e8151a16ed4e7e2b82d7232c264f386717bda19d856dd20990bff85378fc1352a2fc40cd81e326c3d8e4ac68ef45174a5cb6c1cdec99fdcf425af440621fd25376ee0743c6e1f0e2edec750f5662d0984416d8746c4fb5066fd2a4d6cbdabbe366b1d1d3617bea", 0x7f, 0x1}, {&(0x7f00000003c0)="a13df80211616ad0c75766c4da3ae57880abe0408fe21c7caa1103b342ea0c05131851af012072aba4c5c96b14319c8f530a446cdac593430e0d80a73eb3eb62cc2331e23b23accb92b91c8655e12434be545cf7195331b996273dc4741c0e61181baaa7f2e16abd7fc3", 0x6a, 0xb2d6}], 0x10000, &(0x7f0000000780)={[{@nr_inodes={'nr_inodes', 0x3d, [0x39, 0x39, 0x60, 0x25]}}], [{@dont_measure}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x65, 0x65, 0x66, 0x36, 0x32, 0x38, 0x66], 0x2d, [0x62, 0x64, 0x66, 0x36], 0x2d, [0x39, 0x61, 0x31, 0x31], 0x2d, [0x38, 0x31, 0x64, 0x65], 0x2d, [0x61, 0x39, 0x34, 0x37, 0x65, 0x38, 0x38, 0x36]}}}, {@fsmagic={'fsmagic', 0x3d, 0xfd}}, {@measure}, {@smackfsroot={'smackfsroot', 0x3d, '[{&'}}, {@smackfshat={'smackfshat', 0x3d, 'tmpfs\x00'}}]}) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000000)='9\x00', 0x0, r0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x400, 0x45) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c280)}, 0x0) write$binfmt_aout(r3, &(0x7f0000000a00)={{0x10b, 0x40, 0x0, 0xec, 0xba, 0x400, 0x2d1, 0x10001}, "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", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x1620) 08:45:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x8, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 971.914151] loop5: detected capacity change from 0 to 256 [ 978.195405] Process accounting resumed [ 978.373536] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 978.421847] Process accounting resumed 08:45:53 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) r4 = gettid() syz_open_procfs(r4, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(r4, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r5, 0xa) 08:45:53 executing program 4: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c80)=""/197, 0xc5}, {&(0x7f0000000440)=""/171, 0xab}], 0x2, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x44600, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x2}, {0x10001, 0x7fffffff}]}, 0x14, 0x1) process_vm_writev(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)}], 0x2, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/199, 0xc7}, {&(0x7f00000007c0)=""/176, 0xb0}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000a80)=""/145, 0x91}], 0x4, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x6, 0xfffffffffffffe00) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) syz_open_procfs(0x0, &(0x7f00000012c0)='smaps_rollup\x00') rt_sigqueueinfo(0x0, 0x6, &(0x7f0000000380)={0x10, 0x8, 0x4}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB="023f002e6d7fd95028eb0004655ffcbef7000000000043e583a11a107551fc42b066f60a02d9823baf4ed5ad3ace27662880ac79bfaf71904edfec2bb0e12f7bdfe820b1592d5bc4a1a22724e09de8ae4506e71550fee1ddcec5bf128c44dcb4e9a6fadb9cbc6dbd101d855a466000000000000000000004fd46696013428b049fcb04b5c78bf1717fb593570fbe23a04080b4f06a75933f6c34e88d4af003f1ccf1a64bd11f3769df130b4a61b4503cfdd38615266b60a100"/212, @ANYRESDEC=r2], 0x3c, 0x4) process_vm_writev(0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/49, 0x31}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000500)}, {&(0x7f0000000d80)=""/216, 0xd8}, {&(0x7f0000000e80)=""/205, 0xcd}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000000640)=""/45, 0x2d}], 0x8, &(0x7f0000003580)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001080)=""/221, 0xdd}, {&(0x7f0000001180)=""/122, 0x7a}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000003300)=""/177, 0xb1}, {&(0x7f00000033c0)=""/158, 0x9e}, {&(0x7f0000003480)=""/234, 0xea}], 0x7, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000003600)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0x41080, 0x401, 0xdf, 0x0, 0x10001, 0x5, 0x3, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x7, r4, 0xa) 08:45:53 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r1 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x483e}, {0x0}], 0x41400, &(0x7f0000000300)={[{@dots}, {@dots}, {@dots}, {@fat=@gid}], [{@measure}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@hash}, {@uid_eq}, {@euid_gt}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r1}}, './file0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:45:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x9, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:45:53 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 08:45:53 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x407fffffff}, 0x802c, 0x5d4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1f49, 0x0, 0x101, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0xa3, 0x3, 0x1, 0x0, 0x0, 0xea2, 0x90000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xd, 0xa1}, 0x1c532, 0x70644834, 0x3, 0x9, 0x9, 0x400, 0x3f, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0xb8e0af7991c8ee3d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:45:53 executing program 1: prctl$PR_GET_NAME(0x10, &(0x7f0000000240)=""/158) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet6(r0, 0x0, &(0x7f0000000000)) pidfd_open(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x20200, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:45:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2017, 0x0, 0x0, 0x0, 0x0, 0x181}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r1, 0x40089416, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x8d, 0x20, 0x0, 0x6, 0x0, 0xfffffffffffffff8, 0xa00, 0x6, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000600), 0x8}, 0x2, 0x2, 0x9, 0x4, 0xff, 0x8, 0x3, 0x0, 0x2, 0x0, 0x35bb}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x5, 0x6, 0x70, 0x20, 0x0, 0x4, 0x80, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xffffff41, 0x5, @perf_config_ext={0x7, 0x10001}, 0x100, 0x80000000, 0x3ff, 0x0, 0xf08, 0x8, 0x7, 0x0, 0x9, 0x0, 0x10e4}, 0xffffffffffffffff, 0x1000007, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r2, {0x7}}, './file1\x00'}) r4 = open_tree(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000700)={0x20000014}) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x232282, 0x0) ftruncate(r5, 0x5) openat(0xffffffffffffffff, &(0x7f00000005c0)='./file1\x00', 0x840, 0x133) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x200) sendfile(r0, r1, 0x0, 0x10000027f) [ 995.105959] loop5: detected capacity change from 0 to 264192 08:45:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x39a}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) syz_io_uring_setup(0x6436, &(0x7f0000000080)={0x0, 0xcbf8, 0x4, 0x3, 0x200}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f00000002c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x1, 0x0, 0x2, 0x3, &(0x7f0000000180)="eb72679ea8acce5bc266cbe516db680c6f54b72b4e37cbc5fb3583d42b039ec2f34e1b7caa24d39a9fe1f98589adbf867f847b1fd2bcc0dcc068eb05efac721b4e23792b9369483984724e16c8a56a12f64ed722eafa706f169ff0ae983eff74d6c18439fb1e1188d9064163e369d7326fba21b8826432bb26fbc9be257cf4f2503758164e14adf8d69b6a5a5c13bea03f847a348f5c49317730ea32197be86ae50085310ca0bfa9c139ae63fce584151e2f67386c0b1ca75bc3609b31c94b37739e", 0x2, 0x0, 0x0, {0x1, r3}}, 0x2) 08:45:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0xa, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) [ 995.967686] loop3: detected capacity change from 0 to 256 08:45:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0xb, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:45:54 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x121042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="440a2dfab4ee34d3d2a047a8b526cf3d9ad2b3ef92f21c0ca2f9"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x7, 0x9, 0x1}) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file1\x00', 0x400800, 0xb8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) syz_io_uring_setup(0x190b, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000280)) [ 996.056535] loop5: detected capacity change from 0 to 256 08:45:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0xc, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:45:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000007c0), 0x2}, 0xcc80, 0x0, 0x77f, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, r0, 0x0) io_uring_register$IORING_UNREGISTER_BUFFERS(0xffffffffffffffff, 0x1, 0x1000000, 0x0) r2 = syz_io_uring_setup(0x4cdd, &(0x7f0000000140)={0x0, 0x6c4c, 0x10, 0x0, 0x20f}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000300)) syz_io_uring_setup(0x2c86, &(0x7f0000000600)={0x0, 0x0, 0x2, 0x2, 0x213}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000680), &(0x7f0000000800)) syz_io_uring_setup(0x49e8, &(0x7f0000000940)={0x0, 0x23d5, 0x8, 0x3, 0x316, 0x0, r2}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000540), &(0x7f0000000580)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x20, 0x0, 0x0, 0x8}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x2) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) getpriority(0x2, 0x0) fallocate(r4, 0x0, 0x0, 0x87ffffc) 08:45:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0xd, &(0x7f0000000000)={0x77359400}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 08:45:54 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x10, 0x1, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000), 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r3, r2, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x8, 0x7, 0x0, 0x80, 0x0, 0xfffffffffffffffa, 0x2004, 0xd, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000300), 0x2}, 0x624, 0x7, 0xffffffff, 0x6, 0x38b, 0x6, 0xdba, 0x0, 0x80, 0x0, 0x8000000000000}, 0x0, 0x7, r2, 0x1) pread64(r1, &(0x7f0000000140)=""/126, 0x7e, 0x3) r4 = syz_io_uring_setup(0x7174, &(0x7f00000001c0)={0x0, 0x0, 0x1}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000280)) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="b53700002e00000000c80800063282dbc886cd1110ef5822a32e01b16a3026aa15a5729402fe09d2633536ec124b7a0000000000", @ANYRES32=0x0, @ANYBLOB="0c0099000000000000000000"], 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000400)={'wlan1\x00'}) sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000580)=ANY=[@ANYBLOB="140068fb01", @ANYRES16=r5, @ANYBLOB="000429bd7000fddbdfdf59000000"], 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x10) io_uring_enter(r4, 0x0, 0x0, 0x1, 0x0, 0x0) r6 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x8, 0x9, 0x0, 0x0, 0x6, 0x21006, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5054, 0x2, @perf_config_ext={0x1}, 0x114, 0x800000000008, 0xffff7fff, 0x5, 0x1, 0xc3, 0x80b, 0x0, 0x3d, 0x0, 0x4}, 0x0, 0x10, r6, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x10000, 0x0) r7 = socket$inet(0x2, 0x2, 0xd712) setsockopt$inet_mreqn(r7, 0x0, 0x4, &(0x7f00000002c0)={@multicast2, @dev={0xac, 0x14, 0x14, 0x3f}}, 0xc) [ 996.617927] Process accounting resumed [ 998.127776] Process accounting resumed [ 1044.670353] watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [syz-executor.2:12290] [ 1044.671023] Modules linked in: [ 1044.671298] irq event stamp: 9147785 [ 1044.671586] hardirqs last enabled at (9147784): [] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1044.672405] hardirqs last disabled at (9147785): [] sysvec_apic_timer_interrupt+0xf/0xc0 [ 1044.673123] softirqs last enabled at (9117334): [] __irq_exit_rcu+0x11b/0x180 [ 1044.673841] softirqs last disabled at (9117337): [] __irq_exit_rcu+0x11b/0x180 [ 1044.674599] CPU: 0 PID: 12290 Comm: syz-executor.2 Not tainted 6.1.0-rc4-next-20221111 #1 [ 1044.675318] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1044.676104] RIP: 0010:__create_object+0x255/0xc00 [ 1044.678029] Code: df 49 c7 87 a8 00 00 00 00 00 00 00 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e ad 06 00 00 49 8d bf b4 00 00 00 <45> 89 b7 b0 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 [ 1044.680257] RSP: 0018:ffff88806d009a10 EFLAGS: 00000246 [ 1044.680668] RAX: 0000000000000000 RBX: 0000000000000200 RCX: 1ffff110085a99d0 [ 1044.681244] RDX: 1ffff110085a99de RSI: 0000000000000004 RDI: ffff888042d4cef4 [ 1044.681822] RBP: ffff888043670400 R08: 0000000000000001 R09: ffff888042d4ced3 [ 1044.682462] R10: ffffed10085a99da R11: 0000000000000001 R12: ffff888042d4ce88 [ 1044.683092] R13: 0000000000000000 R14: 0000000000000001 R15: ffff888042d4ce40 [ 1044.683724] FS: 0000000000000000(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 [ 1044.684470] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1044.685028] CR2: 0000564a029e4ca0 CR3: 0000000005226000 CR4: 0000000000350ef0 [ 1044.685585] Call Trace: [ 1044.685814] [ 1044.686014] ? kasan_unpoison+0x27/0x60 [ 1044.686359] __kmem_cache_alloc_node+0x237/0x3d0 [ 1044.686755] ? skb_copy+0x13d/0x3d0 [ 1044.687070] __kmalloc_node_track_caller+0x43/0xb0 [ 1044.687476] __alloc_skb+0xe9/0x310 [ 1044.687776] skb_copy+0x13d/0x3d0 [ 1044.688104] ? mac80211_hwsim_tx_frame_no_nl.isra.0+0x785/0x1360 [ 1044.688670] mac80211_hwsim_tx_frame_no_nl.isra.0+0xb6d/0x1360 [ 1044.689154] ? lockdep_hardirqs_on+0x7d/0x100 [ 1044.689518] ? __pfx_mac80211_hwsim_tx_frame_no_nl.isra.0+0x10/0x10 [ 1044.690087] ? mac80211_hwsim_monitor_rx+0xd1/0x820 [ 1044.690465] ? mac80211_hwsim_monitor_rx+0x1b8/0x820 [ 1044.690846] mac80211_hwsim_tx_frame+0x1ee/0x2a0 [ 1044.691230] mac80211_hwsim_beacon_tx+0x566/0xab0 [ 1044.691613] __iterate_interfaces+0x2d3/0x560 [ 1044.692010] ? __pfx_mac80211_hwsim_beacon_tx+0x10/0x10 [ 1044.692444] ? __pfx_mac80211_hwsim_beacon_tx+0x10/0x10 [ 1044.692915] ieee80211_iterate_active_interfaces_atomic+0x74/0x180 [ 1044.693456] mac80211_hwsim_beacon+0x105/0x200 [ 1044.693819] __hrtimer_run_queues+0x541/0xb50 [ 1044.694190] ? __pfx_mac80211_hwsim_beacon+0x10/0x10 [ 1044.694602] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 1044.695049] ? ktime_get_update_offsets_now+0x25a/0x360 [ 1044.695505] hrtimer_run_softirq+0x176/0x350 [ 1044.695875] __do_softirq+0x1c7/0x8f9 [ 1044.696218] __irq_exit_rcu+0x11b/0x180 [ 1044.696562] irq_exit_rcu+0x9/0x30 [ 1044.696878] sysvec_apic_timer_interrupt+0x92/0xc0 [ 1044.697310] [ 1044.697529] [ 1044.697740] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1044.698222] RIP: 0010:lock_acquire+0x4d/0x530 [ 1044.698611] Code: 44 89 c5 53 48 81 ec b0 00 00 00 48 8d 5c 24 10 4c 89 0c 24 48 c7 44 24 10 b3 8a b5 41 48 c1 eb 03 48 c7 44 24 18 da 38 f4 84 <48> 01 d8 48 c7 44 24 20 a0 d3 2b 81 c7 00 f1 f1 f1 f1 c7 40 04 f1 [ 1044.700019] RSP: 0018:ffff88804557f510 EFLAGS: 00000212 [ 1044.700449] RAX: dffffc0000000000 RBX: 1ffff11008aafea4 RCX: 0000000000000002 [ 1044.701010] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff85407e60 [ 1044.701573] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1044.702144] R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000002 [ 1044.702709] R13: 0000000000000000 R14: ffffffff85407e60 R15: 0000000000000000 [ 1044.703279] ? lock_is_held_type+0xdb/0x130 [ 1044.703661] ? find_held_lock+0x2c/0x110 [ 1044.703995] ? lock_release+0x3b6/0x750 [ 1044.704312] ? unlock_page_memcg+0xc2/0x230 [ 1044.704701] ? __pfx_lock_release+0x10/0x10 [ 1044.705050] folio_memcg_lock+0x3e/0x4a0 [ 1044.705378] ? folio_memcg_lock+0x4/0x4a0 [ 1044.705732] page_remove_rmap+0x102/0x780 [ 1044.706132] ? vm_normal_page+0x166/0x2e0 [ 1044.706499] ? __pfx_page_remove_rmap+0x10/0x10 [ 1044.706875] ? unmap_page_range+0x1a69/0x2c30 [ 1044.707236] unmap_page_range+0x2002/0x2c30 [ 1044.707634] ? __pfx_unmap_page_range+0x10/0x10 [ 1044.708052] unmap_single_vma+0x190/0x2a0 [ 1044.708383] unmap_vmas+0x226/0x380 [ 1044.708678] ? __pfx_unmap_vmas+0x10/0x10 [ 1044.709007] ? find_held_lock+0x2c/0x110 [ 1044.709352] ? __pfx_lock_release+0x10/0x10 [ 1044.709725] exit_mmap+0x158/0x680 [ 1044.710052] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1044.710528] ? __pfx_exit_mmap+0x10/0x10 [ 1044.710900] ? mmput+0xc5/0x390 [ 1044.711184] mmput+0xd5/0x390 [ 1044.711450] do_exit+0x99b/0x2720 [ 1044.711765] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1044.712220] ? lockdep_hardirqs_on+0x7d/0x100 [ 1044.712635] ? __pfx_do_exit+0x10/0x10 [ 1044.713007] do_group_exit+0xd4/0x2a0 [ 1044.713338] get_signal+0x21a5/0x22e0 [ 1044.713672] ? __pfx_get_signal+0x10/0x10 [ 1044.714055] arch_do_signal_or_restart+0x79/0x5a0 [ 1044.714451] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1044.714893] ? lockdep_hardirqs_on+0x7d/0x100 [ 1044.715270] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1044.715723] exit_to_user_mode_prepare+0x131/0x1a0 [ 1044.716113] syscall_exit_to_user_mode+0x1d/0x50 [ 1044.716496] do_syscall_64+0x4c/0x90 [ 1044.716800] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1044.717210] RIP: 0033:0x7f5a1a96bb19 [ 1044.717514] Code: Unable to access opcode bytes at 0x7f5a1a96baef. [ 1044.718034] RSP: 002b:00007f5a17ee1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000137 [ 1044.718635] RAX: fffffffffffffff2 RBX: 00007f5a1aa7ef60 RCX: 00007f5a1a96bb19 [ 1044.719170] RDX: 0000000000000002 RSI: 0000000020000680 RDI: 00000000000000a1 [ 1044.719705] RBP: 00007f5a1a9c5f6d R08: 0000000000000004 R09: 0000000000000000 [ 1044.720247] R10: 0000000020000980 R11: 0000000000000246 R12: 0000000000000000 [ 1044.720778] R13: 00007ffe152be32f R14: 00007f5a17ee1300 R15: 0000000000022000 [ 1044.721362] [ 1044.721568] Sending NMI from CPU 0 to CPUs 1: [ 1044.721977] NMI backtrace for cpu 1 skipped: idling at default_idle+0xf/0x20 VM DIAGNOSIS: 08:46:43 Registers: info registers vcpu 0 RAX=0000000000000078 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff8246aa15 RDI=ffffffff87bb7a20 RBP=ffffffff87bb79e0 RSP=ffff88806d009220 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000078 R11=0000000000000001 R12=0000000000000078 R13=ffffffff87bb79e0 R14=0000000000000010 R15=ffffffff8246aa00 RIP=ffffffff8246aa6d RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806d000000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe07f0d39000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe07f0d37000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000564a029e4ca0 CR3=0000000005226000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffff00ffffffffffff0000000000 XMM02=4a029b35a00000000000006b636f6c62 XMM03=000000000f00000000000035706f6f6c XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=ffffffffffff00000000000000000000 XMM06=00000000000065616124242f6867632f XMM07=00000000000000000000000000000000 XMM08=75253a75252f73252f7665642f007261 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff843e0000 RBX=ffff88800897d040 RCX=ffffffff843c0a02 RDX=0000000000000000 RSI=0000000000000001 RDI=0000000000000000 RBP=0000000000000001 RSP=ffff8880089f7e58 R8 =0000000000000001 R9 =ffff88806d134cc3 R10=ffffed100da26998 R11=0000000000000001 R12=ffffed100112fa08 R13=ffffffff85b0ee90 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff843e000f RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806d100000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe1252321000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe125231f000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000564a029a1648 CR3=00000000174b2000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=007d01fe016c6c6f502e726567616e61 XMM02=0000000000000000bfe62e42fefa39ef XMM03=398bd50a9492236200a2cb6f3bd51a46 XMM04=d9e104e8096b0c74c519a9884129de6e XMM05=e3e8f924ce98d2da17cd4edfb664e559 XMM06=6c11ce87d12f634a9421b9ef5b75259e XMM07=d1da87461860ca62f292f2d8330a357f XMM08=c0391ab5721f284cadb62e688c9f1930 XMM09=398bd50a9492236200a2cb6f3bd51a46 XMM10=040491713f1ef7db0eac8423b7432c38 XMM11=66677b211d26438a147ce811ab82cf74 XMM12=53edd249d956ead3534b75d1130a3e18 XMM13=343530387830202c273030785c31656c XMM14=282628746e756f6d0a29317830202c30 XMM15=3d293063303030303030303066377830