) tkill(r1, 0xb) wait4(r1, &(0x7f00000001c0), 0x2, &(0x7f0000000280)) r2 = gettid() tkill(r2, 0xb) wait4(r2, 0x0, 0x1, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) clone(0x80, &(0x7f0000000080)="cf002ab9ebaa971960953a405f89e5954060fd8ed983377412ebe5dc06e85ef6c1b6", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="78f1edee52fce601634bfa211d6a15c705199d") (async) gettid() (async) tkill(r1, 0xb) (async) wait4(r1, &(0x7f00000001c0), 0x2, &(0x7f0000000280)) (async) gettid() (async) tkill(r2, 0xb) (async) wait4(r2, 0x0, 0x1, 0x0) (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) (async) 01:48:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248807) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:39 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async, rerun: 32) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async, rerun: 32) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c, 0x40, 0x0, 0x0) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (rerun: 32) 01:48:39 executing program 3: ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000740)) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0x10, &(0x7f0000000240)=0x3, 0x2) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2200300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4200, r1, 0x0, 0x0) gettid() r2 = gettid() tkill(r2, 0xb) r3 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000540)=[{&(0x7f0000000140)="a8140bbfcc6cef1c208ec2caad31b647c1f7bab6a0bb453a7d50a0a244ac3cf90cbd333a76c049ba8e29af0ad3ecc80f9578d3dd13740cfa171f540eb02be859017a903170e6b044cb80180c07747c2d02489b632206f51656aad44aea76b34b4ff210fbc026c091b70fb67627d039251d95b8d826cf3a87a185890278e889ba52b616837453de80fbd7aa3d7b81680531237a82ed030f53a9f4afcb40cc20d2504dbd0341e3592755089a8a7ca1dc53e3a8149e0f33a819646b05196596485eab52cfa3", 0xc4, 0x2}, {&(0x7f0000000080)="6a6a230f33aa35144be136102c61d814e3e2ca5ce5a776ad4074a7135a3997d16d52ba3ba80a39a503a52e176fe6652c9fd8cae124d95d107c75c90a3789cdba640cfadaacc2d9de3d54b6cc7b9d22003163ae1bc93bdfbb55182fef4f19f90a9ff58ba67f69543ea870209753543cc02e20e876ca453dd54ac77ca296", 0x7d, 0x800}, {&(0x7f0000000600)="3522d3a87e9d3100000001245b38ab7c5f63440c98c9bda45301a3f6939e378e619d8399353a15837e6d04cf4f4cb25a93bcf1628aa621ceebc0856aa33e454f78ec6573dc460248fe5d03e6eca8483693c24134270b87be80b11e6de57547b464eac117bcfbe72d870ffeab45dc8fc5b4b1f3e7c35caa4f406f09483903f15ee265a002916a2245418c85ffa9e7a9b15dfbe173287597b626b0bf74fdf337740f1a8f58818e34904cdd000000000000000918c33087f6", 0xb7, 0xfff}, {&(0x7f00000002c0)="5d18e2364ecd406456cb96b1a9db7c149fad95f0293a0c388d66e1089888afca09a995d76ddd51e052538ed48aac01b570109b8e092e97148c700e4472042177fc19e974523b57e9cb6228688f8b3997b59b9e7a1a4ec784b315c5f86d75cf147f7c288d8ed3ec61210609f284dfd66728e641f3904db6ee0eb7ac673d5c11841b0fb4dec1741476a1131c1b93c1613183a797eb3273e8775c95ec27456b65292797bf7fcf52a2a771b3f022dc477dd8f4c116b20fc8fb503241089cd634f4292b336d103d23d882952dca0e323367c009b49b3ad832353cf4ef40989bbebf", 0xdf, 0x1}, {&(0x7f0000000440)="e4f98e03ff51d3460d44f5454f338dabf5c19c1443e3efc93f33882ef1985ee12a2eb4fa6afcd79e8b3aee0d43ca8f4f47d095c7b147f5745c9521a722111e2b83a89caf6dd61eee328314f31f4923bcd061db127a4e6642bcb72b97e1d5b427c44fecb23f48cb1389aa7a7401732ea4f26e6d40b507e88b63e3d4311c06804c724206a019d54c16697fdfbf48485fde21aa6562ea6219dae870f2a5871d4674f6cb8d1dea5481a1c7169e81a6fd3c6dc7e31a10950efb3d46df9ceecaa61edda9fcc33dccfd54a644790d0a621b6477c850e8e65b047c16df4e46467c515b1902a153d870200cbd", 0xe8, 0x6}, {&(0x7f00000003c0)="1680e8fe0bf6d445bc01212516ae75e79a0b137948a50c1339e0c0eb9e7293a5dfc79f4fa632eea1ec3f17e4ead1f6b2f7ff336a", 0x34, 0x8}], 0x0, &(0x7f0000000080)=ANY=[]) r4 = openat(r3, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r4, &(0x7f0000004200)='t', 0xfff4) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f00000006c0), &(0x7f0000000700)=0x4) perf_event_open(0x0, r2, 0xffffffffffffffff, r4, 0x8) tkill(r1, 0x36) signalfd(r5, &(0x7f0000000780)={[0xffff]}, 0x8) 01:48:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248808) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x4, 0x2, 0xed, 0x5, 0x0, 0xffffffffffffffff, 0x21d00, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1f, 0x4, @perf_config_ext={0x2, 0x8}, 0x41, 0x5, 0x5, 0x0, 0x10000, 0x8, 0x1, 0x0, 0x3, 0x0, 0x8}, 0x0, 0xa, r3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000480)={'sit0\x00', &(0x7f0000000400)={'ip6gre0\x00', 0x0, 0x2f, 0x3f, 0x7f, 0x3ff, 0x71, @loopback, @mcast1, 0x7, 0x80, 0x10001, 0x80000000}}) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000004c0), 0x200, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000580), 0x80400, 0x0) r7 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r8 = openat(r7, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r8, &(0x7f0000004200)='t', 0xfff4) r9 = syz_open_dev$audion(&(0x7f00000005c0), 0xff, 0x10000) r10 = fsmount(r3, 0x0, 0x8a) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0x9, &(0x7f0000000280)=@raw=[@exit, @map_idx={0x18, 0x0, 0x5, 0x0, 0x8}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @alu={0x7, 0x1, 0xb, 0xb, 0x2, 0x4, 0xffffffffffffffe4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xfffffffa}], &(0x7f0000000300)='GPL\x00', 0x5, 0x8e, &(0x7f0000000340)=""/142, 0x40f00, 0x4, '\x00', r4, 0x2c, r5, 0x8, &(0x7f0000000500)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000540)={0x4, 0xc, 0x8000, 0x8a}, 0x10, 0x0, r6, 0x0, &(0x7f0000000600)=[r8, r9, r2, r3, r0, 0xffffffffffffffff, r10, r3, r1]}, 0x80) 01:48:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248809) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:40 executing program 3: ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000740)) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0x10, &(0x7f0000000240)=0x3, 0x2) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2200300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4200, r1, 0x0, 0x0) gettid() r2 = gettid() tkill(r2, 0xb) r3 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000540)=[{&(0x7f0000000140)="a8140bbfcc6cef1c208ec2caad31b647c1f7bab6a0bb453a7d50a0a244ac3cf90cbd333a76c049ba8e29af0ad3ecc80f9578d3dd13740cfa171f540eb02be859017a903170e6b044cb80180c07747c2d02489b632206f51656aad44aea76b34b4ff210fbc026c091b70fb67627d039251d95b8d826cf3a87a185890278e889ba52b616837453de80fbd7aa3d7b81680531237a82ed030f53a9f4afcb40cc20d2504dbd0341e3592755089a8a7ca1dc53e3a8149e0f33a819646b05196596485eab52cfa3", 0xc4, 0x2}, {&(0x7f0000000080)="6a6a230f33aa35144be136102c61d814e3e2ca5ce5a776ad4074a7135a3997d16d52ba3ba80a39a503a52e176fe6652c9fd8cae124d95d107c75c90a3789cdba640cfadaacc2d9de3d54b6cc7b9d22003163ae1bc93bdfbb55182fef4f19f90a9ff58ba67f69543ea870209753543cc02e20e876ca453dd54ac77ca296", 0x7d, 0x800}, {&(0x7f0000000600)="3522d3a87e9d3100000001245b38ab7c5f63440c98c9bda45301a3f6939e378e619d8399353a15837e6d04cf4f4cb25a93bcf1628aa621ceebc0856aa33e454f78ec6573dc460248fe5d03e6eca8483693c24134270b87be80b11e6de57547b464eac117bcfbe72d870ffeab45dc8fc5b4b1f3e7c35caa4f406f09483903f15ee265a002916a2245418c85ffa9e7a9b15dfbe173287597b626b0bf74fdf337740f1a8f58818e34904cdd000000000000000918c33087f6", 0xb7, 0xfff}, {&(0x7f00000002c0)="5d18e2364ecd406456cb96b1a9db7c149fad95f0293a0c388d66e1089888afca09a995d76ddd51e052538ed48aac01b570109b8e092e97148c700e4472042177fc19e974523b57e9cb6228688f8b3997b59b9e7a1a4ec784b315c5f86d75cf147f7c288d8ed3ec61210609f284dfd66728e641f3904db6ee0eb7ac673d5c11841b0fb4dec1741476a1131c1b93c1613183a797eb3273e8775c95ec27456b65292797bf7fcf52a2a771b3f022dc477dd8f4c116b20fc8fb503241089cd634f4292b336d103d23d882952dca0e323367c009b49b3ad832353cf4ef40989bbebf", 0xdf, 0x1}, {&(0x7f0000000440)="e4f98e03ff51d3460d44f5454f338dabf5c19c1443e3efc93f33882ef1985ee12a2eb4fa6afcd79e8b3aee0d43ca8f4f47d095c7b147f5745c9521a722111e2b83a89caf6dd61eee328314f31f4923bcd061db127a4e6642bcb72b97e1d5b427c44fecb23f48cb1389aa7a7401732ea4f26e6d40b507e88b63e3d4311c06804c724206a019d54c16697fdfbf48485fde21aa6562ea6219dae870f2a5871d4674f6cb8d1dea5481a1c7169e81a6fd3c6dc7e31a10950efb3d46df9ceecaa61edda9fcc33dccfd54a644790d0a621b6477c850e8e65b047c16df4e46467c515b1902a153d870200cbd", 0xe8, 0x6}, {&(0x7f00000003c0)="1680e8fe0bf6d445bc01212516ae75e79a0b137948a50c1339e0c0eb9e7293a5dfc79f4fa632eea1ec3f17e4ead1f6b2f7ff336a", 0x34, 0x8}], 0x0, &(0x7f0000000080)=ANY=[]) r4 = openat(r3, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r4, &(0x7f0000004200)='t', 0xfff4) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f00000006c0), &(0x7f0000000700)=0x4) perf_event_open(0x0, r2, 0xffffffffffffffff, r4, 0x8) tkill(r1, 0x36) signalfd(r5, &(0x7f0000000780)={[0xffff]}, 0x8) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000740)) (async) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) (async) setsockopt$bt_BT_VOICE(r0, 0x112, 0x10, &(0x7f0000000240)=0x3, 0x2) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2200300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4200, r1, 0x0, 0x0) (async) gettid() (async) gettid() (async) tkill(r2, 0xb) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000540)=[{&(0x7f0000000140)="a8140bbfcc6cef1c208ec2caad31b647c1f7bab6a0bb453a7d50a0a244ac3cf90cbd333a76c049ba8e29af0ad3ecc80f9578d3dd13740cfa171f540eb02be859017a903170e6b044cb80180c07747c2d02489b632206f51656aad44aea76b34b4ff210fbc026c091b70fb67627d039251d95b8d826cf3a87a185890278e889ba52b616837453de80fbd7aa3d7b81680531237a82ed030f53a9f4afcb40cc20d2504dbd0341e3592755089a8a7ca1dc53e3a8149e0f33a819646b05196596485eab52cfa3", 0xc4, 0x2}, {&(0x7f0000000080)="6a6a230f33aa35144be136102c61d814e3e2ca5ce5a776ad4074a7135a3997d16d52ba3ba80a39a503a52e176fe6652c9fd8cae124d95d107c75c90a3789cdba640cfadaacc2d9de3d54b6cc7b9d22003163ae1bc93bdfbb55182fef4f19f90a9ff58ba67f69543ea870209753543cc02e20e876ca453dd54ac77ca296", 0x7d, 0x800}, {&(0x7f0000000600)="3522d3a87e9d3100000001245b38ab7c5f63440c98c9bda45301a3f6939e378e619d8399353a15837e6d04cf4f4cb25a93bcf1628aa621ceebc0856aa33e454f78ec6573dc460248fe5d03e6eca8483693c24134270b87be80b11e6de57547b464eac117bcfbe72d870ffeab45dc8fc5b4b1f3e7c35caa4f406f09483903f15ee265a002916a2245418c85ffa9e7a9b15dfbe173287597b626b0bf74fdf337740f1a8f58818e34904cdd000000000000000918c33087f6", 0xb7, 0xfff}, {&(0x7f00000002c0)="5d18e2364ecd406456cb96b1a9db7c149fad95f0293a0c388d66e1089888afca09a995d76ddd51e052538ed48aac01b570109b8e092e97148c700e4472042177fc19e974523b57e9cb6228688f8b3997b59b9e7a1a4ec784b315c5f86d75cf147f7c288d8ed3ec61210609f284dfd66728e641f3904db6ee0eb7ac673d5c11841b0fb4dec1741476a1131c1b93c1613183a797eb3273e8775c95ec27456b65292797bf7fcf52a2a771b3f022dc477dd8f4c116b20fc8fb503241089cd634f4292b336d103d23d882952dca0e323367c009b49b3ad832353cf4ef40989bbebf", 0xdf, 0x1}, {&(0x7f0000000440)="e4f98e03ff51d3460d44f5454f338dabf5c19c1443e3efc93f33882ef1985ee12a2eb4fa6afcd79e8b3aee0d43ca8f4f47d095c7b147f5745c9521a722111e2b83a89caf6dd61eee328314f31f4923bcd061db127a4e6642bcb72b97e1d5b427c44fecb23f48cb1389aa7a7401732ea4f26e6d40b507e88b63e3d4311c06804c724206a019d54c16697fdfbf48485fde21aa6562ea6219dae870f2a5871d4674f6cb8d1dea5481a1c7169e81a6fd3c6dc7e31a10950efb3d46df9ceecaa61edda9fcc33dccfd54a644790d0a621b6477c850e8e65b047c16df4e46467c515b1902a153d870200cbd", 0xe8, 0x6}, {&(0x7f00000003c0)="1680e8fe0bf6d445bc01212516ae75e79a0b137948a50c1339e0c0eb9e7293a5dfc79f4fa632eea1ec3f17e4ead1f6b2f7ff336a", 0x34, 0x8}], 0x0, &(0x7f0000000080)=ANY=[]) (async) openat(r3, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r4, &(0x7f0000004200)='t', 0xfff4) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) (async) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f00000006c0), &(0x7f0000000700)=0x4) (async) perf_event_open(0x0, r2, 0xffffffffffffffff, r4, 0x8) (async) tkill(r1, 0x36) (async) signalfd(r5, &(0x7f0000000780)={[0xffff]}, 0x8) (async) 01:48:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x4, 0x2, 0xed, 0x5, 0x0, 0xffffffffffffffff, 0x21d00, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1f, 0x4, @perf_config_ext={0x2, 0x8}, 0x41, 0x5, 0x5, 0x0, 0x10000, 0x8, 0x1, 0x0, 0x3, 0x0, 0x8}, 0x0, 0xa, r3, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000480)={'sit0\x00', &(0x7f0000000400)={'ip6gre0\x00', 0x0, 0x2f, 0x3f, 0x7f, 0x3ff, 0x71, @loopback, @mcast1, 0x7, 0x80, 0x10001, 0x80000000}}) (async, rerun: 64) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000004c0), 0x200, 0x0) (async, rerun: 64) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000580), 0x80400, 0x0) (async, rerun: 64) r7 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (rerun: 64) r8 = openat(r7, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r8, &(0x7f0000004200)='t', 0xfff4) r9 = syz_open_dev$audion(&(0x7f00000005c0), 0xff, 0x10000) (async) r10 = fsmount(r3, 0x0, 0x8a) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0x9, &(0x7f0000000280)=@raw=[@exit, @map_idx={0x18, 0x0, 0x5, 0x0, 0x8}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @alu={0x7, 0x1, 0xb, 0xb, 0x2, 0x4, 0xffffffffffffffe4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xfffffffa}], &(0x7f0000000300)='GPL\x00', 0x5, 0x8e, &(0x7f0000000340)=""/142, 0x40f00, 0x4, '\x00', r4, 0x2c, r5, 0x8, &(0x7f0000000500)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000540)={0x4, 0xc, 0x8000, 0x8a}, 0x10, 0x0, r6, 0x0, &(0x7f0000000600)=[r8, r9, r2, r3, r0, 0xffffffffffffffff, r10, r3, r1]}, 0x80) 01:48:40 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c, 0x40, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c, 0x40, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 01:48:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x24880a) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:41 executing program 3: ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000740)) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0x10, &(0x7f0000000240)=0x3, 0x2) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2200300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4200, r1, 0x0, 0x0) gettid() r2 = gettid() tkill(r2, 0xb) r3 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000540)=[{&(0x7f0000000140)="a8140bbfcc6cef1c208ec2caad31b647c1f7bab6a0bb453a7d50a0a244ac3cf90cbd333a76c049ba8e29af0ad3ecc80f9578d3dd13740cfa171f540eb02be859017a903170e6b044cb80180c07747c2d02489b632206f51656aad44aea76b34b4ff210fbc026c091b70fb67627d039251d95b8d826cf3a87a185890278e889ba52b616837453de80fbd7aa3d7b81680531237a82ed030f53a9f4afcb40cc20d2504dbd0341e3592755089a8a7ca1dc53e3a8149e0f33a819646b05196596485eab52cfa3", 0xc4, 0x2}, {&(0x7f0000000080)="6a6a230f33aa35144be136102c61d814e3e2ca5ce5a776ad4074a7135a3997d16d52ba3ba80a39a503a52e176fe6652c9fd8cae124d95d107c75c90a3789cdba640cfadaacc2d9de3d54b6cc7b9d22003163ae1bc93bdfbb55182fef4f19f90a9ff58ba67f69543ea870209753543cc02e20e876ca453dd54ac77ca296", 0x7d, 0x800}, {&(0x7f0000000600)="3522d3a87e9d3100000001245b38ab7c5f63440c98c9bda45301a3f6939e378e619d8399353a15837e6d04cf4f4cb25a93bcf1628aa621ceebc0856aa33e454f78ec6573dc460248fe5d03e6eca8483693c24134270b87be80b11e6de57547b464eac117bcfbe72d870ffeab45dc8fc5b4b1f3e7c35caa4f406f09483903f15ee265a002916a2245418c85ffa9e7a9b15dfbe173287597b626b0bf74fdf337740f1a8f58818e34904cdd000000000000000918c33087f6", 0xb7, 0xfff}, {&(0x7f00000002c0)="5d18e2364ecd406456cb96b1a9db7c149fad95f0293a0c388d66e1089888afca09a995d76ddd51e052538ed48aac01b570109b8e092e97148c700e4472042177fc19e974523b57e9cb6228688f8b3997b59b9e7a1a4ec784b315c5f86d75cf147f7c288d8ed3ec61210609f284dfd66728e641f3904db6ee0eb7ac673d5c11841b0fb4dec1741476a1131c1b93c1613183a797eb3273e8775c95ec27456b65292797bf7fcf52a2a771b3f022dc477dd8f4c116b20fc8fb503241089cd634f4292b336d103d23d882952dca0e323367c009b49b3ad832353cf4ef40989bbebf", 0xdf, 0x1}, {&(0x7f0000000440)="e4f98e03ff51d3460d44f5454f338dabf5c19c1443e3efc93f33882ef1985ee12a2eb4fa6afcd79e8b3aee0d43ca8f4f47d095c7b147f5745c9521a722111e2b83a89caf6dd61eee328314f31f4923bcd061db127a4e6642bcb72b97e1d5b427c44fecb23f48cb1389aa7a7401732ea4f26e6d40b507e88b63e3d4311c06804c724206a019d54c16697fdfbf48485fde21aa6562ea6219dae870f2a5871d4674f6cb8d1dea5481a1c7169e81a6fd3c6dc7e31a10950efb3d46df9ceecaa61edda9fcc33dccfd54a644790d0a621b6477c850e8e65b047c16df4e46467c515b1902a153d870200cbd", 0xe8, 0x6}, {&(0x7f00000003c0)="1680e8fe0bf6d445bc01212516ae75e79a0b137948a50c1339e0c0eb9e7293a5dfc79f4fa632eea1ec3f17e4ead1f6b2f7ff336a", 0x34, 0x8}], 0x0, &(0x7f0000000080)=ANY=[]) r4 = openat(r3, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r4, &(0x7f0000004200)='t', 0xfff4) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f00000006c0), &(0x7f0000000700)=0x4) perf_event_open(0x0, r2, 0xffffffffffffffff, r4, 0x8) tkill(r1, 0x36) signalfd(r5, &(0x7f0000000780)={[0xffff]}, 0x8) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000740)) (async) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) (async) setsockopt$bt_BT_VOICE(r0, 0x112, 0x10, &(0x7f0000000240)=0x3, 0x2) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2200300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4200, r1, 0x0, 0x0) (async) gettid() (async) gettid() (async) tkill(r2, 0xb) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000540)=[{&(0x7f0000000140)="a8140bbfcc6cef1c208ec2caad31b647c1f7bab6a0bb453a7d50a0a244ac3cf90cbd333a76c049ba8e29af0ad3ecc80f9578d3dd13740cfa171f540eb02be859017a903170e6b044cb80180c07747c2d02489b632206f51656aad44aea76b34b4ff210fbc026c091b70fb67627d039251d95b8d826cf3a87a185890278e889ba52b616837453de80fbd7aa3d7b81680531237a82ed030f53a9f4afcb40cc20d2504dbd0341e3592755089a8a7ca1dc53e3a8149e0f33a819646b05196596485eab52cfa3", 0xc4, 0x2}, {&(0x7f0000000080)="6a6a230f33aa35144be136102c61d814e3e2ca5ce5a776ad4074a7135a3997d16d52ba3ba80a39a503a52e176fe6652c9fd8cae124d95d107c75c90a3789cdba640cfadaacc2d9de3d54b6cc7b9d22003163ae1bc93bdfbb55182fef4f19f90a9ff58ba67f69543ea870209753543cc02e20e876ca453dd54ac77ca296", 0x7d, 0x800}, {&(0x7f0000000600)="3522d3a87e9d3100000001245b38ab7c5f63440c98c9bda45301a3f6939e378e619d8399353a15837e6d04cf4f4cb25a93bcf1628aa621ceebc0856aa33e454f78ec6573dc460248fe5d03e6eca8483693c24134270b87be80b11e6de57547b464eac117bcfbe72d870ffeab45dc8fc5b4b1f3e7c35caa4f406f09483903f15ee265a002916a2245418c85ffa9e7a9b15dfbe173287597b626b0bf74fdf337740f1a8f58818e34904cdd000000000000000918c33087f6", 0xb7, 0xfff}, {&(0x7f00000002c0)="5d18e2364ecd406456cb96b1a9db7c149fad95f0293a0c388d66e1089888afca09a995d76ddd51e052538ed48aac01b570109b8e092e97148c700e4472042177fc19e974523b57e9cb6228688f8b3997b59b9e7a1a4ec784b315c5f86d75cf147f7c288d8ed3ec61210609f284dfd66728e641f3904db6ee0eb7ac673d5c11841b0fb4dec1741476a1131c1b93c1613183a797eb3273e8775c95ec27456b65292797bf7fcf52a2a771b3f022dc477dd8f4c116b20fc8fb503241089cd634f4292b336d103d23d882952dca0e323367c009b49b3ad832353cf4ef40989bbebf", 0xdf, 0x1}, {&(0x7f0000000440)="e4f98e03ff51d3460d44f5454f338dabf5c19c1443e3efc93f33882ef1985ee12a2eb4fa6afcd79e8b3aee0d43ca8f4f47d095c7b147f5745c9521a722111e2b83a89caf6dd61eee328314f31f4923bcd061db127a4e6642bcb72b97e1d5b427c44fecb23f48cb1389aa7a7401732ea4f26e6d40b507e88b63e3d4311c06804c724206a019d54c16697fdfbf48485fde21aa6562ea6219dae870f2a5871d4674f6cb8d1dea5481a1c7169e81a6fd3c6dc7e31a10950efb3d46df9ceecaa61edda9fcc33dccfd54a644790d0a621b6477c850e8e65b047c16df4e46467c515b1902a153d870200cbd", 0xe8, 0x6}, {&(0x7f00000003c0)="1680e8fe0bf6d445bc01212516ae75e79a0b137948a50c1339e0c0eb9e7293a5dfc79f4fa632eea1ec3f17e4ead1f6b2f7ff336a", 0x34, 0x8}], 0x0, &(0x7f0000000080)=ANY=[]) (async) openat(r3, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r4, &(0x7f0000004200)='t', 0xfff4) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) (async) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f00000006c0), &(0x7f0000000700)=0x4) (async) perf_event_open(0x0, r2, 0xffffffffffffffff, r4, 0x8) (async) tkill(r1, 0x36) (async) signalfd(r5, &(0x7f0000000780)={[0xffff]}, 0x8) (async) 01:48:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x24880c) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:41 executing program 5: perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000280), 0x109040, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000600), 0x408400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f00000005c0)='cma_alloc\x00', r4}, 0x10) sendmsg$TIPC_CMD_SHOW_PORTS(r3, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x2000c000) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r0) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x2c, r5, 0x2, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x4}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x5e6bfdc97ed182ba}, 0x20044040) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x181200, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@bridge_newneigh={0x30, 0x1c, 0x100, 0x70bd25, 0x25dfdbfb, {0x1c, 0x0, 0x0, 0x0, 0x40, 0x12}, [@NDA_DST_IPV6={0x14, 0x1, @remote}]}, 0x30}, 0x1, 0x0, 0x0, 0x8004}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GETSTATE(r7, 0x40046629, &(0x7f0000000580)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:41 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000080), 0x40000000, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) 01:48:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x24880d) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x4, 0x2, 0xed, 0x5, 0x0, 0xffffffffffffffff, 0x21d00, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1f, 0x4, @perf_config_ext={0x2, 0x8}, 0x41, 0x5, 0x5, 0x0, 0x10000, 0x8, 0x1, 0x0, 0x3, 0x0, 0x8}, 0x0, 0xa, r3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000480)={'sit0\x00', &(0x7f0000000400)={'ip6gre0\x00', 0x0, 0x2f, 0x3f, 0x7f, 0x3ff, 0x71, @loopback, @mcast1, 0x7, 0x80, 0x10001, 0x80000000}}) (async) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000004c0), 0x200, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000580), 0x80400, 0x0) (async) r7 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r8 = openat(r7, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r8, &(0x7f0000004200)='t', 0xfff4) (async) r9 = syz_open_dev$audion(&(0x7f00000005c0), 0xff, 0x10000) r10 = fsmount(r3, 0x0, 0x8a) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0x9, &(0x7f0000000280)=@raw=[@exit, @map_idx={0x18, 0x0, 0x5, 0x0, 0x8}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @alu={0x7, 0x1, 0xb, 0xb, 0x2, 0x4, 0xffffffffffffffe4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xfffffffa}], &(0x7f0000000300)='GPL\x00', 0x5, 0x8e, &(0x7f0000000340)=""/142, 0x40f00, 0x4, '\x00', r4, 0x2c, r5, 0x8, &(0x7f0000000500)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000540)={0x4, 0xc, 0x8000, 0x8a}, 0x10, 0x0, r6, 0x0, &(0x7f0000000600)=[r8, r9, r2, r3, r0, 0xffffffffffffffff, r10, r3, r1]}, 0x80) 01:48:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x24880e) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:42 executing program 5: perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000280), 0x109040, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000600), 0x408400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f00000005c0)='cma_alloc\x00', r4}, 0x10) sendmsg$TIPC_CMD_SHOW_PORTS(r3, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x2000c000) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r0) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x2c, r5, 0x2, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x4}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x5e6bfdc97ed182ba}, 0x20044040) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x181200, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@bridge_newneigh={0x30, 0x1c, 0x100, 0x70bd25, 0x25dfdbfb, {0x1c, 0x0, 0x0, 0x0, 0x40, 0x12}, [@NDA_DST_IPV6={0x14, 0x1, @remote}]}, 0x30}, 0x1, 0x0, 0x0, 0x8004}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GETSTATE(r7, 0x40046629, &(0x7f0000000580)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000280), 0x109040, 0x0) (async) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000600), 0x408400, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f00000005c0)='cma_alloc\x00', r4}, 0x10) (async) sendmsg$TIPC_CMD_SHOW_PORTS(r3, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x2000c000) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r0) (async) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x2c, r5, 0x2, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x4}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x5e6bfdc97ed182ba}, 0x20044040) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x181200, 0x0) (async) sendmsg$nl_route(r6, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@bridge_newneigh={0x30, 0x1c, 0x100, 0x70bd25, 0x25dfdbfb, {0x1c, 0x0, 0x0, 0x0, 0x40, 0x12}, [@NDA_DST_IPV6={0x14, 0x1, @remote}]}, 0x30}, 0x1, 0x0, 0x0, 0x8004}, 0x40) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) ioctl$EXT4_IOC_GETSTATE(r7, 0x40046629, &(0x7f0000000580)) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 01:48:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:42 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000080), 0x40000000, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000080), 0x40000000, &(0x7f0000000100)) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) (async) 01:48:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x24880f) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:42 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000080), 0x40000000, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000080), 0x40000000, &(0x7f0000000100)) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) (async) 01:48:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 01:48:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248810) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:43 executing program 5: perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000280), 0x109040, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000600), 0x408400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f00000005c0)='cma_alloc\x00', r4}, 0x10) sendmsg$TIPC_CMD_SHOW_PORTS(r3, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x2000c000) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r0) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x2c, r5, 0x2, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x4}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x5e6bfdc97ed182ba}, 0x20044040) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x181200, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@bridge_newneigh={0x30, 0x1c, 0x100, 0x70bd25, 0x25dfdbfb, {0x1c, 0x0, 0x0, 0x0, 0x40, 0x12}, [@NDA_DST_IPV6={0x14, 0x1, @remote}]}, 0x30}, 0x1, 0x0, 0x0, 0x8004}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GETSTATE(r7, 0x40046629, &(0x7f0000000580)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000280), 0x109040, 0x0) (async) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000600), 0x408400, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f00000005c0)='cma_alloc\x00', r4}, 0x10) (async) sendmsg$TIPC_CMD_SHOW_PORTS(r3, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x2000c000) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r0) (async) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x2c, r5, 0x2, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x4}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x5e6bfdc97ed182ba}, 0x20044040) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x181200, 0x0) (async) sendmsg$nl_route(r6, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@bridge_newneigh={0x30, 0x1c, 0x100, 0x70bd25, 0x25dfdbfb, {0x1c, 0x0, 0x0, 0x0, 0x40, 0x12}, [@NDA_DST_IPV6={0x14, 0x1, @remote}]}, 0x30}, 0x1, 0x0, 0x0, 0x8004}, 0x40) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) (async) ioctl$EXT4_IOC_GETSTATE(r7, 0x40046629, &(0x7f0000000580)) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 01:48:43 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r2, &(0x7f0000004200)='t', 0xfff4) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x4, 0x7, 0x4e, 0xc, 0x0, 0xe64, 0x800, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x1000, 0x9, 0x53, 0x1, 0xa4, 0x80000000, 0xfbff, 0x0, 0x3, 0x0, 0x1000}, 0xffffffffffffffff, 0xc, r2, 0x8) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) 01:48:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x24881c) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 368.534704][T26857] loop3: detected capacity change from 0 to 16 [ 368.576726][ T25] audit: type=1800 audit(1640483323.185:155): pid=26857 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=1048603 res=0 errno=0 01:48:43 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r3}, 0x10) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r2, 0x89f9, &(0x7f00000003c0)={'sit0\x00', &(0x7f0000000340)={'ip6tnl0\x00', 0x0, 0x2f, 0x40, 0xf9, 0x1, 0x8, @ipv4={'\x00', '\xff\xff', @remote}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7800, 0x7, 0x5, 0x9}}) recvmmsg$unix(r2, &(0x7f00000061c0)=[{{&(0x7f00000004c0)=@abs, 0x6e, &(0x7f0000000840)=[{&(0x7f0000000540)=""/44, 0x2c}, {&(0x7f0000000580)=""/201, 0xc9}, {&(0x7f0000000680)=""/9, 0x9}, {&(0x7f00000006c0)=""/204, 0xcc}, {&(0x7f00000007c0)=""/121, 0x79}], 0x5}}, {{&(0x7f00000008c0)=@abs, 0x6e, &(0x7f0000000b40)=[{&(0x7f0000000940)=""/21, 0x15}, {&(0x7f0000000980)=""/128, 0x80}, {&(0x7f0000000a00)=""/64, 0x40}, {&(0x7f0000000a40)=""/180, 0xb4}, {&(0x7f0000000b00)=""/13, 0xd}], 0x5, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90}}, {{&(0x7f0000000c80)=@abs, 0x6e, &(0x7f0000000dc0)=[{&(0x7f0000000d00)=""/161, 0xa1}], 0x1, &(0x7f0000000e00)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f0000000e80), 0x6e, &(0x7f00000022c0)=[{&(0x7f0000000f00)=""/117, 0x75}, {&(0x7f0000000f80)=""/4096, 0x1000}, {&(0x7f0000001f80)=""/212, 0xd4}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000002080)=""/184, 0xb8}, {&(0x7f0000002140)=""/74, 0x4a}, {&(0x7f00000021c0)=""/245, 0xf5}], 0x7, &(0x7f0000002340)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}}, {{&(0x7f0000002400)=@abs, 0x6e, &(0x7f0000004800)=[{&(0x7f0000002480)=""/122, 0x7a}, {&(0x7f0000003580)=""/85, 0x55}, {&(0x7f0000003600)=""/14, 0xe}, {&(0x7f0000003640)=""/4096, 0x1000}, {&(0x7f0000004640)=""/217, 0xd9}, {&(0x7f0000004740)=""/186, 0xba}], 0x6, &(0x7f0000004880)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}}, {{0x0, 0x0, &(0x7f0000005ac0)=[{&(0x7f00000048c0)=""/119, 0x77}, {&(0x7f0000004940)=""/4096, 0x1000}, {&(0x7f0000005940)=""/57, 0x39}, {&(0x7f0000005980)=""/169, 0xa9}, {&(0x7f0000005a40)=""/92, 0x5c}], 0x5}}, {{&(0x7f0000005b40)=@abs, 0x6e, &(0x7f0000006080)=[{&(0x7f0000005bc0)=""/123, 0x7b}, {&(0x7f0000005c40)=""/36, 0x24}, {&(0x7f0000005c80)=""/144, 0x90}, {&(0x7f0000005d40)=""/25, 0x19}, {&(0x7f0000005d80)=""/128, 0x80}, {&(0x7f0000005e00)=""/188, 0xbc}, {&(0x7f0000005ec0)=""/93, 0x5d}, {&(0x7f0000005f40)=""/58, 0x3a}, {&(0x7f0000005f80)=""/244, 0xf4}], 0x9, &(0x7f0000006140)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}}], 0x7, 0x2000, &(0x7f0000006380)={0x0, 0x3938700}) bpf$PROG_LOAD(0x5, &(0x7f0000006400)={0x12, 0xa, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2eba167a, 0x0, 0x0, 0x0, 0x100}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @generic={0x81, 0x2, 0x4, 0x8000}]}, &(0x7f0000000280)='GPL\x00', 0x9, 0x7a, &(0x7f00000002c0)=""/122, 0x41000, 0x10, '\x00', r4, 0xf, r0, 0x8, &(0x7f0000000400)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x0, 0xb, 0x8, 0x80}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f00000063c0)}, 0x80) openat2(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x2800, 0x4}, 0x18) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x400000, 0x0) openat$cgroup_ro(r6, 0x0, 0x7a05, 0x1700) ioctl$FITHAW(0xffffffffffffffff, 0xc0045878) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x24881d) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:43 executing program 0: r0 = gettid() tkill(r0, 0xb) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000002c0)={{0x1, 0xffffffffffffffff, 0x0, 0x0, 0xee00, 0x0, 0xb3cf}, 0x0, 0x0, 0x7, 0x0, 0x1, 0x53b0, 0x2, 0x7fff, 0x8, 0xea, r0, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x20}, 0x20}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newqdisc={0x44, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0x14, 0x2, [@TCA_DSMARK_DEFAULT_INDEX={0x6}, @TCA_DSMARK_INDICES={0x6, 0x1, 0x8}]}}]}, 0x44}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) sendmsg$nl_route(r5, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0xc4}, 0x1, 0x0, 0x0, 0x20000000}, 0x14810) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:43 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r2, &(0x7f0000004200)='t', 0xfff4) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x4, 0x7, 0x4e, 0xc, 0x0, 0xe64, 0x800, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x1000, 0x9, 0x53, 0x1, 0xa4, 0x80000000, 0xfbff, 0x0, 0x3, 0x0, 0x1000}, 0xffffffffffffffff, 0xc, r2, 0x8) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r2, &(0x7f0000004200)='t', 0xfff4) (async) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x4, 0x7, 0x4e, 0xc, 0x0, 0xe64, 0x800, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x1000, 0x9, 0x53, 0x1, 0xa4, 0x80000000, 0xfbff, 0x0, 0x3, 0x0, 0x1000}, 0xffffffffffffffff, 0xc, r2, 0x8) (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) (async) [ 369.008554][T26973] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 369.081628][ T3976] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:48:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x24881e) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:43 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) r0 = perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r3}, 0x10) (async) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async, rerun: 32) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r2, 0x89f9, &(0x7f00000003c0)={'sit0\x00', &(0x7f0000000340)={'ip6tnl0\x00', 0x0, 0x2f, 0x40, 0xf9, 0x1, 0x8, @ipv4={'\x00', '\xff\xff', @remote}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7800, 0x7, 0x5, 0x9}}) (async, rerun: 32) recvmmsg$unix(r2, &(0x7f00000061c0)=[{{&(0x7f00000004c0)=@abs, 0x6e, &(0x7f0000000840)=[{&(0x7f0000000540)=""/44, 0x2c}, {&(0x7f0000000580)=""/201, 0xc9}, {&(0x7f0000000680)=""/9, 0x9}, {&(0x7f00000006c0)=""/204, 0xcc}, {&(0x7f00000007c0)=""/121, 0x79}], 0x5}}, {{&(0x7f00000008c0)=@abs, 0x6e, &(0x7f0000000b40)=[{&(0x7f0000000940)=""/21, 0x15}, {&(0x7f0000000980)=""/128, 0x80}, {&(0x7f0000000a00)=""/64, 0x40}, {&(0x7f0000000a40)=""/180, 0xb4}, {&(0x7f0000000b00)=""/13, 0xd}], 0x5, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90}}, {{&(0x7f0000000c80)=@abs, 0x6e, &(0x7f0000000dc0)=[{&(0x7f0000000d00)=""/161, 0xa1}], 0x1, &(0x7f0000000e00)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f0000000e80), 0x6e, &(0x7f00000022c0)=[{&(0x7f0000000f00)=""/117, 0x75}, {&(0x7f0000000f80)=""/4096, 0x1000}, {&(0x7f0000001f80)=""/212, 0xd4}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000002080)=""/184, 0xb8}, {&(0x7f0000002140)=""/74, 0x4a}, {&(0x7f00000021c0)=""/245, 0xf5}], 0x7, &(0x7f0000002340)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}}, {{&(0x7f0000002400)=@abs, 0x6e, &(0x7f0000004800)=[{&(0x7f0000002480)=""/122, 0x7a}, {&(0x7f0000003580)=""/85, 0x55}, {&(0x7f0000003600)=""/14, 0xe}, {&(0x7f0000003640)=""/4096, 0x1000}, {&(0x7f0000004640)=""/217, 0xd9}, {&(0x7f0000004740)=""/186, 0xba}], 0x6, &(0x7f0000004880)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}}, {{0x0, 0x0, &(0x7f0000005ac0)=[{&(0x7f00000048c0)=""/119, 0x77}, {&(0x7f0000004940)=""/4096, 0x1000}, {&(0x7f0000005940)=""/57, 0x39}, {&(0x7f0000005980)=""/169, 0xa9}, {&(0x7f0000005a40)=""/92, 0x5c}], 0x5}}, {{&(0x7f0000005b40)=@abs, 0x6e, &(0x7f0000006080)=[{&(0x7f0000005bc0)=""/123, 0x7b}, {&(0x7f0000005c40)=""/36, 0x24}, {&(0x7f0000005c80)=""/144, 0x90}, {&(0x7f0000005d40)=""/25, 0x19}, {&(0x7f0000005d80)=""/128, 0x80}, {&(0x7f0000005e00)=""/188, 0xbc}, {&(0x7f0000005ec0)=""/93, 0x5d}, {&(0x7f0000005f40)=""/58, 0x3a}, {&(0x7f0000005f80)=""/244, 0xf4}], 0x9, &(0x7f0000006140)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}}], 0x7, 0x2000, &(0x7f0000006380)={0x0, 0x3938700}) bpf$PROG_LOAD(0x5, &(0x7f0000006400)={0x12, 0xa, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2eba167a, 0x0, 0x0, 0x0, 0x100}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @generic={0x81, 0x2, 0x4, 0x8000}]}, &(0x7f0000000280)='GPL\x00', 0x9, 0x7a, &(0x7f00000002c0)=""/122, 0x41000, 0x10, '\x00', r4, 0xf, r0, 0x8, &(0x7f0000000400)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x0, 0xb, 0x8, 0x80}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f00000063c0)}, 0x80) (async, rerun: 64) openat2(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x2800, 0x4}, 0x18) (rerun: 64) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x400000, 0x0) openat$cgroup_ro(r6, 0x0, 0x7a05, 0x1700) (async) ioctl$FITHAW(0xffffffffffffffff, 0xc0045878) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:43 executing program 0: r0 = gettid() tkill(r0, 0xb) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000002c0)={{0x1, 0xffffffffffffffff, 0x0, 0x0, 0xee00, 0x0, 0xb3cf}, 0x0, 0x0, 0x7, 0x0, 0x1, 0x53b0, 0x2, 0x7fff, 0x8, 0xea, r0, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x20}, 0x20}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newqdisc={0x44, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0x14, 0x2, [@TCA_DSMARK_DEFAULT_INDEX={0x6}, @TCA_DSMARK_INDICES={0x6, 0x1, 0x8}]}}]}, 0x44}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) sendmsg$nl_route(r5, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0xc4}, 0x1, 0x0, 0x0, 0x20000000}, 0x14810) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) gettid() (async) tkill(r0, 0xb) (async) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000002c0)={{0x1, 0xffffffffffffffff, 0x0, 0x0, 0xee00, 0x0, 0xb3cf}, 0x0, 0x0, 0x7, 0x0, 0x1, 0x53b0, 0x2, 0x7fff, 0x8, 0xea, r0, 0xffffffffffffffff}) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x10, 0x803, 0x0) (async) socket(0x10, 0x3, 0x0) (async) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x20}, 0x20}}, 0x0) (async) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) (async) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newqdisc={0x44, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0x14, 0x2, [@TCA_DSMARK_DEFAULT_INDEX={0x6}, @TCA_DSMARK_INDICES={0x6, 0x1, 0x8}]}}]}, 0x44}}, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) (async) sendmsg$nl_route(r5, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0xc4}, 0x1, 0x0, 0x0, 0x20000000}, 0x14810) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 01:48:43 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) r0 = gettid() (async) r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r2, &(0x7f0000004200)='t', 0xfff4) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x4, 0x7, 0x4e, 0xc, 0x0, 0xe64, 0x800, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x1000, 0x9, 0x53, 0x1, 0xa4, 0x80000000, 0xfbff, 0x0, 0x3, 0x0, 0x1000}, 0xffffffffffffffff, 0xc, r2, 0x8) (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async, rerun: 64) ptrace$setopts(0x4206, r0, 0x0, 0x0) (rerun: 64) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) [ 369.331807][T27088] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 369.523019][T27158] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 01:48:44 executing program 3: rt_sigprocmask(0x1, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) clone(0x200000, &(0x7f0000000140)="7015350c6d1e11d654785d55cfcdab9a2f3ee2b09f2803be220d0f84dbbc19bb510e2be4b5c8435fdbdd04795e26a62107ae63812e784c089bb06701d3d21ec42314f2996c600a1ffb1fd8147992ba2aa0e8c77cd31c56eac2b097e0b236f2135b34f2fd848e47720a3e6794b0fdee0a00aa4f729acee5f150b3a13c", &(0x7f00000000c0), &(0x7f0000000600), &(0x7f0000000640)="380203fc2111943a737f5edcb958bf1ee1f7789c9ddd4badf53397e9fda1") r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000680), 0x100, 0x0) epoll_pwait2(r3, &(0x7f00000006c0)=[{}, {}, {}, {}], 0x4, &(0x7f0000000800), &(0x7f0000000840)={[0x40]}, 0x8) write(r2, &(0x7f0000004200)='t', 0xfff4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@remote, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f00000001c0)=0xe8) sendmsg$nl_netfilter(r2, &(0x7f00000005c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000580)={&(0x7f0000000200)={0x36c, 0xf, 0x6, 0x201, 0x70bd27, 0x25dfdbfe, {0x1, 0x0, 0x4}, [@generic="79f102184a432c7f1b9139f852a372f1c5226853c49d973fa7ee6321342ffc504821f16d296b43c468f0dae74ab140e0b5911babf44f694224268a3e95d841d76e5de8224d36", @generic="b4eff63cd200d33277df803e4ceebff24d445e08329e75927d6b3cc78e2dd1661897822f9e9049b8cfdc83b598b7ebd0e4e480ff0f34506563bc1159560cfd3b570f2460a71bd0ed63fc1027b83c9d301d854fc79c19f67231458b89ab21ac1bac5ae0be01e5f102f48f3513d83b93088722b91e5dfb5d570ec84b1f31151b01c7b821e8fe534035fafc3eb5a9159f0c9a9a31907deecec02589b928f3623b3795eb7b18b4d9e15f925f4bb5ce37d64fe0fcdd6709e058c76552a9", @typed={0x8, 0x90, 0x0, 0x0, @uid=r4}, @typed={0x14, 0x83, 0x0, 0x0, @ipv6=@private0={0xfc, 0x0, '\x00', 0x1}}, @nested={0xfb, 0x8e, 0x0, 0x1, [@generic="2e12ded044b5fa3016c82cafd9f4f65709b1ad711161bdb401c89a3c62e71b6540ea5e85f103b4ce5d2ae7aeb0447bd26643a9343cb0cdd7c91f3a7f063c59a02d09a8f930c70e29598679d8f792d4a521b5525880ddf09545f35ba3c3801e453110c7239633b92353bc371c363e91765d87a5e7277044e81a1c1ea7301a39a7ad5dd70777bac55121b995557932360f265f9cad417c03b042b3415da1df32bcbe92322910b4744662056d3e02de0f43f49725a73be6c21c796fcf3cba27cc3d086955c0968f154396151b73d1869d564f31ef3e4525803eabf71736a532ede423940bc40d9d295f7da3e1d26e2d2d722cd8ed416d387d"]}, @nested={0x57, 0x3d, 0x0, 0x1, [@generic="f655972a3214f1eead64aff41c5957c246cd45734248484012ed48fa7ca272947ab481529908422bc60950943c3aa7a6e370dd39a0ee509e8b2bc583a7235ec6575bc22733615fa6907bee796fe1165718ea5c"]}, @generic="881178228884d05f5d2fe133b24ef107de2677cf865aa0016f81b2818d9e35cdc1c015edd05eb703f3fa81d207ef8b159b39b7e1ad3c6a34cc1fa72eb6d1ac895797b642308a113d8c2b697f51727b272ff958d889a55a553ffef283b189ea5dbfce44da89279bca1cd6f4b403d7c4dce0ea9a03c6accf5fdb3574ab301c3b8aa88555a2712538426335e8c09723d040637e611163cbea96565252e0de186859a8452605ba4cd4cd8432142243fe4f6f667737fdfe2a6aa6a0c894246eb4524d4f2b6f9dabc12e2e4d2afc78c407f75cb35d874f39dbe8757e5409bd9dbd587744465f1eb46fc3"]}, 0x36c}, 0x1, 0x0, 0x0, 0x491}, 0x8040) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) 01:48:44 executing program 0: r0 = gettid() tkill(r0, 0xb) (async) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000002c0)={{0x1, 0xffffffffffffffff, 0x0, 0x0, 0xee00, 0x0, 0xb3cf}, 0x0, 0x0, 0x7, 0x0, 0x1, 0x53b0, 0x2, 0x7fff, 0x8, 0xea, r0, 0xffffffffffffffff}) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = socket$nl_route(0x10, 0x3, 0x0) (async) r2 = socket(0x10, 0x803, 0x0) (async) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x20}, 0x20}}, 0x0) (async) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newqdisc={0x44, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0x14, 0x2, [@TCA_DSMARK_DEFAULT_INDEX={0x6}, @TCA_DSMARK_INDICES={0x6, 0x1, 0x8}]}}]}, 0x44}}, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) (async) sendmsg$nl_route(r5, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0xc4}, 0x1, 0x0, 0x0, 0x20000000}, 0x14810) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248849) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:44 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r3}, 0x10) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r2, 0x89f9, &(0x7f00000003c0)={'sit0\x00', &(0x7f0000000340)={'ip6tnl0\x00', 0x0, 0x2f, 0x40, 0xf9, 0x1, 0x8, @ipv4={'\x00', '\xff\xff', @remote}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7800, 0x7, 0x5, 0x9}}) recvmmsg$unix(r2, &(0x7f00000061c0)=[{{&(0x7f00000004c0)=@abs, 0x6e, &(0x7f0000000840)=[{&(0x7f0000000540)=""/44, 0x2c}, {&(0x7f0000000580)=""/201, 0xc9}, {&(0x7f0000000680)=""/9, 0x9}, {&(0x7f00000006c0)=""/204, 0xcc}, {&(0x7f00000007c0)=""/121, 0x79}], 0x5}}, {{&(0x7f00000008c0)=@abs, 0x6e, &(0x7f0000000b40)=[{&(0x7f0000000940)=""/21, 0x15}, {&(0x7f0000000980)=""/128, 0x80}, {&(0x7f0000000a00)=""/64, 0x40}, {&(0x7f0000000a40)=""/180, 0xb4}, {&(0x7f0000000b00)=""/13, 0xd}], 0x5, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90}}, {{&(0x7f0000000c80)=@abs, 0x6e, &(0x7f0000000dc0)=[{&(0x7f0000000d00)=""/161, 0xa1}], 0x1, &(0x7f0000000e00)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f0000000e80), 0x6e, &(0x7f00000022c0)=[{&(0x7f0000000f00)=""/117, 0x75}, {&(0x7f0000000f80)=""/4096, 0x1000}, {&(0x7f0000001f80)=""/212, 0xd4}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000002080)=""/184, 0xb8}, {&(0x7f0000002140)=""/74, 0x4a}, {&(0x7f00000021c0)=""/245, 0xf5}], 0x7, &(0x7f0000002340)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}}, {{&(0x7f0000002400)=@abs, 0x6e, &(0x7f0000004800)=[{&(0x7f0000002480)=""/122, 0x7a}, {&(0x7f0000003580)=""/85, 0x55}, {&(0x7f0000003600)=""/14, 0xe}, {&(0x7f0000003640)=""/4096, 0x1000}, {&(0x7f0000004640)=""/217, 0xd9}, {&(0x7f0000004740)=""/186, 0xba}], 0x6, &(0x7f0000004880)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}}, {{0x0, 0x0, &(0x7f0000005ac0)=[{&(0x7f00000048c0)=""/119, 0x77}, {&(0x7f0000004940)=""/4096, 0x1000}, {&(0x7f0000005940)=""/57, 0x39}, {&(0x7f0000005980)=""/169, 0xa9}, {&(0x7f0000005a40)=""/92, 0x5c}], 0x5}}, {{&(0x7f0000005b40)=@abs, 0x6e, &(0x7f0000006080)=[{&(0x7f0000005bc0)=""/123, 0x7b}, {&(0x7f0000005c40)=""/36, 0x24}, {&(0x7f0000005c80)=""/144, 0x90}, {&(0x7f0000005d40)=""/25, 0x19}, {&(0x7f0000005d80)=""/128, 0x80}, {&(0x7f0000005e00)=""/188, 0xbc}, {&(0x7f0000005ec0)=""/93, 0x5d}, {&(0x7f0000005f40)=""/58, 0x3a}, {&(0x7f0000005f80)=""/244, 0xf4}], 0x9, &(0x7f0000006140)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}}], 0x7, 0x2000, &(0x7f0000006380)={0x0, 0x3938700}) bpf$PROG_LOAD(0x5, &(0x7f0000006400)={0x12, 0xa, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2eba167a, 0x0, 0x0, 0x0, 0x100}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @generic={0x81, 0x2, 0x4, 0x8000}]}, &(0x7f0000000280)='GPL\x00', 0x9, 0x7a, &(0x7f00000002c0)=""/122, 0x41000, 0x10, '\x00', r4, 0xf, r0, 0x8, &(0x7f0000000400)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x0, 0xb, 0x8, 0x80}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f00000063c0)}, 0x80) openat2(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x2800, 0x4}, 0x18) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x400000, 0x0) openat$cgroup_ro(r6, 0x0, 0x7a05, 0x1700) ioctl$FITHAW(0xffffffffffffffff, 0xc0045878) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r3}, 0x10) (async) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r2, 0x89f9, &(0x7f00000003c0)={'sit0\x00', &(0x7f0000000340)={'ip6tnl0\x00', 0x0, 0x2f, 0x40, 0xf9, 0x1, 0x8, @ipv4={'\x00', '\xff\xff', @remote}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7800, 0x7, 0x5, 0x9}}) (async) recvmmsg$unix(r2, &(0x7f00000061c0)=[{{&(0x7f00000004c0)=@abs, 0x6e, &(0x7f0000000840)=[{&(0x7f0000000540)=""/44, 0x2c}, {&(0x7f0000000580)=""/201, 0xc9}, {&(0x7f0000000680)=""/9, 0x9}, {&(0x7f00000006c0)=""/204, 0xcc}, {&(0x7f00000007c0)=""/121, 0x79}], 0x5}}, {{&(0x7f00000008c0)=@abs, 0x6e, &(0x7f0000000b40)=[{&(0x7f0000000940)=""/21, 0x15}, {&(0x7f0000000980)=""/128, 0x80}, {&(0x7f0000000a00)=""/64, 0x40}, {&(0x7f0000000a40)=""/180, 0xb4}, {&(0x7f0000000b00)=""/13, 0xd}], 0x5, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90}}, {{&(0x7f0000000c80)=@abs, 0x6e, &(0x7f0000000dc0)=[{&(0x7f0000000d00)=""/161, 0xa1}], 0x1, &(0x7f0000000e00)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f0000000e80), 0x6e, &(0x7f00000022c0)=[{&(0x7f0000000f00)=""/117, 0x75}, {&(0x7f0000000f80)=""/4096, 0x1000}, {&(0x7f0000001f80)=""/212, 0xd4}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000002080)=""/184, 0xb8}, {&(0x7f0000002140)=""/74, 0x4a}, {&(0x7f00000021c0)=""/245, 0xf5}], 0x7, &(0x7f0000002340)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}}, {{&(0x7f0000002400)=@abs, 0x6e, &(0x7f0000004800)=[{&(0x7f0000002480)=""/122, 0x7a}, {&(0x7f0000003580)=""/85, 0x55}, {&(0x7f0000003600)=""/14, 0xe}, {&(0x7f0000003640)=""/4096, 0x1000}, {&(0x7f0000004640)=""/217, 0xd9}, {&(0x7f0000004740)=""/186, 0xba}], 0x6, &(0x7f0000004880)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}}, {{0x0, 0x0, &(0x7f0000005ac0)=[{&(0x7f00000048c0)=""/119, 0x77}, {&(0x7f0000004940)=""/4096, 0x1000}, {&(0x7f0000005940)=""/57, 0x39}, {&(0x7f0000005980)=""/169, 0xa9}, {&(0x7f0000005a40)=""/92, 0x5c}], 0x5}}, {{&(0x7f0000005b40)=@abs, 0x6e, &(0x7f0000006080)=[{&(0x7f0000005bc0)=""/123, 0x7b}, {&(0x7f0000005c40)=""/36, 0x24}, {&(0x7f0000005c80)=""/144, 0x90}, {&(0x7f0000005d40)=""/25, 0x19}, {&(0x7f0000005d80)=""/128, 0x80}, {&(0x7f0000005e00)=""/188, 0xbc}, {&(0x7f0000005ec0)=""/93, 0x5d}, {&(0x7f0000005f40)=""/58, 0x3a}, {&(0x7f0000005f80)=""/244, 0xf4}], 0x9, &(0x7f0000006140)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}}], 0x7, 0x2000, &(0x7f0000006380)={0x0, 0x3938700}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000006400)={0x12, 0xa, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2eba167a, 0x0, 0x0, 0x0, 0x100}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @generic={0x81, 0x2, 0x4, 0x8000}]}, &(0x7f0000000280)='GPL\x00', 0x9, 0x7a, &(0x7f00000002c0)=""/122, 0x41000, 0x10, '\x00', r4, 0xf, r0, 0x8, &(0x7f0000000400)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x0, 0xb, 0x8, 0x80}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f00000063c0)}, 0x80) (async) openat2(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x2800, 0x4}, 0x18) (async) openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x400000, 0x0) (async) openat$cgroup_ro(r6, 0x0, 0x7a05, 0x1700) (async) ioctl$FITHAW(0xffffffffffffffff, 0xc0045878) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 01:48:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248877) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:44 executing program 3: rt_sigprocmask(0x1, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) clone(0x200000, &(0x7f0000000140)="7015350c6d1e11d654785d55cfcdab9a2f3ee2b09f2803be220d0f84dbbc19bb510e2be4b5c8435fdbdd04795e26a62107ae63812e784c089bb06701d3d21ec42314f2996c600a1ffb1fd8147992ba2aa0e8c77cd31c56eac2b097e0b236f2135b34f2fd848e47720a3e6794b0fdee0a00aa4f729acee5f150b3a13c", &(0x7f00000000c0), &(0x7f0000000600), &(0x7f0000000640)="380203fc2111943a737f5edcb958bf1ee1f7789c9ddd4badf53397e9fda1") r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000680), 0x100, 0x0) epoll_pwait2(r3, &(0x7f00000006c0)=[{}, {}, {}, {}], 0x4, &(0x7f0000000800), &(0x7f0000000840)={[0x40]}, 0x8) write(r2, &(0x7f0000004200)='t', 0xfff4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@remote, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f00000001c0)=0xe8) sendmsg$nl_netfilter(r2, &(0x7f00000005c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000580)={&(0x7f0000000200)={0x36c, 0xf, 0x6, 0x201, 0x70bd27, 0x25dfdbfe, {0x1, 0x0, 0x4}, [@generic="79f102184a432c7f1b9139f852a372f1c5226853c49d973fa7ee6321342ffc504821f16d296b43c468f0dae74ab140e0b5911babf44f694224268a3e95d841d76e5de8224d36", @generic="b4eff63cd200d33277df803e4ceebff24d445e08329e75927d6b3cc78e2dd1661897822f9e9049b8cfdc83b598b7ebd0e4e480ff0f34506563bc1159560cfd3b570f2460a71bd0ed63fc1027b83c9d301d854fc79c19f67231458b89ab21ac1bac5ae0be01e5f102f48f3513d83b93088722b91e5dfb5d570ec84b1f31151b01c7b821e8fe534035fafc3eb5a9159f0c9a9a31907deecec02589b928f3623b3795eb7b18b4d9e15f925f4bb5ce37d64fe0fcdd6709e058c76552a9", @typed={0x8, 0x90, 0x0, 0x0, @uid=r4}, @typed={0x14, 0x83, 0x0, 0x0, @ipv6=@private0={0xfc, 0x0, '\x00', 0x1}}, @nested={0xfb, 0x8e, 0x0, 0x1, [@generic="2e12ded044b5fa3016c82cafd9f4f65709b1ad711161bdb401c89a3c62e71b6540ea5e85f103b4ce5d2ae7aeb0447bd26643a9343cb0cdd7c91f3a7f063c59a02d09a8f930c70e29598679d8f792d4a521b5525880ddf09545f35ba3c3801e453110c7239633b92353bc371c363e91765d87a5e7277044e81a1c1ea7301a39a7ad5dd70777bac55121b995557932360f265f9cad417c03b042b3415da1df32bcbe92322910b4744662056d3e02de0f43f49725a73be6c21c796fcf3cba27cc3d086955c0968f154396151b73d1869d564f31ef3e4525803eabf71736a532ede423940bc40d9d295f7da3e1d26e2d2d722cd8ed416d387d"]}, @nested={0x57, 0x3d, 0x0, 0x1, [@generic="f655972a3214f1eead64aff41c5957c246cd45734248484012ed48fa7ca272947ab481529908422bc60950943c3aa7a6e370dd39a0ee509e8b2bc583a7235ec6575bc22733615fa6907bee796fe1165718ea5c"]}, @generic="881178228884d05f5d2fe133b24ef107de2677cf865aa0016f81b2818d9e35cdc1c015edd05eb703f3fa81d207ef8b159b39b7e1ad3c6a34cc1fa72eb6d1ac895797b642308a113d8c2b697f51727b272ff958d889a55a553ffef283b189ea5dbfce44da89279bca1cd6f4b403d7c4dce0ea9a03c6accf5fdb3574ab301c3b8aa88555a2712538426335e8c09723d040637e611163cbea96565252e0de186859a8452605ba4cd4cd8432142243fe4f6f667737fdfe2a6aa6a0c894246eb4524d4f2b6f9dabc12e2e4d2afc78c407f75cb35d874f39dbe8757e5409bd9dbd587744465f1eb46fc3"]}, 0x36c}, 0x1, 0x0, 0x0, 0x491}, 0x8040) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) rt_sigprocmask(0x1, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) clone(0x200000, &(0x7f0000000140)="7015350c6d1e11d654785d55cfcdab9a2f3ee2b09f2803be220d0f84dbbc19bb510e2be4b5c8435fdbdd04795e26a62107ae63812e784c089bb06701d3d21ec42314f2996c600a1ffb1fd8147992ba2aa0e8c77cd31c56eac2b097e0b236f2135b34f2fd848e47720a3e6794b0fdee0a00aa4f729acee5f150b3a13c", &(0x7f00000000c0), &(0x7f0000000600), &(0x7f0000000640)="380203fc2111943a737f5edcb958bf1ee1f7789c9ddd4badf53397e9fda1") (async) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000680), 0x100, 0x0) (async) epoll_pwait2(r3, &(0x7f00000006c0)=[{}, {}, {}, {}], 0x4, &(0x7f0000000800), &(0x7f0000000840)={[0x40]}, 0x8) (async) write(r2, &(0x7f0000004200)='t', 0xfff4) (async) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@remote, @in=@private}}, {{@in6=@empty}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f00000001c0)=0xe8) (async) sendmsg$nl_netfilter(r2, &(0x7f00000005c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000580)={&(0x7f0000000200)={0x36c, 0xf, 0x6, 0x201, 0x70bd27, 0x25dfdbfe, {0x1, 0x0, 0x4}, [@generic="79f102184a432c7f1b9139f852a372f1c5226853c49d973fa7ee6321342ffc504821f16d296b43c468f0dae74ab140e0b5911babf44f694224268a3e95d841d76e5de8224d36", @generic="b4eff63cd200d33277df803e4ceebff24d445e08329e75927d6b3cc78e2dd1661897822f9e9049b8cfdc83b598b7ebd0e4e480ff0f34506563bc1159560cfd3b570f2460a71bd0ed63fc1027b83c9d301d854fc79c19f67231458b89ab21ac1bac5ae0be01e5f102f48f3513d83b93088722b91e5dfb5d570ec84b1f31151b01c7b821e8fe534035fafc3eb5a9159f0c9a9a31907deecec02589b928f3623b3795eb7b18b4d9e15f925f4bb5ce37d64fe0fcdd6709e058c76552a9", @typed={0x8, 0x90, 0x0, 0x0, @uid=r4}, @typed={0x14, 0x83, 0x0, 0x0, @ipv6=@private0={0xfc, 0x0, '\x00', 0x1}}, @nested={0xfb, 0x8e, 0x0, 0x1, [@generic="2e12ded044b5fa3016c82cafd9f4f65709b1ad711161bdb401c89a3c62e71b6540ea5e85f103b4ce5d2ae7aeb0447bd26643a9343cb0cdd7c91f3a7f063c59a02d09a8f930c70e29598679d8f792d4a521b5525880ddf09545f35ba3c3801e453110c7239633b92353bc371c363e91765d87a5e7277044e81a1c1ea7301a39a7ad5dd70777bac55121b995557932360f265f9cad417c03b042b3415da1df32bcbe92322910b4744662056d3e02de0f43f49725a73be6c21c796fcf3cba27cc3d086955c0968f154396151b73d1869d564f31ef3e4525803eabf71736a532ede423940bc40d9d295f7da3e1d26e2d2d722cd8ed416d387d"]}, @nested={0x57, 0x3d, 0x0, 0x1, [@generic="f655972a3214f1eead64aff41c5957c246cd45734248484012ed48fa7ca272947ab481529908422bc60950943c3aa7a6e370dd39a0ee509e8b2bc583a7235ec6575bc22733615fa6907bee796fe1165718ea5c"]}, @generic="881178228884d05f5d2fe133b24ef107de2677cf865aa0016f81b2818d9e35cdc1c015edd05eb703f3fa81d207ef8b159b39b7e1ad3c6a34cc1fa72eb6d1ac895797b642308a113d8c2b697f51727b272ff958d889a55a553ffef283b189ea5dbfce44da89279bca1cd6f4b403d7c4dce0ea9a03c6accf5fdb3574ab301c3b8aa88555a2712538426335e8c09723d040637e611163cbea96565252e0de186859a8452605ba4cd4cd8432142243fe4f6f667737fdfe2a6aa6a0c894246eb4524d4f2b6f9dabc12e2e4d2afc78c407f75cb35d874f39dbe8757e5409bd9dbd587744465f1eb46fc3"]}, 0x36c}, 0x1, 0x0, 0x0, 0x491}, 0x8040) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) (async) 01:48:44 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000200)=[@in6={0xa, 0x4e22, 0x5, @remote, 0x8}, @in6={0xa, 0x4e22, 0x3, @loopback, 0x2}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x28}}, @in6={0xa, 0x4e22, 0x6170909d, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x4, @mcast2, 0x2}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f00000001c0)={0x3, 0xfffffe01, 0x6, 0x5, 0x3f}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r4, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0x5}}, './file0\x00'}) ioctl$sock_inet6_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000100)) 01:48:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248878) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:44 executing program 3: rt_sigprocmask(0x1, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) clone(0x200000, &(0x7f0000000140)="7015350c6d1e11d654785d55cfcdab9a2f3ee2b09f2803be220d0f84dbbc19bb510e2be4b5c8435fdbdd04795e26a62107ae63812e784c089bb06701d3d21ec42314f2996c600a1ffb1fd8147992ba2aa0e8c77cd31c56eac2b097e0b236f2135b34f2fd848e47720a3e6794b0fdee0a00aa4f729acee5f150b3a13c", &(0x7f00000000c0), &(0x7f0000000600), &(0x7f0000000640)="380203fc2111943a737f5edcb958bf1ee1f7789c9ddd4badf53397e9fda1") r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000680), 0x100, 0x0) epoll_pwait2(r3, &(0x7f00000006c0)=[{}, {}, {}, {}], 0x4, &(0x7f0000000800), &(0x7f0000000840)={[0x40]}, 0x8) write(r2, &(0x7f0000004200)='t', 0xfff4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@remote, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f00000001c0)=0xe8) sendmsg$nl_netfilter(r2, &(0x7f00000005c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000580)={&(0x7f0000000200)={0x36c, 0xf, 0x6, 0x201, 0x70bd27, 0x25dfdbfe, {0x1, 0x0, 0x4}, [@generic="79f102184a432c7f1b9139f852a372f1c5226853c49d973fa7ee6321342ffc504821f16d296b43c468f0dae74ab140e0b5911babf44f694224268a3e95d841d76e5de8224d36", @generic="b4eff63cd200d33277df803e4ceebff24d445e08329e75927d6b3cc78e2dd1661897822f9e9049b8cfdc83b598b7ebd0e4e480ff0f34506563bc1159560cfd3b570f2460a71bd0ed63fc1027b83c9d301d854fc79c19f67231458b89ab21ac1bac5ae0be01e5f102f48f3513d83b93088722b91e5dfb5d570ec84b1f31151b01c7b821e8fe534035fafc3eb5a9159f0c9a9a31907deecec02589b928f3623b3795eb7b18b4d9e15f925f4bb5ce37d64fe0fcdd6709e058c76552a9", @typed={0x8, 0x90, 0x0, 0x0, @uid=r4}, @typed={0x14, 0x83, 0x0, 0x0, @ipv6=@private0={0xfc, 0x0, '\x00', 0x1}}, @nested={0xfb, 0x8e, 0x0, 0x1, [@generic="2e12ded044b5fa3016c82cafd9f4f65709b1ad711161bdb401c89a3c62e71b6540ea5e85f103b4ce5d2ae7aeb0447bd26643a9343cb0cdd7c91f3a7f063c59a02d09a8f930c70e29598679d8f792d4a521b5525880ddf09545f35ba3c3801e453110c7239633b92353bc371c363e91765d87a5e7277044e81a1c1ea7301a39a7ad5dd70777bac55121b995557932360f265f9cad417c03b042b3415da1df32bcbe92322910b4744662056d3e02de0f43f49725a73be6c21c796fcf3cba27cc3d086955c0968f154396151b73d1869d564f31ef3e4525803eabf71736a532ede423940bc40d9d295f7da3e1d26e2d2d722cd8ed416d387d"]}, @nested={0x57, 0x3d, 0x0, 0x1, [@generic="f655972a3214f1eead64aff41c5957c246cd45734248484012ed48fa7ca272947ab481529908422bc60950943c3aa7a6e370dd39a0ee509e8b2bc583a7235ec6575bc22733615fa6907bee796fe1165718ea5c"]}, @generic="881178228884d05f5d2fe133b24ef107de2677cf865aa0016f81b2818d9e35cdc1c015edd05eb703f3fa81d207ef8b159b39b7e1ad3c6a34cc1fa72eb6d1ac895797b642308a113d8c2b697f51727b272ff958d889a55a553ffef283b189ea5dbfce44da89279bca1cd6f4b403d7c4dce0ea9a03c6accf5fdb3574ab301c3b8aa88555a2712538426335e8c09723d040637e611163cbea96565252e0de186859a8452605ba4cd4cd8432142243fe4f6f667737fdfe2a6aa6a0c894246eb4524d4f2b6f9dabc12e2e4d2afc78c407f75cb35d874f39dbe8757e5409bd9dbd587744465f1eb46fc3"]}, 0x36c}, 0x1, 0x0, 0x0, 0x491}, 0x8040) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) rt_sigprocmask(0x1, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) clone(0x200000, &(0x7f0000000140)="7015350c6d1e11d654785d55cfcdab9a2f3ee2b09f2803be220d0f84dbbc19bb510e2be4b5c8435fdbdd04795e26a62107ae63812e784c089bb06701d3d21ec42314f2996c600a1ffb1fd8147992ba2aa0e8c77cd31c56eac2b097e0b236f2135b34f2fd848e47720a3e6794b0fdee0a00aa4f729acee5f150b3a13c", &(0x7f00000000c0), &(0x7f0000000600), &(0x7f0000000640)="380203fc2111943a737f5edcb958bf1ee1f7789c9ddd4badf53397e9fda1") (async) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000680), 0x100, 0x0) (async) epoll_pwait2(r3, &(0x7f00000006c0)=[{}, {}, {}, {}], 0x4, &(0x7f0000000800), &(0x7f0000000840)={[0x40]}, 0x8) (async) write(r2, &(0x7f0000004200)='t', 0xfff4) (async) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@remote, @in=@private}}, {{@in6=@empty}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f00000001c0)=0xe8) (async) sendmsg$nl_netfilter(r2, &(0x7f00000005c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000580)={&(0x7f0000000200)={0x36c, 0xf, 0x6, 0x201, 0x70bd27, 0x25dfdbfe, {0x1, 0x0, 0x4}, [@generic="79f102184a432c7f1b9139f852a372f1c5226853c49d973fa7ee6321342ffc504821f16d296b43c468f0dae74ab140e0b5911babf44f694224268a3e95d841d76e5de8224d36", @generic="b4eff63cd200d33277df803e4ceebff24d445e08329e75927d6b3cc78e2dd1661897822f9e9049b8cfdc83b598b7ebd0e4e480ff0f34506563bc1159560cfd3b570f2460a71bd0ed63fc1027b83c9d301d854fc79c19f67231458b89ab21ac1bac5ae0be01e5f102f48f3513d83b93088722b91e5dfb5d570ec84b1f31151b01c7b821e8fe534035fafc3eb5a9159f0c9a9a31907deecec02589b928f3623b3795eb7b18b4d9e15f925f4bb5ce37d64fe0fcdd6709e058c76552a9", @typed={0x8, 0x90, 0x0, 0x0, @uid=r4}, @typed={0x14, 0x83, 0x0, 0x0, @ipv6=@private0={0xfc, 0x0, '\x00', 0x1}}, @nested={0xfb, 0x8e, 0x0, 0x1, [@generic="2e12ded044b5fa3016c82cafd9f4f65709b1ad711161bdb401c89a3c62e71b6540ea5e85f103b4ce5d2ae7aeb0447bd26643a9343cb0cdd7c91f3a7f063c59a02d09a8f930c70e29598679d8f792d4a521b5525880ddf09545f35ba3c3801e453110c7239633b92353bc371c363e91765d87a5e7277044e81a1c1ea7301a39a7ad5dd70777bac55121b995557932360f265f9cad417c03b042b3415da1df32bcbe92322910b4744662056d3e02de0f43f49725a73be6c21c796fcf3cba27cc3d086955c0968f154396151b73d1869d564f31ef3e4525803eabf71736a532ede423940bc40d9d295f7da3e1d26e2d2d722cd8ed416d387d"]}, @nested={0x57, 0x3d, 0x0, 0x1, [@generic="f655972a3214f1eead64aff41c5957c246cd45734248484012ed48fa7ca272947ab481529908422bc60950943c3aa7a6e370dd39a0ee509e8b2bc583a7235ec6575bc22733615fa6907bee796fe1165718ea5c"]}, @generic="881178228884d05f5d2fe133b24ef107de2677cf865aa0016f81b2818d9e35cdc1c015edd05eb703f3fa81d207ef8b159b39b7e1ad3c6a34cc1fa72eb6d1ac895797b642308a113d8c2b697f51727b272ff958d889a55a553ffef283b189ea5dbfce44da89279bca1cd6f4b403d7c4dce0ea9a03c6accf5fdb3574ab301c3b8aa88555a2712538426335e8c09723d040637e611163cbea96565252e0de186859a8452605ba4cd4cd8432142243fe4f6f667737fdfe2a6aa6a0c894246eb4524d4f2b6f9dabc12e2e4d2afc78c407f75cb35d874f39dbe8757e5409bd9dbd587744465f1eb46fc3"]}, 0x36c}, 0x1, 0x0, 0x0, 0x491}, 0x8040) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) (async) [ 370.334841][T27447] loop5: detected capacity change from 0 to 16 01:48:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) [ 370.486858][ T25] audit: type=1800 audit(1640483325.095:156): pid=27397 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=1048604 res=0 errno=0 01:48:45 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000200)=[@in6={0xa, 0x4e22, 0x5, @remote, 0x8}, @in6={0xa, 0x4e22, 0x3, @loopback, 0x2}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x28}}, @in6={0xa, 0x4e22, 0x6170909d, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x4, @mcast2, 0x2}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f00000001c0)={0x3, 0xfffffe01, 0x6, 0x5, 0x3f}) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r4, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0x5}}, './file0\x00'}) ioctl$sock_inet6_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000100)) 01:48:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248879) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:45 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000080)={[0x56b3]}, 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0) wait4(r0, 0x0, 0x1, &(0x7f00000000c0)) tkill(r0, 0x36) 01:48:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0xff81, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x1, 0x6}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 370.745932][ T3976] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 370.816498][T27568] loop5: detected capacity change from 0 to 16 [ 370.883913][ T25] audit: type=1800 audit(1640483325.495:157): pid=27565 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=1048605 res=0 errno=0 01:48:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x24887a) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:45 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000200)=[@in6={0xa, 0x4e22, 0x5, @remote, 0x8}, @in6={0xa, 0x4e22, 0x3, @loopback, 0x2}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x28}}, @in6={0xa, 0x4e22, 0x6170909d, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x4, @mcast2, 0x2}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async, rerun: 64) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async, rerun: 64) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f00000001c0)={0x3, 0xfffffe01, 0x6, 0x5, 0x3f}) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r4, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0x5}}, './file0\x00'}) ioctl$sock_inet6_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000100)) 01:48:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0xff81, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x1, 0x6}, 0x8) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:45 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) r0 = gettid() rt_sigtimedwait(&(0x7f0000000080)={[0x56b3]}, 0x0, 0x0, 0x8) (async, rerun: 32) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async, rerun: 32) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0) (async) wait4(r0, 0x0, 0x1, &(0x7f00000000c0)) tkill(r0, 0x36) [ 371.124962][ T3976] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:48:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x24887b) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 371.192123][T27680] loop5: detected capacity change from 0 to 16 [ 371.271059][ T25] audit: type=1800 audit(1640483325.885:158): pid=27680 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=1048606 res=0 errno=0 01:48:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0xff81, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x1, 0x6}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0xff81, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x1, 0x6}, 0x8) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 01:48:46 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000080)={[0x56b3]}, 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0) wait4(r0, 0x0, 0x1, &(0x7f00000000c0)) (async) tkill(r0, 0x36) 01:48:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x24887c) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:46 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x8, 0x100060) rt_sigtimedwait(&(0x7f00000000c0)={[0x100]}, &(0x7f0000000100), &(0x7f0000000180)={0x0, 0x3938700}, 0x8) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) pread64(r1, &(0x7f0000000080)=""/3, 0x3, 0x800) wait4(r0, 0x0, 0x1, 0x0) 01:48:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)=0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x81, 0x78, 0x1, 0x7f, 0x0, 0x5, 0x2000, 0x9, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000280)}, 0x8001, 0x0, 0x0, 0x2, 0x3, 0x4, 0x8, 0x0, 0x6a99, 0x0, 0x40}, r0, 0x7, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = openat$incfs(r2, &(0x7f0000000040)='.log\x00', 0x200000, 0x10) openat2(r3, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x325600, 0x2, 0x3}, 0x18) 01:48:47 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x8, 0x100060) rt_sigtimedwait(&(0x7f00000000c0)={[0x100]}, &(0x7f0000000100), &(0x7f0000000180)={0x0, 0x3938700}, 0x8) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) pread64(r1, &(0x7f0000000080)=""/3, 0x3, 0x800) wait4(r0, 0x0, 0x1, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0x8, 0x100060) (async) rt_sigtimedwait(&(0x7f00000000c0)={[0x100]}, &(0x7f0000000100), &(0x7f0000000180)={0x0, 0x3938700}, 0x8) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) (async) pread64(r1, &(0x7f0000000080)=""/3, 0x3, 0x800) (async) wait4(r0, 0x0, 0x1, 0x0) (async) 01:48:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x24887d) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async, rerun: 32) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)=0x0) (rerun: 32) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x81, 0x78, 0x1, 0x7f, 0x0, 0x5, 0x2000, 0x9, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000280)}, 0x8001, 0x0, 0x0, 0x2, 0x3, 0x4, 0x8, 0x0, 0x6a99, 0x0, 0x40}, r0, 0x7, 0xffffffffffffffff, 0x8) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) r3 = openat$incfs(r2, &(0x7f0000000040)='.log\x00', 0x200000, 0x10) openat2(r3, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x325600, 0x2, 0x3}, 0x18) 01:48:47 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(r0, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r1, &(0x7f0000004200)='t', 0xfff4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x4080, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000000c0)={r4, 0x1, 0x29, 0x1}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000480)={r4, 0x9, 0x1}) r5 = openat$cgroup_ro(r3, &(0x7f00000001c0)='cpu.stat\x00', 0x7a05, 0x1700) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r6}, 0x10) write$cgroup_type(r5, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:47 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) r0 = gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x8, 0x100060) rt_sigtimedwait(&(0x7f00000000c0)={[0x100]}, &(0x7f0000000100), &(0x7f0000000180)={0x0, 0x3938700}, 0x8) (async) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) (async) pread64(r1, &(0x7f0000000080)=""/3, 0x3, 0x800) (async) wait4(r0, 0x0, 0x1, 0x0) [ 372.635341][T28074] loop5: detected capacity change from 0 to 16 01:48:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x24887e) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)=0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x81, 0x78, 0x1, 0x7f, 0x0, 0x5, 0x2000, 0x9, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000280)}, 0x8001, 0x0, 0x0, 0x2, 0x3, 0x4, 0x8, 0x0, 0x6a99, 0x0, 0x40}, r0, 0x7, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = openat$incfs(r2, &(0x7f0000000040)='.log\x00', 0x200000, 0x10) openat2(r3, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x325600, 0x2, 0x3}, 0x18) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) (async) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x81, 0x78, 0x1, 0x7f, 0x0, 0x5, 0x2000, 0x9, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000280)}, 0x8001, 0x0, 0x0, 0x2, 0x3, 0x4, 0x8, 0x0, 0x6a99, 0x0, 0x40}, r0, 0x7, 0xffffffffffffffff, 0x8) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) openat$incfs(r2, &(0x7f0000000040)='.log\x00', 0x200000, 0x10) (async) openat2(r3, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x325600, 0x2, 0x3}, 0x18) (async) 01:48:47 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(r0, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r1, &(0x7f0000004200)='t', 0xfff4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x4080, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000000c0)={r4, 0x1, 0x29, 0x1}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000480)={r4, 0x9, 0x1}) r5 = openat$cgroup_ro(r3, &(0x7f00000001c0)='cpu.stat\x00', 0x7a05, 0x1700) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r6}, 0x10) write$cgroup_type(r5, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r0, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r1, &(0x7f0000004200)='t', 0xfff4) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x4080, 0x0) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r3, &(0x7f0000004200)='t', 0xfff4) (async) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) (async) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000000c0)={r4, 0x1, 0x29, 0x1}) (async) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000480)={r4, 0x9, 0x1}) (async) openat$cgroup_ro(r3, &(0x7f00000001c0)='cpu.stat\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r6}, 0x10) (async) write$cgroup_type(r5, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 01:48:47 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = gettid() tkill(r1, 0xb) ptrace$cont(0x1f, r1, 0xd1, 0x40) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000140)={[0xffffffff]}, &(0x7f0000000180), &(0x7f0000000200)={0x77359400}, 0x8) r2 = gettid() tkill(r2, 0xb) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setregs(0xd, r0, 0x401, &(0x7f0000000080)="6c9f32603257464b75769d6135e61c63b550433172bcaadd2755e4902ad663de6ff5d8310f2d1fd0bf9033a3b335e3f71a334c5c9740370b35a81ab54369068859c165788553c6f5a48ad4f251dbc9107c3780873c6ff2c64ff03deb445d1e97e4075618195716bffa3b3d715ddb7305dbede4718ce666215b7f39260a5df9ea076b966a6897e7237de51325ece82ddd464f346d4d34232a69e4ca3532fb5f72") recvmmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)=[{{&(0x7f00000002c0), 0x6e, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0x70}, {&(0x7f00000003c0)=""/143, 0x8f}], 0x2, &(0x7f00000004c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd8}}], 0x1, 0x2100, &(0x7f0000000600)={0x0, 0x989680}) tkill(r3, 0x36) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) signalfd(r4, &(0x7f0000000280)={[0x2]}, 0x8) [ 373.003547][ T3976] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:48:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248883) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 373.094393][T28253] loop5: detected capacity change from 0 to 16 [ 373.210086][ T25] audit: type=1800 audit(1640483327.825:159): pid=28238 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=1048607 res=0 errno=0 01:48:48 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) r0 = gettid() r1 = gettid() tkill(r1, 0xb) (async) ptrace$cont(0x1f, r1, 0xd1, 0x40) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) (async) rt_sigtimedwait(&(0x7f0000000140)={[0xffffffff]}, &(0x7f0000000180), &(0x7f0000000200)={0x77359400}, 0x8) (async) r2 = gettid() tkill(r2, 0xb) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setregs(0xd, r0, 0x401, &(0x7f0000000080)="6c9f32603257464b75769d6135e61c63b550433172bcaadd2755e4902ad663de6ff5d8310f2d1fd0bf9033a3b335e3f71a334c5c9740370b35a81ab54369068859c165788553c6f5a48ad4f251dbc9107c3780873c6ff2c64ff03deb445d1e97e4075618195716bffa3b3d715ddb7305dbede4718ce666215b7f39260a5df9ea076b966a6897e7237de51325ece82ddd464f346d4d34232a69e4ca3532fb5f72") (async) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)=[{{&(0x7f00000002c0), 0x6e, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0x70}, {&(0x7f00000003c0)=""/143, 0x8f}], 0x2, &(0x7f00000004c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd8}}], 0x1, 0x2100, &(0x7f0000000600)={0x0, 0x989680}) tkill(r3, 0x36) (async, rerun: 64) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) (rerun: 64) signalfd(r4, &(0x7f0000000280)={[0x2]}, 0x8) 01:48:48 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(r0, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r1, &(0x7f0000004200)='t', 0xfff4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x4080, 0x0) (async) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) (async) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000000c0)={r4, 0x1, 0x29, 0x1}) (async) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000480)={r4, 0x9, 0x1}) (async, rerun: 64) r5 = openat$cgroup_ro(r3, &(0x7f00000001c0)='cpu.stat\x00', 0x7a05, 0x1700) (async, rerun: 64) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r6}, 0x10) (async, rerun: 32) write$cgroup_type(r5, &(0x7f0000000000), 0x248800) (async, rerun: 32) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x2488f1) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 373.740939][T28368] loop5: detected capacity change from 0 to 16 01:48:48 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = gettid() tkill(r1, 0xb) ptrace$cont(0x1f, r1, 0xd1, 0x40) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000140)={[0xffffffff]}, &(0x7f0000000180), &(0x7f0000000200)={0x77359400}, 0x8) r2 = gettid() tkill(r2, 0xb) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setregs(0xd, r0, 0x401, &(0x7f0000000080)="6c9f32603257464b75769d6135e61c63b550433172bcaadd2755e4902ad663de6ff5d8310f2d1fd0bf9033a3b335e3f71a334c5c9740370b35a81ab54369068859c165788553c6f5a48ad4f251dbc9107c3780873c6ff2c64ff03deb445d1e97e4075618195716bffa3b3d715ddb7305dbede4718ce666215b7f39260a5df9ea076b966a6897e7237de51325ece82ddd464f346d4d34232a69e4ca3532fb5f72") recvmmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)=[{{&(0x7f00000002c0), 0x6e, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0x70}, {&(0x7f00000003c0)=""/143, 0x8f}], 0x2, &(0x7f00000004c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd8}}], 0x1, 0x2100, &(0x7f0000000600)={0x0, 0x989680}) tkill(r3, 0x36) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) signalfd(r4, &(0x7f0000000280)={[0x2]}, 0x8) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) gettid() (async) tkill(r1, 0xb) (async) ptrace$cont(0x1f, r1, 0xd1, 0x40) (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) (async) rt_sigtimedwait(&(0x7f0000000140)={[0xffffffff]}, &(0x7f0000000180), &(0x7f0000000200)={0x77359400}, 0x8) (async) gettid() (async) tkill(r2, 0xb) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ptrace$setregs(0xd, r0, 0x401, &(0x7f0000000080)="6c9f32603257464b75769d6135e61c63b550433172bcaadd2755e4902ad663de6ff5d8310f2d1fd0bf9033a3b335e3f71a334c5c9740370b35a81ab54369068859c165788553c6f5a48ad4f251dbc9107c3780873c6ff2c64ff03deb445d1e97e4075618195716bffa3b3d715ddb7305dbede4718ce666215b7f39260a5df9ea076b966a6897e7237de51325ece82ddd464f346d4d34232a69e4ca3532fb5f72") (async) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)=[{{&(0x7f00000002c0), 0x6e, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0x70}, {&(0x7f00000003c0)=""/143, 0x8f}], 0x2, &(0x7f00000004c0)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd8}}], 0x1, 0x2100, &(0x7f0000000600)={0x0, 0x989680}) (async) tkill(r3, 0x36) (async) openat$vnet(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) (async) signalfd(r4, &(0x7f0000000280)={[0x2]}, 0x8) (async) 01:48:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x10, &(0x7f0000000040)={&(0x7f0000000240)=""/195, 0xc3, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x28, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x2488f2) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x10, &(0x7f0000000040)={&(0x7f0000000240)=""/195, 0xc3, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x28, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x10, &(0x7f0000000040)={&(0x7f0000000240)=""/195, 0xc3}}, 0x10) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x28, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 01:48:48 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:48 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) getpriority(0x0, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0xb) tkill(0x0, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) 01:48:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x20248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:48 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x10, &(0x7f0000000040)={&(0x7f0000000240)=""/195, 0xc3, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x28, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (rerun: 32) 01:48:49 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 01:48:49 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) getpriority(0x0, 0xffffffffffffffff) (async, rerun: 64) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (rerun: 64) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async, rerun: 32) ptrace$setopts(0x4206, r0, 0x0, 0x0) (rerun: 32) r1 = gettid() tkill(r1, 0xb) (async) tkill(0x0, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) 01:48:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000400)={0x54, 0x0, &(0x7f0000000340)=[@increfs={0x40046304, 0x1}, @transaction_sg={0x40486311, {0x3, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000040)={@fda={0x66646185, 0x5, 0x1, 0x12}, @ptr={0x70742a85, 0x0, &(0x7f0000000240)=""/172, 0xac, 0x2, 0x2f}, @fda={0x66646185, 0x6, 0x2, 0x32}}, &(0x7f0000000300)={0x0, 0x20, 0x48}}, 0x1000}], 0x0, 0x0, &(0x7f00000003c0)}) r3 = syz_mount_image$f2fs(&(0x7f00000003c0), &(0x7f0000000440)='./file0\x00', 0x1f, 0x7, &(0x7f0000001800)=[{&(0x7f0000000480)="a2cab6b6c5adf06cd97a58", 0xb, 0x7}, {&(0x7f00000004c0)="f3fc9fcf437f5b5c40b58cbd6c0715e779d8b3c6d55160721d1d6c6b3e0f880d700e41f6f7481e1a453f8876a24c0827e0d8aa570b348e9db71facc7c71192f5b6e5465b0cf12d4bda6d89fd42468a86e5fc61465441c3ad3e78f6a76634a979c24fd3718df0438cc07cbe6c73258f78e2c40b71c146850583c37bdecfb6453ce0d8381412d90036eaf09e05d885a84f733547e75fe2475cf78aee8214b94a17a7f17bcf4ed3b7c7dd1d9b6f7e73f9292080284fa4aedf6b5e9427641cf35ee2215bb4588b43db4910ae9a7ca147a12aa486349412dcdc2bcf2aea1ecd76a3a060ee9aac17ca6739c1d57fbc08c4190afc380821a79094c3dc9f8bde", 0xfc, 0x3}, {&(0x7f00000005c0)="54a05de54e1f801666d3e9da8503986787d557c24ca8d9aa4eec60fca6d2e6defa5a350f889a450a34c58e4861c6facb59497b769304c6381098743738d06a732e91159588db1d647bc1148a011659e4e817ac35abdfe121", 0x58, 0x2}, {&(0x7f0000000640)="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", 0x1000, 0x8}, {&(0x7f0000001640)="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", 0xff, 0x9}, {&(0x7f0000001740)="7a28f4b3804226089dfe75b545112b6c7c75ab95cd18", 0x16, 0x8}, {&(0x7f0000001780)="f878bd0728850a8211903c8a63986e91ba56ccb4a7f76f20ba29f55c5da4eefe10514654ca9e77a252c0a88011a7e6fb1687e910a95514911ce19fdd314f3b30b0eb63c12f7f674e7707437698ff9a05b4777f9844af334f16535c9e8ef817acd5a770307fe2a00ac2114d6fb3", 0x6d, 0xb0f}], 0x104000, &(0x7f00000018c0)={[{@alloc_mode_reuse}, {@user_xattr}], [{@obj_user={'obj_user', 0x3d, '$'}}, {@obj_type}, {@obj_user={'obj_user', 0x3d, 'GPL\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) sendfile(r3, 0xffffffffffffffff, &(0x7f0000001940)=0x7, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) close(r0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000400)={0x54, 0x0, &(0x7f0000000340)=[@increfs={0x40046304, 0x1}, @transaction_sg={0x40486311, {0x3, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000040)={@fda={0x66646185, 0x5, 0x1, 0x12}, @ptr={0x70742a85, 0x0, &(0x7f0000000240)=""/172, 0xac, 0x2, 0x2f}, @fda={0x66646185, 0x6, 0x2, 0x32}}, &(0x7f0000000300)={0x0, 0x20, 0x48}}, 0x1000}], 0x0, 0x0, &(0x7f00000003c0)}) (async, rerun: 64) r3 = syz_mount_image$f2fs(&(0x7f00000003c0), &(0x7f0000000440)='./file0\x00', 0x1f, 0x7, &(0x7f0000001800)=[{&(0x7f0000000480)="a2cab6b6c5adf06cd97a58", 0xb, 0x7}, {&(0x7f00000004c0)="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", 0xfc, 0x3}, {&(0x7f00000005c0)="54a05de54e1f801666d3e9da8503986787d557c24ca8d9aa4eec60fca6d2e6defa5a350f889a450a34c58e4861c6facb59497b769304c6381098743738d06a732e91159588db1d647bc1148a011659e4e817ac35abdfe121", 0x58, 0x2}, {&(0x7f0000000640)="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", 0x1000, 0x8}, {&(0x7f0000001640)="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", 0xff, 0x9}, {&(0x7f0000001740)="7a28f4b3804226089dfe75b545112b6c7c75ab95cd18", 0x16, 0x8}, {&(0x7f0000001780)="f878bd0728850a8211903c8a63986e91ba56ccb4a7f76f20ba29f55c5da4eefe10514654ca9e77a252c0a88011a7e6fb1687e910a95514911ce19fdd314f3b30b0eb63c12f7f674e7707437698ff9a05b4777f9844af334f16535c9e8ef817acd5a770307fe2a00ac2114d6fb3", 0x6d, 0xb0f}], 0x104000, &(0x7f00000018c0)={[{@alloc_mode_reuse}, {@user_xattr}], [{@obj_user={'obj_user', 0x3d, '$'}}, {@obj_type}, {@obj_user={'obj_user', 0x3d, 'GPL\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) (rerun: 64) sendfile(r3, 0xffffffffffffffff, &(0x7f0000001940)=0x7, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:49 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) getpriority(0x0, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0xb) tkill(0x0, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) getpriority(0x0, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) gettid() (async) tkill(r1, 0xb) (async) tkill(0x0, 0x3) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) (async) 01:48:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0xfffffdef) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:50 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) r0 = gettid() tkill(r0, 0xb) r1 = gettid() tkill(r1, 0xb) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r2, 0x36) 01:48:50 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x48) write(r2, &(0x7f0000004200)='t', 0xfff4) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='blkio.throttle.io_serviced_recursive\x00', 0x7a05, 0x1700) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r4}, 0x10) write$cgroup_type(r3, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) fchown(0xffffffffffffffff, 0x0, 0xee00) r5 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r6 = openat(r5, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r6, &(0x7f0000004200)='t', 0xfff4) ioctl$HIDIOCSFEATURE(r6, 0xc0404806, &(0x7f0000000300)="b8ae95f2befa559b56d20e76e4db1f54142b204ffb7e68cf1948106bca15f049bdfddeaecb2b4837973ed1243f573ac984a66581ad9d774b356b0124c6e75c2c26663d80a026376d5becdc17c8a056a409b273cf6bd263c32748676347b138f7bc7105a90366e8f8a65a21e941c8b3ed209e1f495642aac4ad2f0d5a1445de689c78d56e71db01d9e0a012c7a8893f61b44f0a9a19") openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$SNDCTL_DSP_NONBLOCK(r0, 0x500e, 0x0) 01:48:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000400)={0x54, 0x0, &(0x7f0000000340)=[@increfs={0x40046304, 0x1}, @transaction_sg={0x40486311, {0x3, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000040)={@fda={0x66646185, 0x5, 0x1, 0x12}, @ptr={0x70742a85, 0x0, &(0x7f0000000240)=""/172, 0xac, 0x2, 0x2f}, @fda={0x66646185, 0x6, 0x2, 0x32}}, &(0x7f0000000300)={0x0, 0x20, 0x48}}, 0x1000}], 0x0, 0x0, &(0x7f00000003c0)}) r3 = syz_mount_image$f2fs(&(0x7f00000003c0), &(0x7f0000000440)='./file0\x00', 0x1f, 0x7, &(0x7f0000001800)=[{&(0x7f0000000480)="a2cab6b6c5adf06cd97a58", 0xb, 0x7}, {&(0x7f00000004c0)="f3fc9fcf437f5b5c40b58cbd6c0715e779d8b3c6d55160721d1d6c6b3e0f880d700e41f6f7481e1a453f8876a24c0827e0d8aa570b348e9db71facc7c71192f5b6e5465b0cf12d4bda6d89fd42468a86e5fc61465441c3ad3e78f6a76634a979c24fd3718df0438cc07cbe6c73258f78e2c40b71c146850583c37bdecfb6453ce0d8381412d90036eaf09e05d885a84f733547e75fe2475cf78aee8214b94a17a7f17bcf4ed3b7c7dd1d9b6f7e73f9292080284fa4aedf6b5e9427641cf35ee2215bb4588b43db4910ae9a7ca147a12aa486349412dcdc2bcf2aea1ecd76a3a060ee9aac17ca6739c1d57fbc08c4190afc380821a79094c3dc9f8bde", 0xfc, 0x3}, {&(0x7f00000005c0)="54a05de54e1f801666d3e9da8503986787d557c24ca8d9aa4eec60fca6d2e6defa5a350f889a450a34c58e4861c6facb59497b769304c6381098743738d06a732e91159588db1d647bc1148a011659e4e817ac35abdfe121", 0x58, 0x2}, {&(0x7f0000000640)="a5096fb5bd72fd3945c88fb0a7406f691ef9f2ac95a926e69f4fed99b79a1b86dfe29f3604bd1e4661a1c9894c9129fea2b941fabcb5ffbb8a6697c0433e8c204ce617ae1ab27cfb2e1227a161fae830e0d83576345b23dcda377068b1be36650f31e7672d69f4cd25d4654f007eced55c3a3808d6b2b385907cea11e14a3486a960edf0e908865770856e6b3ef270e676067a8e2a57c43735c79a52ce9c4d6afa79f80a9973daf5936d844830583056cc50c4497772ea8b7dd34a8d3dc7012e7c2ec04f9e4a75e630125dcedfdaba4b1761297eafd9b01abfe7ed58abbcf9291bf8a001f47b08b436651b3a3feeee9618639b6a90ee3889674f9f35117efeb5292868730876606c9f8d663b75d4218d497b5acf27da9069a484d818bd174fb060164111c7dae8af5d429bf5c09873c6ddeb162dd4bbdcca0d29b35b7e0276705aafab6e45972389b9cdac2146283aee66a028da5b592a73a39547d01b234abba26ec97803f5d7e1494e5cffe0948342d6d1776d6cb02c70acf58bab8be05706ea6f14383ec1a3518b6902926054807c6d0842354de19374d9853eb983e6e3ebb6c4da3255087560a7b33a937bef1c76b99e27d876f7070159af60e22b52b4e5af57949f93882185081f1bebb8e14d35c28e0a9d7b6e746005fd88006f3fc855f72f2c91b770af2fd6c7ac0662a7f5024ac28934c4d01b94934f2e38cef3d447eab8c080b8b06e4fef3b397aba1417663cfe7f2ac0b1500bbb8bee62e148bbff87a3b06a58c2209a9e6a12207984121a09a991b8a5cba121bff5b7d32d9102e7f56e00acb6afd94046cf3d3e5d955b5b59725be019247945e8df5b086a20abdff7d656e54d5992703c3246ee118a8d68b4951b5e2129db773037e7139afc1b622476077c2b8bf78e11757fd73cb5dffabf2c69d0ed3e7c2db8222946d1ed75cc6284b75de7caddc1870026a0b46b16c4c4eb3a0f8d78e54f97171bec52b2552ca8a10654416bc42cd6bfff6161f928101fe75f6a51460eb102f230fc36ec68f796b07ff4a501c6e5e57469c6f2df263e5b72bd56e87ca8e4f6701a7ba3b012f07b43cd22a79fc5ae0117985e90ff4aa097ae0238f3a33cec2339c87641bc429394fd4e1e753598801e185acd3c9c93d261b121604408dce0828bc2bddd72ad2d13aaab8634ad80d786db30f6c11c281b4a90d9919aef384090e5044ebd5b4a8484c1e664577a9018d24e1ad0dd8baef45b52a67ebfddc337f4144b0306603aee7ff6a6e2390ad939bacc2ca8ac0ec2f84d3ba4db37075504b7c5d1fed9b3253aa96b9aaf6811c835fa65446f6f0bdcdb6d8a5f13b6123d8057ced141c3fe27b9338e633e04655a2f9df317fc81d5f42bfd200e73056edb7022616a8a41b800127f331f9e2bf597991a04859151b669d500d8e5cdd53876a06a242eecadd6cbdc0235a5125f5ddc4f973104966abf27cc8fa21b4419afa01e5e62fac3b145e4f9f82c4e95c01429450b3e2580588ef105229f9aca8de9969e7da718c90d05f28b018e42d9d1f338b3a82f922565d274f8f09cde6f564f421327b413ffea966312d30b119141083e287bc960bf62d4c2878303eca616a7864ba4c1b0fc18988b35970cbdfe40e07861a20735c488187b449711ae4baeda2b982f719f5a3aaef5b7674de75a8b10489bd4f5032e93350f7eac054bb4d4e256b014566dae901aebd3b1c370ac6c488279b39dbde2cb5167dc4f4fec8468dfdd8b668507b2f99c3719a2049c3afefcfcede6a138a74020b2c03fe9040ddca8234fbb434b567ec683cc5ab735cc97b2fafea191c4e258c39b90c83d44338b44ac7467b31e5648bfebcf6d96f75dafdedc76dd5dc35cbdd95504e057969fdbcec52b383b3b5b6dc08688b5a29340cb53cf7b12e76e0ba933434dfebee42a5579d72f24c2aa35d677c3f03bbebf860e1cfe432ac013a4fe3436fbc1d54304357df56262443fa17ba5685684d22261dbaf27a464fe8eed98ac6bece7b96d01071dc0fbec65c5123736468eee4297e2f92eb1b2735f68617662c9404840de814ac351d981d943c18addb99340926aa22f65fa28fe2f264a393e0f4626584130892f80778dfea1c343063fe6d2f531258f41189758932db3c0bc95845446e0d4415401b4b3b79f125a655b5c2bd9986d1ea4de1eb400b3ba625ba2f156bacaecdfd43351cc72d388e1807dce1e2b7b4998e6734a677eb0a02c3debe9f07c09fccb8b4ffed848e80414bdecd538fff5c2957268e030bdcc8d12d79686609a6f687842f43aa041d31be174104683a3d1448832c86f60285815f5fd4452925702d935af3a5ca52584c4e9e32d2e270f6a04195ec300a088c598306daa8bf51e9cb04b714da54c7cc79cf28a386c7a29923ef53fd0682a7e8a2be5ac2e362bcdb2ed323c42d967875f52f7da749d4b59d2208a88eccda2e198a6954c653d972c38814ab5b19feaaf2b3fe3c574a653e35682100291227fc3c22adbbe4bd7f78141e000bad94709f8ed6862b674fdd23ba16be48af0d5aab7e6324769e40762778e6d4f7455f27422ae43d54d2f54b5c7663734624de6ef8a559fd9495ccc1e0bb0e4287572dacf6f31a93d63568ded8cb608f9c879359f11ef2825c77e2bbf3d0dd26bb8c223237b144b5496a3f03e9667071b734095cb64242cdf7c04d883c8d65d8835a630227f7fa1d4e0cdb1e88ab5b2b7112618ba6981419e3fe70d86beaf46d3de8afb3cdce43358b6f5602e885e68041bed608cba8770cf36d8362b5f54e7b8cd6ef42ad5b461a3a89c6af5ea53c10a307f6d997b2c5d862ed536738f5e089e80eb4f11e283144bfea3e910b98e1430725a159d799cc4ec4eb15c5fc0e55ea0d0fd7e8745d5fa60224c3a1a8e643b0fb26d4da7725964ca2cf6bc3db0bdeb2f366372aeed78701001fc249acd1abdd24a9d53229a6de882e49455acf6f7f067b5dadbe5904d98a5182f2ec24f313f25410dca6dfd22f266d2e7aad4ce60f85dfb7d2ced3e234a8e8024a90558aa2b7749d67724d63677a6f688faaa088247db4ec50d079eec05ac5c4b2204ff116f43fc7f0daed320abdebfc9bd2ef287813e070fff60a36e96ff8a151f0d7c8044b93bbebbb8086af70aef3c56fb9df1d7aaf8558ea160d569e5e07c5cdafda3dc19813ccf1d83eaa95ee7fb2fc2f7c38971448d25921d401541b45dfc45dd94776761808bd7d77ab381f68a9808ac6ada867d18a69165158e4e24bb2c85f2ffda9d703827fd1270bba68f597807cc7c9677518bd4d506c5513e3fca421610d048741b03065447940ebd753e9451d34e647383ea87024dda50adf78ae739037907f2f8d8599ea8ba2956f0f027b0032f31faff8916c25b6585a8dad0b9e6753945834dd127e3d3706ab37288862193c5faa0cc3c4a99d21a0bc4d64a3dc11140b7a92935b4975c3dc64e0828692db4e33ae5b5d74f7ce07c5d0f344db74ae5fa8049b73cae1050cc935e7db5d45c1a4fecfc7b5fe237cd54be8eaddf7aed63a50d4aeb8d21f2c58cb4e6eab80024b15a2c12bfb15f4f9d24bf8a2c99e3b977aa7b9b985d488e145ede5528c1e3baf5246755f15cbd68bb0ad3697757b82167156ef574dea46019d6e4c5275be78bd9d9b8a70c6563fdb173146442f94e625b8e86c6f7be244f01644c8013753dd274186fc85f6b14e8d75be00c605f4e4ee0e87ed7cd9888019f11c79e5f53eaa81e6119d7f077609e74a21b4ba32b0ab6143f3fe3674c31881cbf30b29f970e6aa361687be7bf80155b44816bb09623543b5197453e205ee506bb9df0582cf734b802a86d83051a45e4f4e3df7e37ebb95ff4097cf27f454d9fd2e230f7df2185abde577cc7e32aed349a5b148227ba2c0746c735d3f283b96d44fbb516a78a8370aa815c10f895c0dfcb3910310cbd0036219e2992cd60326f49037f54e9c8d540f8e882aa97bdebfcaa5e686a48ce603b3adda314ad15c6d2b214c2a6ce5256133ec0674b027f053682bbc5418335e42fb6f339e3db83e6e75ad2fb5f71bb4626e5ffcb541c51418f17a500dd0fbb1b66eb7fd049eb42eb628addd797f967fbb8ba6efcef7429ed162e60eb598bd9dca7f9ff8a101774720f3048aaa41b32d733abb6906e3b22374d6efd6f7ce1ad1e3bebd6847fed14c7aa6902f6aa45e8f7a2a0c41a30c623abc05669957a4065faadc0f5a045dda3c2000e4bd4cfa5e7efe990ef08050942a0b3257bbd00b1c597bff062a54defc6fd5e9e4ecd9d09484df202e794711e8b56d37909d10054689cc42754aa91c48ff1fda51941399b3a72e371065300e24a40aecd5837cc0b34aed0c1429fbf59a70eb89008dc1d3fa4e9af27375902f6e4e31a9140c1a220bbb6fb2089abf46cf54492ea68a57d41a8e63f5cc8b3eb422b200aa6e5ff95432a33f0a18098289cab66a06d6ccec1c1cab03fce41712c0654fef635f4552e4f1ace1127b0e3db93d543c4fbf387464117b3b65fa00bf0731525e624948aa4f37e8e66b972ae4f928b239c99ee10e4b9b42236aab336ef93d6eb238a766355f993c8df217791b2b8c7c2bc87f5c9e965e8845cc797e517a57c18651b59eeffda5bfc2e2873565536925f5fe3d71a540e1c69f8276c4a65cd042242df0aff64c15d849e894825b4cf039212716962fdf788219e6c95d8b0ac0a73e6e184977924559966ededf9d3452fea1291fd4f17ed91df8d283d0a83e947dba813a58b03d76bac30765d0a4b86af5127154657692ca42b617c7d99a4892cd410cbfb9ab23b42df07dd865b804b749a690d2539e95d196b2bd9242a2fe688a710ffd5d716902106ea1c71551e42cc27b00af79a2381a52e0dd18efce55a990bc580c0340b7c254769a99984e77359fc80b920f4fc5f39a5736685c6caa1d41a3a419acc20a0d41a0db67bfc22327f387601610d5cbdf54b834e1e6606dca5ddf01c734f55c2428f7d5b51a7fd8c188c48adc5fe0a32b18ea8e5b9e292776ee0cd5c5353fc022d5754cfaceb387995ae8c44d6b5444db8002462a378ecd77ac3e87c06e4a263f236e1940ddab5546f0a8231b5533d60133f2a55f5f30215e6e30f8d4efe01dc8450d0efcd8af94ae7a57af6e143944c255dae170bce28d7dc83cb31e746abd1c96853b6270f5e337b2a79290d3536edad25500e30863dcb8c2367c245f2451d0ce92c6e79e384d7f4403819dbf216bb7ad12e2275744c0225e6b8f1cb9abbde38a14f977d8369db9f2bf62d263e76b36365a3325d84c7129464a365b8b53727922946f3feae6275077588a70f5b8deb5013e84e27a8037630766e6a56905c778c06723431f9fadb1f6ad8e3a4b9906d75f9ef1d67411a12b1ffb0dc386af188c018481a9308751d9a0a7abb6d370cb024640208059b7f0e64b93902a82cafd71598219cf45630b39a374bdd45f04a8be74efd797a2580326cd426db20b52d985d42689eac4a2a947445c7e7a8a30d1d457d783d3a3258fe6c298485f54604f2d0c4e7f73dbf9d2c69eff43493e53e33f368d4e88ed7bb69a7610cfec186598c8713133e0704cc6cb59fb565125de0d7fc99116978fccccbb39c54dda5dfca8267aa488b2cc1fafc544dfcff4935c65f09991dcc31210c96afaff7f1c8d879b8936a42298dded03badfe72c99fa1135092be026a1e2d95eb1d18745d7e25ecaff23b2f59a446eacf9de1806604791102a599d80130175493e6e4ea9918af36b6b4dfa288a24eb5740f32b9d0d134c92a2e337ecee15da94a37d54c14888ed7e0ca", 0x1000, 0x8}, {&(0x7f0000001640)="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", 0xff, 0x9}, {&(0x7f0000001740)="7a28f4b3804226089dfe75b545112b6c7c75ab95cd18", 0x16, 0x8}, {&(0x7f0000001780)="f878bd0728850a8211903c8a63986e91ba56ccb4a7f76f20ba29f55c5da4eefe10514654ca9e77a252c0a88011a7e6fb1687e910a95514911ce19fdd314f3b30b0eb63c12f7f674e7707437698ff9a05b4777f9844af334f16535c9e8ef817acd5a770307fe2a00ac2114d6fb3", 0x6d, 0xb0f}], 0x104000, &(0x7f00000018c0)={[{@alloc_mode_reuse}, {@user_xattr}], [{@obj_user={'obj_user', 0x3d, '$'}}, {@obj_type}, {@obj_user={'obj_user', 0x3d, 'GPL\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) sendfile(r3, 0xffffffffffffffff, &(0x7f0000001940)=0x7, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') (async) ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) (async) close(r0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000400)={0x54, 0x0, &(0x7f0000000340)=[@increfs={0x40046304, 0x1}, @transaction_sg={0x40486311, {0x3, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000040)={@fda={0x66646185, 0x5, 0x1, 0x12}, @ptr={0x70742a85, 0x0, &(0x7f0000000240)=""/172, 0xac, 0x2, 0x2f}, @fda={0x66646185, 0x6, 0x2, 0x32}}, &(0x7f0000000300)={0x0, 0x20, 0x48}}, 0x1000}], 0x0, 0x0, &(0x7f00000003c0)}) (async) syz_mount_image$f2fs(&(0x7f00000003c0), &(0x7f0000000440)='./file0\x00', 0x1f, 0x7, &(0x7f0000001800)=[{&(0x7f0000000480)="a2cab6b6c5adf06cd97a58", 0xb, 0x7}, {&(0x7f00000004c0)="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", 0xfc, 0x3}, {&(0x7f00000005c0)="54a05de54e1f801666d3e9da8503986787d557c24ca8d9aa4eec60fca6d2e6defa5a350f889a450a34c58e4861c6facb59497b769304c6381098743738d06a732e91159588db1d647bc1148a011659e4e817ac35abdfe121", 0x58, 0x2}, {&(0x7f0000000640)="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", 0x1000, 0x8}, {&(0x7f0000001640)="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", 0xff, 0x9}, {&(0x7f0000001740)="7a28f4b3804226089dfe75b545112b6c7c75ab95cd18", 0x16, 0x8}, {&(0x7f0000001780)="f878bd0728850a8211903c8a63986e91ba56ccb4a7f76f20ba29f55c5da4eefe10514654ca9e77a252c0a88011a7e6fb1687e910a95514911ce19fdd314f3b30b0eb63c12f7f674e7707437698ff9a05b4777f9844af334f16535c9e8ef817acd5a770307fe2a00ac2114d6fb3", 0x6d, 0xb0f}], 0x104000, &(0x7f00000018c0)={[{@alloc_mode_reuse}, {@user_xattr}], [{@obj_user={'obj_user', 0x3d, '$'}}, {@obj_type}, {@obj_user={'obj_user', 0x3d, 'GPL\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) (async) sendfile(r3, 0xffffffffffffffff, &(0x7f0000001940)=0x7, 0xffffffff) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) [ 375.813563][T28952] loop5: detected capacity change from 0 to 16 01:48:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0xfffffff1) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:50 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) r0 = gettid() tkill(r0, 0xb) (async, rerun: 32) r1 = gettid() (rerun: 32) tkill(r1, 0xb) (async) prctl$PR_SET_PTRACER(0x59616d61, r1) (async, rerun: 32) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (rerun: 32) r2 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r2, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r2, 0x36) [ 376.077018][T28949] syz-executor.0: vmalloc error: size 28672, page order 0, failed to allocate pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz0,mems_allowed=0-1 [ 376.189608][T28949] CPU: 0 PID: 28949 Comm: syz-executor.0 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 [ 376.199639][T28949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.209707][T28949] Call Trace: [ 376.212988][T28949] [ 376.215934][T28949] dump_stack_lvl+0xcd/0x134 [ 376.220547][T28949] warn_alloc.cold+0x87/0x17a [ 376.225242][T28949] ? zone_watermark_ok_safe+0x290/0x290 [ 376.230959][T28949] ? find_held_lock+0x2d/0x110 [ 376.235746][T28949] ? lock_downgrade+0x6e0/0x6e0 [ 376.240629][T28949] ? __vmalloc_node_range+0x6b0/0xf80 [ 376.246019][T28949] __vmalloc_node_range+0xd01/0xf80 [ 376.251239][T28949] ? vfree_atomic+0xe0/0xe0 [ 376.255755][T28949] ? rcu_read_lock_sched_held+0x3a/0x70 [ 376.261326][T28949] ? kernel_clone+0xe7/0xab0 [ 376.265929][T28949] copy_process+0x926/0x7490 [ 376.270534][T28949] ? kernel_clone+0xe7/0xab0 [ 376.275136][T28949] ? lock_chain_count+0x20/0x20 [ 376.280002][T28949] ? lock_chain_count+0x20/0x20 [ 376.284977][T28949] ? __cleanup_sighand+0xb0/0xb0 [ 376.289925][T28949] ? lock_downgrade+0x6e0/0x6e0 [ 376.294809][T28949] ? __lock_acquire+0x1655/0x5470 [ 376.299854][T28949] ? kernel_clone+0x314/0xab0 [ 376.304552][T28949] kernel_clone+0xe7/0xab0 [ 376.309011][T28949] ? copy_init_mm+0x20/0x20 [ 376.313525][T28949] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 376.319527][T28949] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 376.325543][T28949] ? find_held_lock+0x2d/0x110 [ 376.330332][T28949] __do_sys_clone+0xc1/0x100 [ 376.334938][T28949] ? kernel_clone+0xab0/0xab0 [ 376.339631][T28949] ? lock_downgrade+0x6e0/0x6e0 [ 376.344521][T28949] ? syscall_enter_from_user_mode+0x21/0x70 [ 376.350444][T28949] do_syscall_64+0x35/0xb0 [ 376.354875][T28949] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 376.360879][T28949] RIP: 0033:0x7fb10b2da2c1 [ 376.365303][T28949] Code: 48 85 ff 74 3d 48 85 f6 74 38 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 7c 13 74 01 c3 31 ed 58 5f ff d0 48 89 c7 b8 3c 00 00 00 01:48:51 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x48) write(r2, &(0x7f0000004200)='t', 0xfff4) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='blkio.throttle.io_serviced_recursive\x00', 0x7a05, 0x1700) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r4}, 0x10) write$cgroup_type(r3, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) fchown(0xffffffffffffffff, 0x0, 0xee00) r5 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r6 = openat(r5, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r6, &(0x7f0000004200)='t', 0xfff4) ioctl$HIDIOCSFEATURE(r6, 0xc0404806, &(0x7f0000000300)="b8ae95f2befa559b56d20e76e4db1f54142b204ffb7e68cf1948106bca15f049bdfddeaecb2b4837973ed1243f573ac984a66581ad9d774b356b0124c6e75c2c26663d80a026376d5becdc17c8a056a409b273cf6bd263c32748676347b138f7bc7105a90366e8f8a65a21e941c8b3ed209e1f495642aac4ad2f0d5a1445de689c78d56e71db01d9e0a012c7a8893f61b44f0a9a19") openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$SNDCTL_DSP_NONBLOCK(r0, 0x500e, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) mkdir(&(0x7f0000000140)='./file0\x00', 0x48) (async) write(r2, &(0x7f0000004200)='t', 0xfff4) (async) openat$cgroup_ro(r2, &(0x7f0000000040)='blkio.throttle.io_serviced_recursive\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r4}, 0x10) (async) write$cgroup_type(r3, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) fchown(0xffffffffffffffff, 0x0, 0xee00) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r5, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r6, &(0x7f0000004200)='t', 0xfff4) (async) ioctl$HIDIOCSFEATURE(r6, 0xc0404806, &(0x7f0000000300)="b8ae95f2befa559b56d20e76e4db1f54142b204ffb7e68cf1948106bca15f049bdfddeaecb2b4837973ed1243f573ac984a66581ad9d774b356b0124c6e75c2c26663d80a026376d5becdc17c8a056a409b273cf6bd263c32748676347b138f7bc7105a90366e8f8a65a21e941c8b3ed209e1f495642aac4ad2f0d5a1445de689c78d56e71db01d9e0a012c7a8893f61b44f0a9a19") (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) ioctl$SNDCTL_DSP_NONBLOCK(r0, 0x500e, 0x0) (async) [ 376.384924][T28949] RSP: 002b:00007ffc5d68b0c8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 376.393353][T28949] RAX: ffffffffffffffda RBX: 00007fb109a80700 RCX: 00007fb10b2da2c1 [ 376.401331][T28949] RDX: 00007fb109a809d0 RSI: 00007fb109a802f0 RDI: 00000000003d0f00 [ 376.409310][T28949] RBP: 00007ffc5d68b310 R08: 00007fb109a80700 R09: 00007fb109a80700 [ 376.417286][T28949] R10: 00007fb109a809d0 R11: 0000000000000206 R12: 00007ffc5d68b17e [ 376.425257][T28949] R13: 00007ffc5d68b17f R14: 00007fb109a80300 R15: 0000000000022000 [ 376.433250][T28949] [ 376.493782][T28949] Mem-Info: [ 376.497055][T28949] active_anon:517 inactive_anon:239896 isolated_anon:0 [ 376.497055][T28949] active_file:4672 inactive_file:8085 isolated_file:0 [ 376.497055][T28949] unevictable:768 dirty:39 writeback:0 [ 376.497055][T28949] slab_reclaimable:16084 slab_unreclaimable:97490 [ 376.497055][T28949] mapped:33729 shmem:7987 pagetables:1802 bounce:0 [ 376.497055][T28949] kernel_misc_reclaimable:0 [ 376.497055][T28949] free:1233310 free_pcp:10891 free_cma:0 [ 376.626997][T29137] loop5: detected capacity change from 0 to 16 [ 376.654563][T28949] Node 0 active_anon:2060kB inactive_anon:960768kB active_file:18604kB inactive_file:32340kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:134916kB dirty:148kB writeback:0kB shmem:29468kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 774144kB writeback_tmp:0kB kernel_stack:13156kB pagetables:7300kB all_unreclaimable? no [ 376.737077][ T25] audit: type=1800 audit(1640483331.345:160): pid=29112 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=1048608 res=0 errno=0 01:48:51 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) r0 = gettid() tkill(r0, 0xb) (async) r1 = gettid() tkill(r1, 0xb) (async) prctl$PR_SET_PTRACER(0x59616d61, r1) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r2, 0x36) 01:48:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0xfffffffffffffdef) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 376.745835][T28949] Node 1 active_anon:8kB inactive_anon:932kB active_file:76kB inactive_file:0kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:2476kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:4kB all_unreclaimable? no [ 376.976872][ T25] audit: type=1800 audit(1640483331.585:161): pid=29182 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=1048608 res=0 errno=0 01:48:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0xfffffffffffffff1) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 377.022966][T28949] Node 0 DMA free:15360kB boost:0kB min:200kB low:248kB high:296kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 01:48:51 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = fork() ptrace$cont(0x7, r1, 0x1, 0x499c) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) [ 377.118384][T28949] lowmem_reserve[]: 0 2645 2645 2645 2645 [ 377.137852][T28949] Node 0 DMA32 free:971452kB boost:0kB min:35676kB low:44592kB high:53508kB reserved_highatomic:0KB active_anon:2060kB inactive_anon:954628kB active_file:18604kB inactive_file:32340kB unevictable:1536kB writepending:148kB present:3129332kB managed:2716620kB mlocked:0kB bounce:0kB free_pcp:42768kB local_pcp:20792kB free_cma:0kB 01:48:51 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x48) write(r2, &(0x7f0000004200)='t', 0xfff4) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='blkio.throttle.io_serviced_recursive\x00', 0x7a05, 0x1700) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r4}, 0x10) write$cgroup_type(r3, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) fchown(0xffffffffffffffff, 0x0, 0xee00) r5 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r6 = openat(r5, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r6, &(0x7f0000004200)='t', 0xfff4) ioctl$HIDIOCSFEATURE(r6, 0xc0404806, &(0x7f0000000300)="b8ae95f2befa559b56d20e76e4db1f54142b204ffb7e68cf1948106bca15f049bdfddeaecb2b4837973ed1243f573ac984a66581ad9d774b356b0124c6e75c2c26663d80a026376d5becdc17c8a056a409b273cf6bd263c32748676347b138f7bc7105a90366e8f8a65a21e941c8b3ed209e1f495642aac4ad2f0d5a1445de689c78d56e71db01d9e0a012c7a8893f61b44f0a9a19") openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$SNDCTL_DSP_NONBLOCK(r0, 0x500e, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) mkdir(&(0x7f0000000140)='./file0\x00', 0x48) (async) write(r2, &(0x7f0000004200)='t', 0xfff4) (async) openat$cgroup_ro(r2, &(0x7f0000000040)='blkio.throttle.io_serviced_recursive\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r4}, 0x10) (async) write$cgroup_type(r3, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) fchown(0xffffffffffffffff, 0x0, 0xee00) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r5, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r6, &(0x7f0000004200)='t', 0xfff4) (async) ioctl$HIDIOCSFEATURE(r6, 0xc0404806, &(0x7f0000000300)="b8ae95f2befa559b56d20e76e4db1f54142b204ffb7e68cf1948106bca15f049bdfddeaecb2b4837973ed1243f573ac984a66581ad9d774b356b0124c6e75c2c26663d80a026376d5becdc17c8a056a409b273cf6bd263c32748676347b138f7bc7105a90366e8f8a65a21e941c8b3ed209e1f495642aac4ad2f0d5a1445de689c78d56e71db01d9e0a012c7a8893f61b44f0a9a19") (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) ioctl$SNDCTL_DSP_NONBLOCK(r0, 0x500e, 0x0) (async) [ 377.368108][T28949] lowmem_reserve[]: 0 0 0 0 0 [ 377.374847][T28949] Node 0 Normal free:0kB boost:0kB min:4kB low:4kB high:4kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:400kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 01:48:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82070af5b9", @ANYRES64, @ANYBLOB="686372db74b2c39b8b63598fa8cc91f0d5d9f58f5de7c05eb0057965cd61a7d94487a43b4d20ce2da7283b67dd2c061c5cb37041bc9dadab5a4a48b4a35d910abf383a5ae5c7b168d3574d234ad409e806dffc839d4e360db86afadbb82d928e3464bd686e96fc5053dc7613e6d365f15dd59e815c3de439f7b72c452ba8e6d868c843689e1402a4fdc660ce4d8b2c6f4887eca50da62ef6fd15d45cb516624195866296c10648510bdcaf9f29242d6f34f131", @ANYRES32=r0, @ANYRES64=0x0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 377.426902][T28949] lowmem_reserve[]: 0 0 0 0 0 [ 377.440651][T28949] Node 1 Normal free:3951168kB boost:0kB min:54224kB low:67780kB high:81336kB reserved_highatomic:0KB active_anon:8kB inactive_anon:932kB active_file:76kB inactive_file:0kB unevictable:1536kB writepending:4kB present:4194304kB managed:4117620kB mlocked:0kB bounce:0kB free_pcp:828kB local_pcp:828kB free_cma:0kB [ 377.492288][ T3976] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 377.502439][T28949] lowmem_reserve[]: 0 0 0 0 0 [ 377.524783][T28949] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB 01:48:52 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async, rerun: 64) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async, rerun: 64) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) r0 = gettid() (async) r1 = fork() ptrace$cont(0x7, r1, 0x1, 0x499c) (async, rerun: 64) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async, rerun: 64) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) tkill(r0, 0x36) (rerun: 64) [ 377.628721][T28949] Node 0 DMA32: 3692*4kB (UME) 1534*8kB (UME) 1546*16kB (UME) 300*32kB (UME) 391*64kB (UME) 137*128kB (UME) 17*256kB (UME) 9*512kB (UME) 3*1024kB (M) 2*2048kB (ME) 207*4096kB (UM) = 967936kB [ 377.633708][T29365] loop5: detected capacity change from 0 to 16 [ 377.778895][T28949] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 377.803827][T28949] Node 1 Normal: 124*4kB (UME) 24*8kB (UME) 23*16kB (UME) 159*32kB (UME) 67*64kB (UME) 23*128kB (UE) 8*256kB (U) 7*512kB (UE) 2*1024kB (UE) 3*2048kB (UM) 958*4096kB (M) = 3951168kB [ 377.843109][T28949] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 377.859709][T28949] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 377.883559][T28949] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 01:48:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82070af5b9", @ANYRES64, @ANYBLOB="686372db74b2c39b8b63598fa8cc91f0d5d9f58f5de7c05eb0057965cd61a7d94487a43b4d20ce2da7283b67dd2c061c5cb37041bc9dadab5a4a48b4a35d910abf383a5ae5c7b168d3574d234ad409e806dffc839d4e360db86afadbb82d928e3464bd686e96fc5053dc7613e6d365f15dd59e815c3de439f7b72c452ba8e6d868c843689e1402a4fdc660ce4d8b2c6f4887eca50da62ef6fd15d45cb516624195866296c10648510bdcaf9f29242d6f34f131", @ANYRES32=r0, @ANYRES64=0x0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82070af5b9", @ANYRES64, @ANYBLOB="686372db74b2c39b8b63598fa8cc91f0d5d9f58f5de7c05eb0057965cd61a7d94487a43b4d20ce2da7283b67dd2c061c5cb37041bc9dadab5a4a48b4a35d910abf383a5ae5c7b168d3574d234ad409e806dffc839d4e360db86afadbb82d928e3464bd686e96fc5053dc7613e6d365f15dd59e815c3de439f7b72c452ba8e6d868c843689e1402a4fdc660ce4d8b2c6f4887eca50da62ef6fd15d45cb516624195866296c10648510bdcaf9f29242d6f34f131", @ANYRES32=r0, @ANYRES64=0x0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async) [ 377.895278][T29365] FAT-fs (loop5): Unrecognized mount option "€" or missing value [ 377.900747][T28949] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 377.933717][T28949] 20369 total pagecache pages [ 377.956859][T28949] 0 pages in swap cache [ 377.976645][T28949] Swap cache stats: add 0, delete 0, find 0/0 [ 378.020164][T28949] Free swap = 0kB [ 378.039332][T28949] Total swap = 0kB [ 378.043262][T28949] 2097051 pages RAM [ 378.047243][T28949] 0 pages HighMem/MovableOnly [ 378.102832][T28949] 384551 pages reserved [ 378.124979][T28949] 0 pages cma reserved 01:48:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x2, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000480)='./file0\x00', 0x200, 0x2, &(0x7f0000000200)=[{&(0x7f0000000500)="eb0000906d6b66008100f846c4edf237e420e4a69a00000000000000003ad86d6214bb", 0x23, 0x4}, {0x0, 0x0, 0x1000}], 0x110001, &(0x7f0000000480)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r2, &(0x7f0000004200)='t', 0xfff4) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000300), 0x5e5203, 0x0) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x4, 0xb, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @ldst={0x1, 0x2, 0x0, 0x4, 0x5, 0xc, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x44e, 0x0, 0x0, 0x0, 0xfffffffc}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000240)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, 0x10, r0, 0x8, &(0x7f0000000280)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x7, 0x9, 0x5, 0x4}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000340)=[r0, r2, r3, r0, r0, r5]}, 0x80) r6 = eventfd2(0x8000, 0x800) finit_module(r6, &(0x7f0000000440)='GPL\x00', 0x2) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r7, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:52 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = fork() ptrace$cont(0x7, r1, 0x1, 0x499c) (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) [ 378.229506][ T1236] ieee802154 phy0 wpan0: encryption failed: -22 01:48:52 executing program 5: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r3}, 0x10) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) fcntl$dupfd(r4, 0x0, r0) r5 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) openat(r5, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r1, &(0x7f0000004200)='t', 0x1) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x13402, 0x0) write$cgroup_int(r6, &(0x7f0000000240)=0x3, 0x1e) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 378.346673][ T3976] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 378.381323][T29600] loop5: detected capacity change from 0 to 16 01:48:53 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) ptrace$cont(0x20, r0, 0xe6d, 0x9) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) clone(0x4a40200, &(0x7f00000000c0)="60399fa2c2968de78cc9ffeac45abf052ed6a291bd8edaf8360617ad91aa2c9a8b937326e89c9e34cf0627cb84d4cdafd949f780021517dc44159a6243ed0a02f900606e42ecd3037af43097e5dc282ccadc29d280f896c727ecd8a3c0ca8e4d84af8ea94a5e50331729bca0ef68eaba5d0c09d471037c", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="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") clock_gettime(0x0, &(0x7f0000001e40)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001dc0)=[{{&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000800)=[{&(0x7f0000000380)=""/241, 0xf1}, {&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/192, 0xc0}, {&(0x7f0000000640)=""/190, 0xbe}, {&(0x7f0000000700)=""/229, 0xe5}], 0x5, &(0x7f0000000880)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f00000008c0), 0x6e, &(0x7f0000001cc0)=[{&(0x7f0000000940)=""/129, 0x81}, {&(0x7f0000000a00)=""/27, 0x1b}, {&(0x7f0000000a40)=""/166, 0xa6}, {&(0x7f0000000b00)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/232, 0xe8}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x6, &(0x7f0000001d40)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32], 0x80}}], 0x2, 0x1, &(0x7f0000001e80)={r2, r3+60000000}) syz_open_procfs(r4, &(0x7f0000001ec0)='net/xfrm_stat\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) tkill(r1, 0x36) [ 378.414129][T29600] FAT-fs (loop5): Unrecognized mount option "€" or missing value 01:48:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x2, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000480)='./file0\x00', 0x200, 0x2, &(0x7f0000000200)=[{&(0x7f0000000500)="eb0000906d6b66008100f846c4edf237e420e4a69a00000000000000003ad86d6214bb", 0x23, 0x4}, {0x0, 0x0, 0x1000}], 0x110001, &(0x7f0000000480)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r2, &(0x7f0000004200)='t', 0xfff4) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000300), 0x5e5203, 0x0) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x4, 0xb, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @ldst={0x1, 0x2, 0x0, 0x4, 0x5, 0xc, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x44e, 0x0, 0x0, 0x0, 0xfffffffc}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000240)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, 0x10, r0, 0x8, &(0x7f0000000280)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x7, 0x9, 0x5, 0x4}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000340)=[r0, r2, r3, r0, r0, r5]}, 0x80) r6 = eventfd2(0x8000, 0x800) finit_module(r6, &(0x7f0000000440)='GPL\x00', 0x2) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r7, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x2, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000480)='./file0\x00', 0x200, 0x2, &(0x7f0000000200)=[{&(0x7f0000000500)="eb0000906d6b66008100f846c4edf237e420e4a69a00000000000000003ad86d6214bb", 0x23, 0x4}, {0x0, 0x0, 0x1000}], 0x110001, &(0x7f0000000480)=ANY=[]) (async) openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r2, &(0x7f0000004200)='t', 0xfff4) (async) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000300), 0x5e5203, 0x0) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r5, &(0x7f0000004200)='t', 0xfff4) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x4, 0xb, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @ldst={0x1, 0x2, 0x0, 0x4, 0x5, 0xc, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x44e, 0x0, 0x0, 0x0, 0xfffffffc}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000240)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, 0x10, r0, 0x8, &(0x7f0000000280)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x7, 0x9, 0x5, 0x4}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000340)=[r0, r2, r3, r0, r0, r5]}, 0x80) (async) eventfd2(0x8000, 0x800) (async) finit_module(r6, &(0x7f0000000440)='GPL\x00', 0x2) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_type(r7, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 01:48:53 executing program 5: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r3}, 0x10) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) fcntl$dupfd(r4, 0x0, r0) r5 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) openat(r5, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r1, &(0x7f0000004200)='t', 0x1) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x13402, 0x0) write$cgroup_int(r6, &(0x7f0000000240)=0x3, 0x1e) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r3}, 0x10) (async) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) (async) fcntl$dupfd(r4, 0x0, r0) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r5, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r1, &(0x7f0000004200)='t', 0x1) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x13402, 0x0) (async) write$cgroup_int(r6, &(0x7f0000000240)=0x3, 0x1e) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) [ 378.486737][ T3976] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:48:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x2, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async, rerun: 32) r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000480)='./file0\x00', 0x200, 0x2, &(0x7f0000000200)=[{&(0x7f0000000500)="eb0000906d6b66008100f846c4edf237e420e4a69a00000000000000003ad86d6214bb", 0x23, 0x4}, {0x0, 0x0, 0x1000}], 0x110001, &(0x7f0000000480)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r2, &(0x7f0000004200)='t', 0xfff4) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000300), 0x5e5203, 0x0) (async) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x4, 0xb, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @ldst={0x1, 0x2, 0x0, 0x4, 0x5, 0xc, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x44e, 0x0, 0x0, 0x0, 0xfffffffc}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000240)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, 0x10, r0, 0x8, &(0x7f0000000280)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x7, 0x9, 0x5, 0x4}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000340)=[r0, r2, r3, r0, r0, r5]}, 0x80) (async) r6 = eventfd2(0x8000, 0x800) finit_module(r6, &(0x7f0000000440)='GPL\x00', 0x2) (async, rerun: 64) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (rerun: 64) write$cgroup_type(r7, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 378.673545][T29745] loop5: detected capacity change from 0 to 16 [ 378.711690][T29745] FAT-fs (loop5): Unrecognized mount option "€" or missing value 01:48:53 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) ptrace$cont(0x20, r0, 0xe6d, 0x9) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r1, 0x0, 0x0) clone(0x4a40200, &(0x7f00000000c0)="60399fa2c2968de78cc9ffeac45abf052ed6a291bd8edaf8360617ad91aa2c9a8b937326e89c9e34cf0627cb84d4cdafd949f780021517dc44159a6243ed0a02f900606e42ecd3037af43097e5dc282ccadc29d280f896c727ecd8a3c0ca8e4d84af8ea94a5e50331729bca0ef68eaba5d0c09d471037c", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="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") (async) clock_gettime(0x0, &(0x7f0000001e40)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001dc0)=[{{&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000800)=[{&(0x7f0000000380)=""/241, 0xf1}, {&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/192, 0xc0}, {&(0x7f0000000640)=""/190, 0xbe}, {&(0x7f0000000700)=""/229, 0xe5}], 0x5, &(0x7f0000000880)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f00000008c0), 0x6e, &(0x7f0000001cc0)=[{&(0x7f0000000940)=""/129, 0x81}, {&(0x7f0000000a00)=""/27, 0x1b}, {&(0x7f0000000a40)=""/166, 0xa6}, {&(0x7f0000000b00)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/232, 0xe8}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x6, &(0x7f0000001d40)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32], 0x80}}], 0x2, 0x1, &(0x7f0000001e80)={r2, r3+60000000}) (async, rerun: 32) syz_open_procfs(r4, &(0x7f0000001ec0)='net/xfrm_stat\x00') (rerun: 32) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)) (async) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) tkill(r1, 0x36) 01:48:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82070af5b9", @ANYRES64, @ANYBLOB="686372db74b2c39b8b63598fa8cc91f0d5d9f58f5de7c05eb0057965cd61a7d94487a43b4d20ce2da7283b67dd2c061c5cb37041bc9dadab5a4a48b4a35d910abf383a5ae5c7b168d3574d234ad409e806dffc839d4e360db86afadbb82d928e3464bd686e96fc5053dc7613e6d365f15dd59e815c3de439f7b72c452ba8e6d868c843689e1402a4fdc660ce4d8b2c6f4887eca50da62ef6fd15d45cb516624195866296c10648510bdcaf9f29242d6f34f131", @ANYRES32=r0, @ANYRES64=0x0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 378.820013][ T3976] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:48:53 executing program 5: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r3}, 0x10) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) (async) fcntl$dupfd(r4, 0x0, r0) (async) r5 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) openat(r5, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r1, &(0x7f0000004200)='t', 0x1) (async) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x13402, 0x0) write$cgroup_int(r6, &(0x7f0000000240)=0x3, 0x1e) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:53 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5a4d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000001c0)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xf) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) openat$cgroup_ro(r3, &(0x7f0000000040)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) 01:48:53 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) ptrace$cont(0x20, r0, 0xe6d, 0x9) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) r1 = gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) (async) clone(0x4a40200, &(0x7f00000000c0)="60399fa2c2968de78cc9ffeac45abf052ed6a291bd8edaf8360617ad91aa2c9a8b937326e89c9e34cf0627cb84d4cdafd949f780021517dc44159a6243ed0a02f900606e42ecd3037af43097e5dc282ccadc29d280f896c727ecd8a3c0ca8e4d84af8ea94a5e50331729bca0ef68eaba5d0c09d471037c", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="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") clock_gettime(0x0, &(0x7f0000001e40)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001dc0)=[{{&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000800)=[{&(0x7f0000000380)=""/241, 0xf1}, {&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/192, 0xc0}, {&(0x7f0000000640)=""/190, 0xbe}, {&(0x7f0000000700)=""/229, 0xe5}], 0x5, &(0x7f0000000880)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f00000008c0), 0x6e, &(0x7f0000001cc0)=[{&(0x7f0000000940)=""/129, 0x81}, {&(0x7f0000000a00)=""/27, 0x1b}, {&(0x7f0000000a40)=""/166, 0xa6}, {&(0x7f0000000b00)=""/141, 0x8d}, {&(0x7f0000000bc0)=""/232, 0xe8}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x6, &(0x7f0000001d40)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32], 0x80}}], 0x2, 0x1, &(0x7f0000001e80)={r2, r3+60000000}) syz_open_procfs(r4, &(0x7f0000001ec0)='net/xfrm_stat\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)) (async, rerun: 64) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) (async, rerun: 64) tkill(r1, 0x36) 01:48:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x21, 0x0, 0x0, 0x0, 0x0, 0x8000a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000300), 0x2}, 0x2010, 0x4, 0x0, 0x3, 0x0, 0x5, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x3d, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r2, &(0x7f0000004200)='t', 0xfff4) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0x0, 0x18b0}}, './file0\x00'}) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) openat(r4, &(0x7f0000000240)='./file0\x00', 0xf00, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 379.135135][ T3976] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 379.146515][ T3976] Buffer I/O error on dev loop5, logical block 0, async page read 01:48:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) dup3(r0, r0, 0x80000) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e83b1cb6b50cc338e6153c6ac612966dea7d36469a33763b867b0062afd99a50794cc5c083ef2b545553012ea595c394b6a6aa33cd03e521060abb"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 379.296074][T29971] loop5: detected capacity change from 0 to 16 [ 379.388939][T29971] FAT-fs (loop5): Unrecognized mount option "€" or missing value 01:48:54 executing program 3: rt_sigprocmask(0x2, &(0x7f0000000080)={[0x4]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) ptrace$setopts(0x4206, r1, 0x2, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@getnexthop={0x30, 0x6a, 0x10, 0x70bd29, 0x25dfdbfd, {}, [@NHA_GROUPS={0x4}, @NHA_MASTER={0x8, 0xa, 0x1}, @NHA_GROUPS={0x4}, @NHA_FDB={0x4}, @NHA_GROUPS={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x1) syz_open_procfs(r1, &(0x7f00000001c0)='net/protocols\x00') tkill(r0, 0x36) 01:48:54 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5a4d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000001c0)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xf) (async) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) openat$cgroup_ro(r3, &(0x7f0000000040)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) [ 379.641260][T30114] loop5: detected capacity change from 0 to 16 01:48:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (rerun: 64) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) dup3(r0, r0, 0x80000) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e83b1cb6b50cc338e6153c6ac612966dea7d36469a33763b867b0062afd99a50794cc5c083ef2b545553012ea595c394b6a6aa33cd03e521060abb"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async, rerun: 32) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (rerun: 32) 01:48:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x21, 0x0, 0x0, 0x0, 0x0, 0x8000a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000300), 0x2}, 0x2010, 0x4, 0x0, 0x3, 0x0, 0x5, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x3d, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r2, &(0x7f0000004200)='t', 0xfff4) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0x0, 0x18b0}}, './file0\x00'}) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) openat(r4, &(0x7f0000000240)='./file0\x00', 0xf00, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x21, 0x0, 0x0, 0x0, 0x0, 0x8000a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000300), 0x2}, 0x2010, 0x4, 0x0, 0x3, 0x0, 0x5, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x3d, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r2, &(0x7f0000004200)='t', 0xfff4) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') (async) ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0x0, 0x18b0}}, './file0\x00'}) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) openat(r4, &(0x7f0000000240)='./file0\x00', 0xf00, 0x1) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) [ 379.691715][T30114] FAT-fs (loop5): Unrecognized mount option "€" or missing value 01:48:54 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5a4d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000001c0)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xf) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) openat$cgroup_ro(r3, &(0x7f0000000040)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5a4d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000001c0)) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) socket$netlink(0x10, 0x3, 0xf) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r3, &(0x7f0000004200)='t', 0xfff4) (async) openat$cgroup_ro(r3, &(0x7f0000000040)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) (async) 01:48:54 executing program 3: rt_sigprocmask(0x2, &(0x7f0000000080)={[0x4]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) ptrace$setopts(0x4206, r1, 0x2, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@getnexthop={0x30, 0x6a, 0x10, 0x70bd29, 0x25dfdbfd, {}, [@NHA_GROUPS={0x4}, @NHA_MASTER={0x8, 0xa, 0x1}, @NHA_GROUPS={0x4}, @NHA_FDB={0x4}, @NHA_GROUPS={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x1) syz_open_procfs(r1, &(0x7f00000001c0)='net/protocols\x00') tkill(r0, 0x36) rt_sigprocmask(0x2, &(0x7f0000000080)={[0x4]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) (async) ptrace$setopts(0x4206, r1, 0x2, 0x2) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@getnexthop={0x30, 0x6a, 0x10, 0x70bd29, 0x25dfdbfd, {}, [@NHA_GROUPS={0x4}, @NHA_MASTER={0x8, 0xa, 0x1}, @NHA_GROUPS={0x4}, @NHA_FDB={0x4}, @NHA_GROUPS={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x1) (async) syz_open_procfs(r1, &(0x7f00000001c0)='net/protocols\x00') (async) tkill(r0, 0x36) (async) [ 379.806432][ T3976] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 379.929482][T30210] loop5: detected capacity change from 0 to 16 [ 380.007743][T30210] FAT-fs (loop5): Unrecognized mount option "€" or missing value 01:48:54 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open$cgroup(&(0x7f00000002c0)={0x4, 0x80, 0x3f, 0x7, 0x81, 0x4, 0x0, 0x25, 0x64926, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000280), 0xb}, 0x148a, 0x101, 0x4, 0x4, 0x8, 0x800, 0x0, 0x0, 0x1, 0x0, 0xffff}, r0, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x71, 0x80, 0x7, 0x6, 0x0, 0x3, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x8, 0x10000}, 0x4020, 0x6, 0xffffffff, 0x2, 0x9, 0x7, 0x0, 0x0, 0x9, 0x0, 0x9}, 0x0, 0x7, r2, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100), 0x2c4480, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='mm_vmscan_lru_shrink_inactive\x00', r3}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:54 executing program 3: rt_sigprocmask(0x2, &(0x7f0000000080)={[0x4]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async, rerun: 64) r0 = gettid() (rerun: 64) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) ptrace$setopts(0x4206, r1, 0x2, 0x2) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@getnexthop={0x30, 0x6a, 0x10, 0x70bd29, 0x25dfdbfd, {}, [@NHA_GROUPS={0x4}, @NHA_MASTER={0x8, 0xa, 0x1}, @NHA_GROUPS={0x4}, @NHA_FDB={0x4}, @NHA_GROUPS={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x1) (async, rerun: 64) syz_open_procfs(r1, &(0x7f00000001c0)='net/protocols\x00') (async, rerun: 64) tkill(r0, 0x36) 01:48:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) dup3(r0, r0, 0x80000) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e83b1cb6b50cc338e6153c6ac612966dea7d36469a33763b867b0062afd99a50794cc5c083ef2b545553012ea595c394b6a6aa33cd03e521060abb"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:55 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0xd08f, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) rt_sigprocmask(0x0, &(0x7f0000000080)={[0x80]}, &(0x7f00000000c0), 0x8) ptrace$setopts(0x4200, r0, 0xde8, 0x18) 01:48:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x21, 0x0, 0x0, 0x0, 0x0, 0x8000a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000300), 0x2}, 0x2010, 0x4, 0x0, 0x3, 0x0, 0x5, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x3d, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r2, &(0x7f0000004200)='t', 0xfff4) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0x0, 0x18b0}}, './file0\x00'}) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) openat(r4, &(0x7f0000000240)='./file0\x00', 0xf00, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x21, 0x0, 0x0, 0x0, 0x0, 0x8000a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000300), 0x2}, 0x2010, 0x4, 0x0, 0x3, 0x0, 0x5, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x3d, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r2, &(0x7f0000004200)='t', 0xfff4) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') (async) ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0x0, 0x18b0}}, './file0\x00'}) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) openat(r4, &(0x7f0000000240)='./file0\x00', 0xf00, 0x1) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 01:48:55 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r2 = perf_event_open$cgroup(&(0x7f00000002c0)={0x4, 0x80, 0x3f, 0x7, 0x81, 0x4, 0x0, 0x25, 0x64926, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000280), 0xb}, 0x148a, 0x101, 0x4, 0x4, 0x8, 0x800, 0x0, 0x0, 0x1, 0x0, 0xffff}, r0, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x71, 0x80, 0x7, 0x6, 0x0, 0x3, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x8, 0x10000}, 0x4020, 0x6, 0xffffffff, 0x2, 0x9, 0x7, 0x0, 0x0, 0x9, 0x0, 0x9}, 0x0, 0x7, r2, 0x1) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100), 0x2c4480, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='mm_vmscan_lru_shrink_inactive\x00', r3}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:55 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0xd08f, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) rt_sigprocmask(0x0, &(0x7f0000000080)={[0x80]}, &(0x7f00000000c0), 0x8) ptrace$setopts(0x4200, r0, 0xde8, 0x18) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0xd08f, 0x40) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) (async) rt_sigprocmask(0x0, &(0x7f0000000080)={[0x80]}, &(0x7f00000000c0), 0x8) (async) ptrace$setopts(0x4200, r0, 0xde8, 0x18) (async) 01:48:55 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open$cgroup(&(0x7f00000002c0)={0x4, 0x80, 0x3f, 0x7, 0x81, 0x4, 0x0, 0x25, 0x64926, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000280), 0xb}, 0x148a, 0x101, 0x4, 0x4, 0x8, 0x800, 0x0, 0x0, 0x1, 0x0, 0xffff}, r0, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x71, 0x80, 0x7, 0x6, 0x0, 0x3, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x8, 0x10000}, 0x4020, 0x6, 0xffffffff, 0x2, 0x9, 0x7, 0x0, 0x0, 0x9, 0x0, 0x9}, 0x0, 0x7, r2, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100), 0x2c4480, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='mm_vmscan_lru_shrink_inactive\x00', r3}, 0x10) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (rerun: 64) 01:48:56 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) r0 = gettid() (async) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0xd08f, 0x40) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) rt_sigprocmask(0x0, &(0x7f0000000080)={[0x80]}, &(0x7f00000000c0), 0x8) ptrace$setopts(0x4200, r0, 0xde8, 0x18) 01:48:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:56 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040), 0xa040, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='freezer.state\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x100, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x200000, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x1, 0x5, 0x20, 0x0, 0x100000001, 0x20, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext={0x8, 0x1}, 0x9, 0x0, 0x0, 0x1, 0x6, 0x6, 0xee6, 0x0, 0xffffd928, 0x0, 0x5}, 0xffffffffffffffff, 0x5, r3, 0x2) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r4}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:56 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) 01:48:56 executing program 2: stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f0000000040), &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x10002, &(0x7f0000000400)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@timeout={'timeout', 0x3d, 0xc120}}, {@rq={'rq', 0x3d, 0x3}}, {@common=@dfltuid={'dfltuid', 0x3d, r0}}, {@sq={'sq', 0x3d, 0x80}}, {@sq={'sq', 0x3d, 0x8e8c}}, {@common=@noextend}, {@common=@noextend}, {@rq={'rq', 0x3d, 0xfa}}], [{@obj_type={'obj_type', 0x3d, '-'}}, {@fsname}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@pcr={'pcr', 0x3d, 0xb}}]}}) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x48000, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x180, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 381.972340][T30935] loop5: detected capacity change from 0 to 16 01:48:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:56 executing program 2: stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f0000000040), &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x10002, &(0x7f0000000400)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@timeout={'timeout', 0x3d, 0xc120}}, {@rq={'rq', 0x3d, 0x3}}, {@common=@dfltuid={'dfltuid', 0x3d, r0}}, {@sq={'sq', 0x3d, 0x80}}, {@sq={'sq', 0x3d, 0x8e8c}}, {@common=@noextend}, {@common=@noextend}, {@rq={'rq', 0x3d, 0xfa}}], [{@obj_type={'obj_type', 0x3d, '-'}}, {@fsname}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@pcr={'pcr', 0x3d, 0xb}}]}}) (async) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x48000, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x180, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 382.198288][T30935] FAT-fs (loop5): Unrecognized mount option "€" or missing value 01:48:56 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0x0, 0x8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) 01:48:56 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040), 0xa040, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='freezer.state\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x100, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x200000, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) (async) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x1, 0x5, 0x20, 0x0, 0x100000001, 0x20, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext={0x8, 0x1}, 0x9, 0x0, 0x0, 0x1, 0x6, 0x6, 0xee6, 0x0, 0xffffd928, 0x0, 0x5}, 0xffffffffffffffff, 0x5, r3, 0x2) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r4}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:56 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000240), 0x373, 0x20e402) inotify_add_watch(r0, &(0x7f0000000280)='./file0\x00', 0xc40) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x80000001, 0xcaa, 0x6, 0x560, r1, 0x2, '\x00', 0x0, r2, 0x0, 0x3, 0x5, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x9, &(0x7f00000002c0)=ANY=[@ANYBLOB="9500000000000000bd50000000000000a503ec0ebf09000000181400"/44, @ANYRES32=r2, @ANYBLOB="0000000000000000850000001f0000001524f4ff04000000"], &(0x7f0000000340)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000380)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x5, 0x40, 0x400}, 0x10}, 0x80) [ 382.416103][T31133] loop5: detected capacity change from 0 to 16 [ 382.456917][ T25] audit: type=1800 audit(1640483337.065:162): pid=31133 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=1048609 res=0 errno=0 01:48:57 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040), 0xa040, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='freezer.state\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x100, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x200000, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) (async) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x1, 0x5, 0x20, 0x0, 0x100000001, 0x20, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext={0x8, 0x1}, 0x9, 0x0, 0x0, 0x1, 0x6, 0x6, 0xee6, 0x0, 0xffffd928, 0x0, 0x5}, 0xffffffffffffffff, 0x5, r3, 0x2) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r4}, 0x10) (async, rerun: 32) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (rerun: 32) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:57 executing program 2: stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f0000000040), &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x10002, &(0x7f0000000400)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@timeout={'timeout', 0x3d, 0xc120}}, {@rq={'rq', 0x3d, 0x3}}, {@common=@dfltuid={'dfltuid', 0x3d, r0}}, {@sq={'sq', 0x3d, 0x80}}, {@sq={'sq', 0x3d, 0x8e8c}}, {@common=@noextend}, {@common=@noextend}, {@rq={'rq', 0x3d, 0xfa}}], [{@obj_type={'obj_type', 0x3d, '-'}}, {@fsname}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@pcr={'pcr', 0x3d, 0xb}}]}}) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x48000, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x180, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) (async) mount$9p_rdma(&(0x7f0000000040), &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x10002, &(0x7f0000000400)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@timeout={'timeout', 0x3d, 0xc120}}, {@rq={'rq', 0x3d, 0x3}}, {@common=@dfltuid={'dfltuid', 0x3d, r0}}, {@sq={'sq', 0x3d, 0x80}}, {@sq={'sq', 0x3d, 0x8e8c}}, {@common=@noextend}, {@common=@noextend}, {@rq={'rq', 0x3d, 0xfa}}], [{@obj_type={'obj_type', 0x3d, '-'}}, {@fsname}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@pcr={'pcr', 0x3d, 0xb}}]}}) (async) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x48000, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x180, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async) 01:48:57 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0x0, 0x8) (async, rerun: 32) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) tkill(r0, 0x36) 01:48:57 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000240), 0x373, 0x20e402) inotify_add_watch(r0, &(0x7f0000000280)='./file0\x00', 0xc40) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async, rerun: 64) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x80000001, 0xcaa, 0x6, 0x560, r1, 0x2, '\x00', 0x0, r2, 0x0, 0x3, 0x5, 0x3}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x9, &(0x7f00000002c0)=ANY=[@ANYBLOB="9500000000000000bd50000000000000a503ec0ebf09000000181400"/44, @ANYRES32=r2, @ANYBLOB="0000000000000000850000001f0000001524f4ff04000000"], &(0x7f0000000340)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000380)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x5, 0x40, 0x400}, 0x10}, 0x80) [ 382.642301][ T3976] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:48:57 executing program 3: rt_sigprocmask(0x1, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000001c0)={0x6, 0x1, {r0}, {}, 0x9, 0x3}) migrate_pages(r1, 0x1, &(0x7f0000000200)=0x5, &(0x7f0000000240)=0x8) ptrace$setopts(0x4206, 0x0, 0x7, 0x0) rt_sigsuspend(&(0x7f0000000180)={[0x5]}, 0x8) wait4(r0, &(0x7f0000000080), 0x4, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) [ 382.692286][T31308] loop5: detected capacity change from 0 to 16 [ 382.714683][ T3976] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 382.746202][ T3976] Buffer I/O error on dev loop5, logical block 0, async page read 01:48:57 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000240), 0x373, 0x20e402) inotify_add_watch(r0, &(0x7f0000000280)='./file0\x00', 0xc40) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async, rerun: 64) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x80000001, 0xcaa, 0x6, 0x560, r1, 0x2, '\x00', 0x0, r2, 0x0, 0x3, 0x5, 0x3}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x9, &(0x7f00000002c0)=ANY=[@ANYBLOB="9500000000000000bd50000000000000a503ec0ebf09000000181400"/44, @ANYRES32=r2, @ANYBLOB="0000000000000000850000001f0000001524f4ff04000000"], &(0x7f0000000340)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000380)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x5, 0x40, 0x400}, 0x10}, 0x80) [ 382.876414][T31308] FAT-fs (loop5): Unrecognized mount option "€" or missing value 01:48:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000002d00)=ANY=[@ANYBLOB="1800d3300200d128639891bde99013d2d7c18dd67c67000000635cb1bd8255ae3c82321891e8eff7b75559eb030f203aa870065c1ba197c687d6989f8c3a3e1da84625509c52d72aca7732cd0bc94208083d10720acb78d4e5ca92c35914230dff8d225d3c07c6b4b92a2d0f98829b66d3cbc5670a48f3aa26e30a0776bd293055e5676df0735e7a1f4f9ac215b3410d0f3591a71d375ee1f23a2a26a327f01bd4a961bc4053bc8ab0afab7fbb30eabce529e14dde0074b656da05eb5bcc9b4044962f7a034e5de5b54d42ad0f8af84591c7e1e7346391488e04aae62e4a7ab3c6f0e64ab0097732e3c80000000000000000a0d28b020093387a35b1c0b997ed00c699190d89db40737adc02bc1ca1242f3f833063f2f42e3fc3d7bdae1a52ff6415874b2cb1cc85c9716912ab6798440bedd7e9bfb98e00"/326], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) recvmmsg$unix(r0, &(0x7f0000002b40)=[{{&(0x7f0000000340)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)}, {&(0x7f0000000440)=""/90, 0x5a}, {&(0x7f00000004c0)=""/119, 0x77}, {&(0x7f0000000540)=""/50, 0x32}, {&(0x7f0000000580)=""/181, 0xb5}, {&(0x7f0000000640)=""/8, 0x8}, {&(0x7f0000000680)=""/56, 0x38}, {&(0x7f00000006c0)=""/230, 0xe6}], 0x9}}, {{&(0x7f0000000880), 0x6e, &(0x7f0000001c00)=[{&(0x7f0000000900)=""/252, 0xfc}, {&(0x7f0000000a00)=""/94, 0x5e}, {&(0x7f0000000a80)=""/10, 0xa}, {&(0x7f0000000ac0)=""/4096, 0x1000}, {&(0x7f0000001ac0)=""/108, 0x6c}, {&(0x7f0000001b40)=""/164, 0xa4}], 0x6, &(0x7f0000001c80)=[@cred={{0x1c}}], 0x20}}, {{0x0, 0x0, &(0x7f0000002140)=[{&(0x7f0000001cc0)=""/209, 0xd1}, {&(0x7f0000001dc0)=""/198, 0xc6}, {&(0x7f0000001ec0)=""/75, 0x4b}, {&(0x7f0000001f40)=""/63, 0x3f}, {&(0x7f0000001f80)=""/9, 0x9}, {&(0x7f0000001fc0)=""/221, 0xdd}, {&(0x7f00000020c0)=""/98, 0x62}], 0x7, &(0x7f00000021c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f0000002240), 0x6e, &(0x7f0000002580)=[{&(0x7f00000022c0)=""/248, 0xf8}, {&(0x7f00000023c0)=""/210, 0xd2}, {&(0x7f00000024c0)=""/26, 0x1a}], 0x3, &(0x7f00000025c0)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}}, {{0x0, 0x0, &(0x7f00000027c0)=[{&(0x7f00000026c0)=""/232, 0xe8}], 0x1, &(0x7f0000002800)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{0x0, 0x0, &(0x7f0000002ac0)=[{&(0x7f0000002840)=""/146, 0x92}, {&(0x7f0000002900)=""/95, 0x5f}, {&(0x7f0000002980)=""/16, 0x10}, {&(0x7f00000029c0)=""/249, 0xf9}], 0x4, &(0x7f0000002b00)=[@cred={{0x1c}}], 0x20}}], 0x6, 0x10162, &(0x7f0000002cc0)={0x0, 0x3938700}) r5 = dup2(r3, r0) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x5, 0xff, 0x7f, 0x1, 0x0, 0x5, 0x22080, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000280), 0x5}, 0x2a4, 0x7, 0xffff, 0x3, 0x8, 0x200, 0x3, 0x0, 0x80, 0x0, 0x5}, r4, 0x8, r5, 0x3) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) sync_file_range(r1, 0x0, 0x9, 0x2) 01:48:57 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r0, &(0x7f0000000300)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000100)=0x80) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x18, 0xb, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0xffffffff}, [@alu={0x7, 0x0, 0xa, 0x4, 0xb, 0xfffffffffffffff4, 0x10}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x4a}, @alu={0x4, 0x0, 0x2, 0x5, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}, @exit, @ldst={0x2, 0x1, 0x0, 0x2, 0x1f, 0xc, 0xffffffffffffffff}, @ldst={0x0, 0x1, 0x1, 0x7, 0xb, 0xffffffffffffffe0, 0xfffffffffffffff0}]}, &(0x7f0000000040)='GPL\x00', 0xfff, 0x87, &(0x7f0000000240)=""/135, 0x41000, 0x1a, '\x00', r1, 0x2, r3, 0x8, &(0x7f0000000380)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x9, 0x8, 0x4}, 0x10, 0xffffffffffffffff, r5}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r7}, 0x10) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:57 executing program 3: rt_sigprocmask(0x1, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000001c0)={0x6, 0x1, {r0}, {}, 0x9, 0x3}) migrate_pages(r1, 0x1, &(0x7f0000000200)=0x5, &(0x7f0000000240)=0x8) ptrace$setopts(0x4206, 0x0, 0x7, 0x0) rt_sigsuspend(&(0x7f0000000180)={[0x5]}, 0x8) wait4(r0, &(0x7f0000000080), 0x4, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) rt_sigprocmask(0x1, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000001c0)={0x6, 0x1, {r0}, {}, 0x9, 0x3}) (async) migrate_pages(r1, 0x1, &(0x7f0000000200)=0x5, &(0x7f0000000240)=0x8) (async) ptrace$setopts(0x4206, 0x0, 0x7, 0x0) (async) rt_sigsuspend(&(0x7f0000000180)={[0x5]}, 0x8) (async) wait4(r0, &(0x7f0000000080), 0x4, &(0x7f00000000c0)) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) (async) 01:48:57 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3edb, &(0x7f0000000280), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f0000000040)=""/18, 0x12}, 0x0) socketpair(0x22, 0x800, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) syz_io_uring_setup(0x3773, &(0x7f00000005c0), &(0x7f0000002000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)) syz_io_uring_setup(0x187, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3}, &(0x7f00006d5000/0x2000)=nil, &(0x7f000021f000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000100)=0x0) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000080)=@IORING_OP_POLL_ADD={0x6, 0x3, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, {0xa304}, 0x0, {0x0, r6}}, 0x4) syz_io_uring_submit(0x0, r2, &(0x7f0000000380)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, &(0x7f00000002c0)=0x80, &(0x7f0000000300)=@can, 0x0, 0x800, 0x0, {0x0, r6}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r5, &(0x7f00000003c0)=@IORING_OP_MADVISE={0x19, 0x5, 0x0, 0x0, 0x0, &(0x7f000021f000/0x4000)=nil, 0x4000, 0xe, 0x1, {0x0, r8}}, 0x8) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x3, 0xf7, 0x8, 0x5, 0x0, 0x8000, 0x10402, 0xa, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x9002, 0x4, 0x9, 0x9, 0x7, 0x5, 0x3, 0x0, 0x5, 0x0, 0x800}, 0x0, 0x10, r0, 0x2) write$cgroup_type(r9, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 383.200879][T31636] loop5: detected capacity change from 0 to 16 01:48:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000002d00)=ANY=[@ANYBLOB="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"/326], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) recvmmsg$unix(r0, &(0x7f0000002b40)=[{{&(0x7f0000000340)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)}, {&(0x7f0000000440)=""/90, 0x5a}, {&(0x7f00000004c0)=""/119, 0x77}, {&(0x7f0000000540)=""/50, 0x32}, {&(0x7f0000000580)=""/181, 0xb5}, {&(0x7f0000000640)=""/8, 0x8}, {&(0x7f0000000680)=""/56, 0x38}, {&(0x7f00000006c0)=""/230, 0xe6}], 0x9}}, {{&(0x7f0000000880), 0x6e, &(0x7f0000001c00)=[{&(0x7f0000000900)=""/252, 0xfc}, {&(0x7f0000000a00)=""/94, 0x5e}, {&(0x7f0000000a80)=""/10, 0xa}, {&(0x7f0000000ac0)=""/4096, 0x1000}, {&(0x7f0000001ac0)=""/108, 0x6c}, {&(0x7f0000001b40)=""/164, 0xa4}], 0x6, &(0x7f0000001c80)=[@cred={{0x1c}}], 0x20}}, {{0x0, 0x0, &(0x7f0000002140)=[{&(0x7f0000001cc0)=""/209, 0xd1}, {&(0x7f0000001dc0)=""/198, 0xc6}, {&(0x7f0000001ec0)=""/75, 0x4b}, {&(0x7f0000001f40)=""/63, 0x3f}, {&(0x7f0000001f80)=""/9, 0x9}, {&(0x7f0000001fc0)=""/221, 0xdd}, {&(0x7f00000020c0)=""/98, 0x62}], 0x7, &(0x7f00000021c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f0000002240), 0x6e, &(0x7f0000002580)=[{&(0x7f00000022c0)=""/248, 0xf8}, {&(0x7f00000023c0)=""/210, 0xd2}, {&(0x7f00000024c0)=""/26, 0x1a}], 0x3, &(0x7f00000025c0)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}}, {{0x0, 0x0, &(0x7f00000027c0)=[{&(0x7f00000026c0)=""/232, 0xe8}], 0x1, &(0x7f0000002800)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{0x0, 0x0, &(0x7f0000002ac0)=[{&(0x7f0000002840)=""/146, 0x92}, {&(0x7f0000002900)=""/95, 0x5f}, {&(0x7f0000002980)=""/16, 0x10}, {&(0x7f00000029c0)=""/249, 0xf9}], 0x4, &(0x7f0000002b00)=[@cred={{0x1c}}], 0x20}}], 0x6, 0x10162, &(0x7f0000002cc0)={0x0, 0x3938700}) (async, rerun: 32) r5 = dup2(r3, r0) (rerun: 32) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x5, 0xff, 0x7f, 0x1, 0x0, 0x5, 0x22080, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000280), 0x5}, 0x2a4, 0x7, 0xffff, 0x3, 0x8, 0x200, 0x3, 0x0, 0x80, 0x0, 0x5}, r4, 0x8, r5, 0x3) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 32) sync_file_range(r1, 0x0, 0x9, 0x2) (rerun: 32) 01:48:58 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r0, &(0x7f0000000300)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000100)=0x80) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x18, 0xb, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0xffffffff}, [@alu={0x7, 0x0, 0xa, 0x4, 0xb, 0xfffffffffffffff4, 0x10}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x4a}, @alu={0x4, 0x0, 0x2, 0x5, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}, @exit, @ldst={0x2, 0x1, 0x0, 0x2, 0x1f, 0xc, 0xffffffffffffffff}, @ldst={0x0, 0x1, 0x1, 0x7, 0xb, 0xffffffffffffffe0, 0xfffffffffffffff0}]}, &(0x7f0000000040)='GPL\x00', 0xfff, 0x87, &(0x7f0000000240)=""/135, 0x41000, 0x1a, '\x00', r1, 0x2, r3, 0x8, &(0x7f0000000380)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x9, 0x8, 0x4}, 0x10, 0xffffffffffffffff, r5}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r7}, 0x10) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) getpeername(r0, &(0x7f0000000300)=@xdp, &(0x7f0000000100)=0x80) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r3, &(0x7f0000004200)='t', 0xfff4) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r5, &(0x7f0000004200)='t', 0xfff4) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x18, 0xb, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0xffffffff}, [@alu={0x7, 0x0, 0xa, 0x4, 0xb, 0xfffffffffffffff4, 0x10}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x4a}, @alu={0x4, 0x0, 0x2, 0x5, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}, @exit, @ldst={0x2, 0x1, 0x0, 0x2, 0x1f, 0xc, 0xffffffffffffffff}, @ldst={0x0, 0x1, 0x1, 0x7, 0xb, 0xffffffffffffffe0, 0xfffffffffffffff0}]}, &(0x7f0000000040)='GPL\x00', 0xfff, 0x87, &(0x7f0000000240)=""/135, 0x41000, 0x1a, '\x00', r1, 0x2, r3, 0x8, &(0x7f0000000380)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x9, 0x8, 0x4}, 0x10, 0xffffffffffffffff, r5}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r7}, 0x10) (async) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 01:48:58 executing program 3: rt_sigprocmask(0x1, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000001c0)={0x6, 0x1, {r0}, {}, 0x9, 0x3}) migrate_pages(r1, 0x1, &(0x7f0000000200)=0x5, &(0x7f0000000240)=0x8) ptrace$setopts(0x4206, 0x0, 0x7, 0x0) rt_sigsuspend(&(0x7f0000000180)={[0x5]}, 0x8) wait4(r0, &(0x7f0000000080), 0x4, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) rt_sigprocmask(0x1, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000001c0)={0x6, 0x1, {r0}, {}, 0x9, 0x3}) (async) migrate_pages(r1, 0x1, &(0x7f0000000200)=0x5, &(0x7f0000000240)=0x8) (async) ptrace$setopts(0x4206, 0x0, 0x7, 0x0) (async) rt_sigsuspend(&(0x7f0000000180)={[0x5]}, 0x8) (async) wait4(r0, &(0x7f0000000080), 0x4, &(0x7f00000000c0)) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) (async) 01:48:58 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) syz_io_uring_setup(0x3edb, &(0x7f0000000280), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f0000000040)=""/18, 0x12}, 0x0) (async) socketpair(0x22, 0x800, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) syz_io_uring_setup(0x3773, &(0x7f00000005c0), &(0x7f0000002000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)) (async) syz_io_uring_setup(0x187, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3}, &(0x7f00006d5000/0x2000)=nil, &(0x7f000021f000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000100)=0x0) (async) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000080)=@IORING_OP_POLL_ADD={0x6, 0x3, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, {0xa304}, 0x0, {0x0, r6}}, 0x4) (async, rerun: 64) syz_io_uring_submit(0x0, r2, &(0x7f0000000380)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, &(0x7f00000002c0)=0x80, &(0x7f0000000300)=@can, 0x0, 0x800, 0x0, {0x0, r6}}, 0x0) (rerun: 64) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r5, &(0x7f00000003c0)=@IORING_OP_MADVISE={0x19, 0x5, 0x0, 0x0, 0x0, &(0x7f000021f000/0x4000)=nil, 0x4000, 0xe, 0x1, {0x0, r8}}, 0x8) (async) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x3, 0xf7, 0x8, 0x5, 0x0, 0x8000, 0x10402, 0xa, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x9002, 0x4, 0x9, 0x9, 0x7, 0x5, 0x3, 0x0, 0x5, 0x0, 0x800}, 0x0, 0x10, r0, 0x2) write$cgroup_type(r9, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 383.541487][ T3976] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:48:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000002d00)=ANY=[@ANYBLOB="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"/326], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) recvmmsg$unix(r0, &(0x7f0000002b40)=[{{&(0x7f0000000340)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)}, {&(0x7f0000000440)=""/90, 0x5a}, {&(0x7f00000004c0)=""/119, 0x77}, {&(0x7f0000000540)=""/50, 0x32}, {&(0x7f0000000580)=""/181, 0xb5}, {&(0x7f0000000640)=""/8, 0x8}, {&(0x7f0000000680)=""/56, 0x38}, {&(0x7f00000006c0)=""/230, 0xe6}], 0x9}}, {{&(0x7f0000000880), 0x6e, &(0x7f0000001c00)=[{&(0x7f0000000900)=""/252, 0xfc}, {&(0x7f0000000a00)=""/94, 0x5e}, {&(0x7f0000000a80)=""/10, 0xa}, {&(0x7f0000000ac0)=""/4096, 0x1000}, {&(0x7f0000001ac0)=""/108, 0x6c}, {&(0x7f0000001b40)=""/164, 0xa4}], 0x6, &(0x7f0000001c80)=[@cred={{0x1c}}], 0x20}}, {{0x0, 0x0, &(0x7f0000002140)=[{&(0x7f0000001cc0)=""/209, 0xd1}, {&(0x7f0000001dc0)=""/198, 0xc6}, {&(0x7f0000001ec0)=""/75, 0x4b}, {&(0x7f0000001f40)=""/63, 0x3f}, {&(0x7f0000001f80)=""/9, 0x9}, {&(0x7f0000001fc0)=""/221, 0xdd}, {&(0x7f00000020c0)=""/98, 0x62}], 0x7, &(0x7f00000021c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f0000002240), 0x6e, &(0x7f0000002580)=[{&(0x7f00000022c0)=""/248, 0xf8}, {&(0x7f00000023c0)=""/210, 0xd2}, {&(0x7f00000024c0)=""/26, 0x1a}], 0x3, &(0x7f00000025c0)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}}, {{0x0, 0x0, &(0x7f00000027c0)=[{&(0x7f00000026c0)=""/232, 0xe8}], 0x1, &(0x7f0000002800)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{0x0, 0x0, &(0x7f0000002ac0)=[{&(0x7f0000002840)=""/146, 0x92}, {&(0x7f0000002900)=""/95, 0x5f}, {&(0x7f0000002980)=""/16, 0x10}, {&(0x7f00000029c0)=""/249, 0xf9}], 0x4, &(0x7f0000002b00)=[@cred={{0x1c}}], 0x20}}], 0x6, 0x10162, &(0x7f0000002cc0)={0x0, 0x3938700}) r5 = dup2(r3, r0) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x5, 0xff, 0x7f, 0x1, 0x0, 0x5, 0x22080, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000280), 0x5}, 0x2a4, 0x7, 0xffff, 0x3, 0x8, 0x200, 0x3, 0x0, 0x80, 0x0, 0x5}, r4, 0x8, r5, 0x3) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) sync_file_range(r1, 0x0, 0x9, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000002d00)=ANY=[@ANYBLOB="1800d3300200d128639891bde99013d2d7c18dd67c67000000635cb1bd8255ae3c82321891e8eff7b75559eb030f203aa870065c1ba197c687d6989f8c3a3e1da84625509c52d72aca7732cd0bc94208083d10720acb78d4e5ca92c35914230dff8d225d3c07c6b4b92a2d0f98829b66d3cbc5670a48f3aa26e30a0776bd293055e5676df0735e7a1f4f9ac215b3410d0f3591a71d375ee1f23a2a26a327f01bd4a961bc4053bc8ab0afab7fbb30eabce529e14dde0074b656da05eb5bcc9b4044962f7a034e5de5b54d42ad0f8af84591c7e1e7346391488e04aae62e4a7ab3c6f0e64ab0097732e3c80000000000000000a0d28b020093387a35b1c0b997ed00c699190d89db40737adc02bc1ca1242f3f833063f2f42e3fc3d7bdae1a52ff6415874b2cb1cc85c9716912ab6798440bedd7e9bfb98e00"/326], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) (async) recvmmsg$unix(r0, &(0x7f0000002b40)=[{{&(0x7f0000000340)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f00000003c0)=""/25, 0x19}, {&(0x7f0000000400)}, {&(0x7f0000000440)=""/90, 0x5a}, {&(0x7f00000004c0)=""/119, 0x77}, {&(0x7f0000000540)=""/50, 0x32}, {&(0x7f0000000580)=""/181, 0xb5}, {&(0x7f0000000640)=""/8, 0x8}, {&(0x7f0000000680)=""/56, 0x38}, {&(0x7f00000006c0)=""/230, 0xe6}], 0x9}}, {{&(0x7f0000000880), 0x6e, &(0x7f0000001c00)=[{&(0x7f0000000900)=""/252, 0xfc}, {&(0x7f0000000a00)=""/94, 0x5e}, {&(0x7f0000000a80)=""/10, 0xa}, {&(0x7f0000000ac0)=""/4096, 0x1000}, {&(0x7f0000001ac0)=""/108, 0x6c}, {&(0x7f0000001b40)=""/164, 0xa4}], 0x6, &(0x7f0000001c80)=[@cred={{0x1c}}], 0x20}}, {{0x0, 0x0, &(0x7f0000002140)=[{&(0x7f0000001cc0)=""/209, 0xd1}, {&(0x7f0000001dc0)=""/198, 0xc6}, {&(0x7f0000001ec0)=""/75, 0x4b}, {&(0x7f0000001f40)=""/63, 0x3f}, {&(0x7f0000001f80)=""/9, 0x9}, {&(0x7f0000001fc0)=""/221, 0xdd}, {&(0x7f00000020c0)=""/98, 0x62}], 0x7, &(0x7f00000021c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f0000002240), 0x6e, &(0x7f0000002580)=[{&(0x7f00000022c0)=""/248, 0xf8}, {&(0x7f00000023c0)=""/210, 0xd2}, {&(0x7f00000024c0)=""/26, 0x1a}], 0x3, &(0x7f00000025c0)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}}, {{0x0, 0x0, &(0x7f00000027c0)=[{&(0x7f00000026c0)=""/232, 0xe8}], 0x1, &(0x7f0000002800)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{0x0, 0x0, &(0x7f0000002ac0)=[{&(0x7f0000002840)=""/146, 0x92}, {&(0x7f0000002900)=""/95, 0x5f}, {&(0x7f0000002980)=""/16, 0x10}, {&(0x7f00000029c0)=""/249, 0xf9}], 0x4, &(0x7f0000002b00)=[@cred={{0x1c}}], 0x20}}], 0x6, 0x10162, &(0x7f0000002cc0)={0x0, 0x3938700}) (async) dup2(r3, r0) (async) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x5, 0xff, 0x7f, 0x1, 0x0, 0x5, 0x22080, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000280), 0x5}, 0x2a4, 0x7, 0xffff, 0x3, 0x8, 0x200, 0x3, 0x0, 0x80, 0x0, 0x5}, r4, 0x8, r5, 0x3) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async) sync_file_range(r1, 0x0, 0x9, 0x2) (async) [ 383.647452][T31853] loop5: detected capacity change from 0 to 16 [ 383.768066][ T25] audit: type=1800 audit(1640483338.375:163): pid=31851 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=1048610 res=0 errno=0 01:48:58 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) syz_io_uring_setup(0x3edb, &(0x7f0000000280), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) (rerun: 32) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f0000000040)=""/18, 0x12}, 0x0) (async) socketpair(0x22, 0x800, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) (async, rerun: 64) syz_io_uring_setup(0x3773, &(0x7f00000005c0), &(0x7f0000002000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)) (async, rerun: 64) syz_io_uring_setup(0x187, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3}, &(0x7f00006d5000/0x2000)=nil, &(0x7f000021f000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000100)=0x0) (async, rerun: 32) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) (rerun: 32) syz_io_uring_submit(r4, r5, &(0x7f0000000080)=@IORING_OP_POLL_ADD={0x6, 0x3, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, {0xa304}, 0x0, {0x0, r6}}, 0x4) (async) syz_io_uring_submit(0x0, r2, &(0x7f0000000380)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, &(0x7f00000002c0)=0x80, &(0x7f0000000300)=@can, 0x0, 0x800, 0x0, {0x0, r6}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r5, &(0x7f00000003c0)=@IORING_OP_MADVISE={0x19, 0x5, 0x0, 0x0, 0x0, &(0x7f000021f000/0x4000)=nil, 0x4000, 0xe, 0x1, {0x0, r8}}, 0x8) (async) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x3, 0xf7, 0x8, 0x5, 0x0, 0x8000, 0x10402, 0xa, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x9002, 0x4, 0x9, 0x9, 0x7, 0x5, 0x3, 0x0, 0x5, 0x0, 0x800}, 0x0, 0x10, r0, 0x2) (async) write$cgroup_type(r9, &(0x7f0000000000), 0x248800) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:48:58 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) signalfd(r0, &(0x7f0000000100)={[0x8]}, 0x8) getpid() r2 = gettid() tkill(r2, 0xb) prctl$PR_SET_PTRACER(0x59616d61, r2) rt_sigtimedwait(&(0x7f0000000080)={[0x7b]}, 0x0, &(0x7f00000000c0)={0x77359400}, 0x8) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() clock_gettime(0x0, &(0x7f0000000200)) rt_sigtimedwait(&(0x7f0000000140)={[0x7]}, &(0x7f0000000180), &(0x7f0000000240), 0x8) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r3, 0x36) 01:48:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x100000000}, 0x0, 0x86}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() tkill(r0, 0xb) r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r2, &(0x7f0000004200)='t', 0xfff4) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x1f, 0x7, 0x0, 0x7, 0x644, 0x9, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f00000003c0), 0x6}, 0x10808, 0xffffffffffffff08, 0x3, 0x1, 0x3, 0x4, 0x9, 0x0, 0xffff, 0x0, 0x9}, r0, 0x7, r2, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="180000002fcf438a979646308a010000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r6 = openat$incfs(r3, &(0x7f0000000340)='.log\x00', 0x400, 0x1d0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000300)='afs_call\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r7, 0x40089413, &(0x7f00000002c0)=0xffffffff) write$cgroup_type(r4, &(0x7f0000000000), 0x248800) mount$fuseblk(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), 0xffc2e329f2b1cfbc, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="266203000000002000fa", @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,blksize=0x0000000000001e00,\x00']) socket$kcm(0x29, 0x7, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:48:59 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r0, &(0x7f0000000300)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000100)=0x80) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x18, 0xb, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0xffffffff}, [@alu={0x7, 0x0, 0xa, 0x4, 0xb, 0xfffffffffffffff4, 0x10}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x4a}, @alu={0x4, 0x0, 0x2, 0x5, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}, @exit, @ldst={0x2, 0x1, 0x0, 0x2, 0x1f, 0xc, 0xffffffffffffffff}, @ldst={0x0, 0x1, 0x1, 0x7, 0xb, 0xffffffffffffffe0, 0xfffffffffffffff0}]}, &(0x7f0000000040)='GPL\x00', 0xfff, 0x87, &(0x7f0000000240)=""/135, 0x41000, 0x1a, '\x00', r1, 0x2, r3, 0x8, &(0x7f0000000380)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x9, 0x8, 0x4}, 0x10, 0xffffffffffffffff, r5}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r7}, 0x10) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) getpeername(r0, &(0x7f0000000300)=@xdp, &(0x7f0000000100)=0x80) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r3, &(0x7f0000004200)='t', 0xfff4) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r5, &(0x7f0000004200)='t', 0xfff4) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x18, 0xb, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0xffffffff}, [@alu={0x7, 0x0, 0xa, 0x4, 0xb, 0xfffffffffffffff4, 0x10}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x4a}, @alu={0x4, 0x0, 0x2, 0x5, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}, @exit, @ldst={0x2, 0x1, 0x0, 0x2, 0x1f, 0xc, 0xffffffffffffffff}, @ldst={0x0, 0x1, 0x1, 0x7, 0xb, 0xffffffffffffffe0, 0xfffffffffffffff0}]}, &(0x7f0000000040)='GPL\x00', 0xfff, 0x87, &(0x7f0000000240)=""/135, 0x41000, 0x1a, '\x00', r1, 0x2, r3, 0x8, &(0x7f0000000380)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x9, 0x8, 0x4}, 0x10, 0xffffffffffffffff, r5}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r7}, 0x10) (async) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 01:48:59 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') (async) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) (async) signalfd(r0, &(0x7f0000000100)={[0x8]}, 0x8) getpid() (async, rerun: 64) r2 = gettid() (rerun: 64) tkill(r2, 0xb) prctl$PR_SET_PTRACER(0x59616d61, r2) (async) rt_sigtimedwait(&(0x7f0000000080)={[0x7b]}, 0x0, &(0x7f00000000c0)={0x77359400}, 0x8) (async, rerun: 32) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async, rerun: 32) r3 = gettid() (async, rerun: 32) clock_gettime(0x0, &(0x7f0000000200)) (rerun: 32) rt_sigtimedwait(&(0x7f0000000140)={[0x7]}, &(0x7f0000000180), &(0x7f0000000240), 0x8) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r3, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r3, 0x36) 01:48:59 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) sendmsg$nl_route(r2, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)=@ipv4_delroute={0xc4, 0x19, 0x100, 0x70bd26, 0x25dfdbfd, {0x2, 0x14, 0x20, 0xff, 0xfc, 0x2, 0xc8, 0x8, 0x800}, [@RTA_ENCAP={0x50, 0x16, 0x0, 0x1, @RPL_IPTUNNEL_SRH={0x4c, 0x1, {0xff, 0x48, 0x1, 0x9, 0xffffffff, [@empty, @private2, @mcast1, @mcast2]}}}, @RTA_OIF={0x8}, @RTA_OIF={0x8}, @RTA_GATEWAY={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x30}}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x5}, @RTA_PREFSRC={0x8, 0x7, @initdev={0xac, 0x1e, 0x1, 0x0}}, @RTA_ENCAP={0x10, 0x16, 0x0, 0x1, @SEG6_LOCAL_BPF={0xc, 0x8, 0x0, 0x1, @SEG6_LOCAL_BPF_PROG_NAME={0x8, 0x2, '\xdc$}\x00'}}}, @RTA_SRC={0x8, 0x2, @multicast1}, @RTA_SRC={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_PREFSRC={0x8, 0x7, @multicast2}]}, 0xc4}, 0x1, 0x0, 0x0, 0x1}, 0x880) r3 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r4 = openat(r3, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r4, &(0x7f0000004200)='t', 0xfff4) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380), 0x9c400, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x0, 0x40, 0x5b8b, 0x0, r4, 0xdf0, '\x00', 0x0, r5, 0x5, 0x0, 0x4, 0xc}, 0x48) r6 = syz_open_dev$sndpcmp(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_FREE(r6, 0x4140, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r7, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 384.789479][T32187] loop5: detected capacity change from 0 to 16 01:48:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x100000000}, 0x0, 0x86}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = gettid() tkill(r0, 0xb) (async) r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r2, &(0x7f0000004200)='t', 0xfff4) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x1f, 0x7, 0x0, 0x7, 0x644, 0x9, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f00000003c0), 0x6}, 0x10808, 0xffffffffffffff08, 0x3, 0x1, 0x3, 0x4, 0x9, 0x0, 0xffff, 0x0, 0x9}, r0, 0x7, r2, 0x1) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="180000002fcf438a979646308a010000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r6 = openat$incfs(r3, &(0x7f0000000340)='.log\x00', 0x400, 0x1d0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000300)='afs_call\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r7, 0x40089413, &(0x7f00000002c0)=0xffffffff) (async) write$cgroup_type(r4, &(0x7f0000000000), 0x248800) (async) mount$fuseblk(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), 0xffc2e329f2b1cfbc, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="266203000000002000fa", @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,blksize=0x0000000000001e00,\x00']) (async) socket$kcm(0x29, 0x7, 0x0) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 384.924735][T32187] FAT-fs (loop5): Unrecognized mount option "€" or missing value 01:48:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x100000000}, 0x0, 0x86}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() tkill(r0, 0xb) r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r2, &(0x7f0000004200)='t', 0xfff4) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x1f, 0x7, 0x0, 0x7, 0x644, 0x9, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f00000003c0), 0x6}, 0x10808, 0xffffffffffffff08, 0x3, 0x1, 0x3, 0x4, 0x9, 0x0, 0xffff, 0x0, 0x9}, r0, 0x7, r2, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="180000002fcf438a979646308a010000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r6 = openat$incfs(r3, &(0x7f0000000340)='.log\x00', 0x400, 0x1d0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000300)='afs_call\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r7, 0x40089413, &(0x7f00000002c0)=0xffffffff) write$cgroup_type(r4, &(0x7f0000000000), 0x248800) mount$fuseblk(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), 0xffc2e329f2b1cfbc, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="266203000000002000fa", @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,blksize=0x0000000000001e00,\x00']) socket$kcm(0x29, 0x7, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x100000000}, 0x0, 0x86}, 0x0, 0xa, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) gettid() (async) tkill(r0, 0xb) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r2, &(0x7f0000004200)='t', 0xfff4) (async) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x1f, 0x7, 0x0, 0x7, 0x644, 0x9, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f00000003c0), 0x6}, 0x10808, 0xffffffffffffff08, 0x3, 0x1, 0x3, 0x4, 0x9, 0x0, 0xffff, 0x0, 0x9}, r0, 0x7, r2, 0x1) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="180000002fcf438a979646308a010000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) openat$incfs(r3, &(0x7f0000000340)='.log\x00', 0x400, 0x1d0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000300)='afs_call\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r5}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r7, 0x40089413, &(0x7f00000002c0)=0xffffffff) (async) write$cgroup_type(r4, &(0x7f0000000000), 0x248800) (async) mount$fuseblk(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), 0xffc2e329f2b1cfbc, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="266203000000002000fa", @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,blksize=0x0000000000001e00,\x00']) (async) socket$kcm(0x29, 0x7, 0x0) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async) 01:48:59 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) (async, rerun: 64) ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) (async, rerun: 64) signalfd(r0, &(0x7f0000000100)={[0x8]}, 0x8) getpid() (async, rerun: 64) r2 = gettid() (rerun: 64) tkill(r2, 0xb) (async) prctl$PR_SET_PTRACER(0x59616d61, r2) (async) rt_sigtimedwait(&(0x7f0000000080)={[0x7b]}, 0x0, &(0x7f00000000c0)={0x77359400}, 0x8) (async, rerun: 64) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async, rerun: 64) r3 = gettid() clock_gettime(0x0, &(0x7f0000000200)) (async) rt_sigtimedwait(&(0x7f0000000140)={[0x7]}, &(0x7f0000000180), &(0x7f0000000240), 0x8) (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r3, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r3, 0x36) 01:48:59 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) sendmsg$nl_route(r2, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)=@ipv4_delroute={0xc4, 0x19, 0x100, 0x70bd26, 0x25dfdbfd, {0x2, 0x14, 0x20, 0xff, 0xfc, 0x2, 0xc8, 0x8, 0x800}, [@RTA_ENCAP={0x50, 0x16, 0x0, 0x1, @RPL_IPTUNNEL_SRH={0x4c, 0x1, {0xff, 0x48, 0x1, 0x9, 0xffffffff, [@empty, @private2, @mcast1, @mcast2]}}}, @RTA_OIF={0x8}, @RTA_OIF={0x8}, @RTA_GATEWAY={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x30}}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x5}, @RTA_PREFSRC={0x8, 0x7, @initdev={0xac, 0x1e, 0x1, 0x0}}, @RTA_ENCAP={0x10, 0x16, 0x0, 0x1, @SEG6_LOCAL_BPF={0xc, 0x8, 0x0, 0x1, @SEG6_LOCAL_BPF_PROG_NAME={0x8, 0x2, '\xdc$}\x00'}}}, @RTA_SRC={0x8, 0x2, @multicast1}, @RTA_SRC={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_PREFSRC={0x8, 0x7, @multicast2}]}, 0xc4}, 0x1, 0x0, 0x0, 0x1}, 0x880) r3 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r4 = openat(r3, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r4, &(0x7f0000004200)='t', 0xfff4) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380), 0x9c400, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x0, 0x40, 0x5b8b, 0x0, r4, 0xdf0, '\x00', 0x0, r5, 0x5, 0x0, 0x4, 0xc}, 0x48) (async) r6 = syz_open_dev$sndpcmp(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_FREE(r6, 0x4140, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r7, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:00 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x40, 0x200) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r0, 0xc00864bf, &(0x7f0000001140)) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0', [{0x20, '&{\'}$s%[*-\x12@$\'\xf8!'}, {0x20, '/-}.]'}, {0x20, '\xb7C'}, {0x20, '(\\.'}, {}, {}, {0x20, '/{![*'}], 0xa, "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"}, 0x1031) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r1, 0x36) ioctl$BINDER_FREEZE(0xffffffffffffffff, 0x400c620e, &(0x7f0000000080)={r1, 0x1, 0x40}) r3 = gettid() tkill(r3, 0xb) perf_event_open(&(0x7f0000001180)={0x3, 0x80, 0xff, 0x7, 0x4, 0x2, 0x0, 0xb36, 0x40, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_config_ext={0xffffffffffffffc0, 0x7}, 0x8000, 0x7, 0x7ff, 0x0, 0x6, 0x9, 0x9, 0x0, 0x7, 0x0, 0x7fffffff}, r3, 0xffffffffffffffff, r2, 0x0) 01:49:00 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) sendmsg$nl_route(r2, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)=@ipv4_delroute={0xc4, 0x19, 0x100, 0x70bd26, 0x25dfdbfd, {0x2, 0x14, 0x20, 0xff, 0xfc, 0x2, 0xc8, 0x8, 0x800}, [@RTA_ENCAP={0x50, 0x16, 0x0, 0x1, @RPL_IPTUNNEL_SRH={0x4c, 0x1, {0xff, 0x48, 0x1, 0x9, 0xffffffff, [@empty, @private2, @mcast1, @mcast2]}}}, @RTA_OIF={0x8}, @RTA_OIF={0x8}, @RTA_GATEWAY={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x30}}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x5}, @RTA_PREFSRC={0x8, 0x7, @initdev={0xac, 0x1e, 0x1, 0x0}}, @RTA_ENCAP={0x10, 0x16, 0x0, 0x1, @SEG6_LOCAL_BPF={0xc, 0x8, 0x0, 0x1, @SEG6_LOCAL_BPF_PROG_NAME={0x8, 0x2, '\xdc$}\x00'}}}, @RTA_SRC={0x8, 0x2, @multicast1}, @RTA_SRC={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_PREFSRC={0x8, 0x7, @multicast2}]}, 0xc4}, 0x1, 0x0, 0x0, 0x1}, 0x880) r3 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r4 = openat(r3, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r4, &(0x7f0000004200)='t', 0xfff4) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380), 0x9c400, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x0, 0x40, 0x5b8b, 0x0, r4, 0xdf0, '\x00', 0x0, r5, 0x5, 0x0, 0x4, 0xc}, 0x48) r6 = syz_open_dev$sndpcmp(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_FREE(r6, 0x4140, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r7, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) (async) sendmsg$nl_route(r2, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)=@ipv4_delroute={0xc4, 0x19, 0x100, 0x70bd26, 0x25dfdbfd, {0x2, 0x14, 0x20, 0xff, 0xfc, 0x2, 0xc8, 0x8, 0x800}, [@RTA_ENCAP={0x50, 0x16, 0x0, 0x1, @RPL_IPTUNNEL_SRH={0x4c, 0x1, {0xff, 0x48, 0x1, 0x9, 0xffffffff, [@empty, @private2, @mcast1, @mcast2]}}}, @RTA_OIF={0x8}, @RTA_OIF={0x8}, @RTA_GATEWAY={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x30}}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x5}, @RTA_PREFSRC={0x8, 0x7, @initdev={0xac, 0x1e, 0x1, 0x0}}, @RTA_ENCAP={0x10, 0x16, 0x0, 0x1, @SEG6_LOCAL_BPF={0xc, 0x8, 0x0, 0x1, @SEG6_LOCAL_BPF_PROG_NAME={0x8, 0x2, '\xdc$}\x00'}}}, @RTA_SRC={0x8, 0x2, @multicast1}, @RTA_SRC={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_PREFSRC={0x8, 0x7, @multicast2}]}, 0xc4}, 0x1, 0x0, 0x0, 0x1}, 0x880) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r3, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r4, &(0x7f0000004200)='t', 0xfff4) (async) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380), 0x9c400, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x0, 0x40, 0x5b8b, 0x0, r4, 0xdf0, '\x00', 0x0, r5, 0x5, 0x0, 0x4, 0xc}, 0x48) (async) syz_open_dev$sndpcmp(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_HW_FREE(r6, 0x4140, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_type(r7, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 01:49:00 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1000, 0x8010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='block_rq_complete\x00', r2}, 0x10) 01:49:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) connect(r0, &(0x7f00000002c0)=@x25, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) dup3(r0, r3, 0x80000) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:49:00 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1000, 0x8010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async, rerun: 64) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='block_rq_complete\x00', r2}, 0x10) (rerun: 64) 01:49:00 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x40, 0x200) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r0, 0xc00864bf, &(0x7f0000001140)) (async) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0', [{0x20, '&{\'}$s%[*-\x12@$\'\xf8!'}, {0x20, '/-}.]'}, {0x20, '\xb7C'}, {0x20, '(\\.'}, {}, {}, {0x20, '/{![*'}], 0xa, "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"}, 0x1031) (async) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r1, 0x0, 0x0) (async) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r1, 0x36) (async) ioctl$BINDER_FREEZE(0xffffffffffffffff, 0x400c620e, &(0x7f0000000080)={r1, 0x1, 0x40}) r3 = gettid() tkill(r3, 0xb) (async) perf_event_open(&(0x7f0000001180)={0x3, 0x80, 0xff, 0x7, 0x4, 0x2, 0x0, 0xb36, 0x40, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_config_ext={0xffffffffffffffc0, 0x7}, 0x8000, 0x7, 0x7ff, 0x0, 0x6, 0x9, 0x9, 0x0, 0x7, 0x0, 0x7fffffff}, r3, 0xffffffffffffffff, r2, 0x0) 01:49:00 executing program 0: r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() tkill(r1, 0xb) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x4, 0x0, 0x0, 0xffffffffffffff84, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x3}, 0x18522, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x508}, r1, 0xffffffffffffffff, r0, 0x2) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f0000000900)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0x6b4, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x0, 0x1f}}}}, [@NL80211_ATTR_FRAME={0x68c, 0x33, @beacon={@wo_ht={{0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1}, {0x7ffd}, @broadcast, @device_b, @random="30cd1f83a8f7", {0x6, 0x7}}, 0x9, @random=0x9, 0x400, @val={0x0, 0x6, @default_ibss_ssid}, @void, @void, @val={0x4, 0x6, {0x7, 0x0, 0x5, 0x1}}, @void, @void, @val={0x25, 0x3, {0x0, 0x95, 0x2}}, @val={0x2a, 0x1}, @void, @void, @void, @void, @val={0x76, 0x6, {0x9, 0x20, 0x16}}, [{0xdd, 0x1b, "52fbf4d666628dc150891915587979e24956ae4a772f046a6a6e65"}, {0xdd, 0x92, "5d7211085a927fd48032ed5b9c8d6128d248503613f6c4d8c8ddd76694a0a7809983152be83fce8ec476c0ebe027990dc0db6248c85bf38676508217a7ee5609809a151ff0bd9054d8e55c542063303dba3473e6f75d4d6b6a2f9eb95a666905ab8ac26184c52c017c003d5b0adc85df40f5e6272d2ec521a9d2ad00142759f85ccacd41cfb7dee4df7b96d17091c8b472de"}, {0xdd, 0x80, "3b26b1b8389b63e6ce50c118aa6de9c98eb2be1c8703680c398b54a517abcb581191b0f64c9e787d01e794a6617b9d17924ef4b0b64a6855b14aeaab0168269158c46a4e99ecc80d5ec5ceda251fa7aae7be333cc004be49ba54b65bd1dc2b5f974f4472746f2c35a99c4fea659c7dab7923ef838d720f1ff8a6871858b828fc"}, {0xdd, 0xb2, "bdce7b8db52ec62fd49b258aec7588e87814810d8aa7a8d4a9b23135e818131234164dc8ec3ac9ef9ca484b0a6ad81381dfdbf28e77976e0e606a329b3bed9632673ee5970afc0e365215ed63240c601d46f94ea01df47da5d2b5e1acc6950db91cab5c784e8e5e897538adab5070f6d72ecf8a295a5df911c8870f7f8183ba9171e02c4c5d2ca712ae7464f10f46d5940f9e1c40ee1f41ef87a0c878fb289e38b3c0bac602b1f60ae57122c295217559198"}, {0xdd, 0xc5, "4e88734a310fa780de15922094e91577b8cc907d5c2f3195d7e74bb9448d007e658f28026909e670c4ea10e62992adc6b7aa3836ac38183e05f7b5fc00c8a554b119558d440600e545dcf299405cfd8df2e6b649c617822be420ef40d272d94981013cfa5e04bc7f886814aea014db7725d4c5b7fbae260b4e7aa0d4849f66dd45b343d1e6fa33fb1edd85a2886b25e99144d352f70efebb32935a9614cf8be6d1d8932cb65871ccf7198fdeabd5288ba95fe05e7356475a9bf7155251b596ee1ef6a6c4f9"}, {0xdd, 0xca, "a88e85bef403a090ecae5f2b32a761b4886c138e73732228f50f85a59dce3ead5e5fd789dfb33c2a77e79fa8badb904cbbb406e3c8971589e50a6055947f405aee73c0283f998dc13a47e53e1772de5f5fc2f40db66559a7406c3e6ea781e36cbb89a08354a773cfce26a7d27052d37422830798e9929ee7520b5050e1779029d0b5ed029a7846a63c45c0b609e11e9334398ca8e3a8b2aed7dc91b7b2eca9daef4e6f892d9a80370e50dc611905aea33dbca5d5b35e5d96cbdb309794270ebd5a92ed1544b0d5107a94"}, {0xdd, 0x4a, "64a5ac1f0e611315988a1d90195c2c0b1f0bbc5d2d512911a184baad01ac2f514044e755df91a360b960cf347d089390a83e5f6dad2c2c9f1aa1d0b80e924a49aa4100b7e0ac827d1deb"}, {0xdd, 0xb0, "9566ce5b5b208eec93877dcde3d1e9d974a60373007e745f34461dcab41b715244cb07d5a7fa9d9645d099901cfe6fcea2b3e06f34476a5ce6ad20e12f33a0cb636daf0e6bf69a08da13107b2b2b71b19626b5f791d7d915ca996419b654c3ec1f21dff7e185fe060f43a396f2ca06b2baa8620ea1e3412647867c3459952eb090f1c5b162fca9c7592192f9206a7a675aeee7e48181c23a07b4162d19e5c63753456bff75738d4ea2ce676024144104"}, {0xdd, 0xdf, "ac6613b4108feddee9058729cf22e2af6f4aea8812a7a16f12257d03466223448d4befdc4d6e239beaea06bce9fb0a330dc0cc4f698e31b73b3085a4fa350441b6b48dda0e82b1cb06f7e784fbe079447ca660de3d8334eea2067c5eda1e8d75cd168eb3e882a85609b3b5aa7c052afe7540f897033edf1c46565e7a52b0b8224e2f42f2b2e89785307e3af415939b4e33a5ddd5ef1adab0c1721be200f7961510c3f463ae974d8732a3213bf75734f4f3a5f037b19ea94da0432e3b6395d9fd70439c3a04e9d7dbb91fd8d566084e27a3688f57024f861f0af693dc14eea7"}, {0xdd, 0xe9, "c1bf9ed51087eca060d7b8d5026fcb503d0a62be5c5c8afde70b6d0ac3983e7498f795e78c61064776209154f35360d636c9a2132a65248f42cde9862cc3cd027e2415bb8b4a22c1fc5a95fe150fed683b3e4cd79bbe1b21f956984b140fe2b1fe89f53f418f14d2fc61d491c92b4f740e20c723c662a116727b22a44fddea28c56e3f5098cc79c09695ba0729ad808974bb0411934adac361b756ab566b425c95d728a79e987c158adc83e6416061ae9df01fde88b227003649875fdc4690345cbe827298f79bdb79e77867c6f1703051e0f735151a6b048cfab09d5ba8f5711a4f6bf7bc7401bcb5"}]}}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_DONT_WAIT_FOR_ACK={0x4}]}, 0x6b4}, 0x1, 0x0, 0x0, 0x3}, 0x41) sendmsg$inet(r3, &(0x7f0000000b40)={&(0x7f0000000940)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b00)=[{&(0x7f0000000980)="717ec6bffc6ff0ced05c7cc5d6dad71806cdcb172c9b8289426af096167f0ec6b50eca24606f95ca58760540a30891310c15fce47d2d3ade21ed0e660a97c35a314c4a993f1b729e257e1e639fa568a8f38228f3837e9f9123d556edfb33ed6cfd8b6da80bee82eff96bb4c08862f57dc8a1e00dfd3f45117772c19f64c31934dbcdf9009ef4916a63972e4e8babed65be2740fa1c5aebf0a3dcd9f092b8dace47b140e6e6216ca9b9f7fed176a778ab15e409e8152cde896ce097209f06916be2e50c225f5d4cd13acaa7040929", 0xce}, {&(0x7f0000000a80)="d703137e1af54388042784630befaf1f2e610d15f18d20a22313cc373aac258b1a1a205551cd7676a9d658415cb44984745d1ba02a284815ecaa0bdadb095c86a3616fbd249b9106e2b7c09947597e38189cf1", 0x53}], 0x2, 0xffffffffffffffff}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:00 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1000, 0x8010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='block_rq_complete\x00', r2}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1000, 0x8010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='block_rq_complete\x00', r2}, 0x10) (async) 01:49:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) connect(r0, &(0x7f00000002c0)=@x25, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) dup3(r0, r3, 0x80000) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:49:01 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x40, 0x200) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r0, 0xc00864bf, &(0x7f0000001140)) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0', [{0x20, '&{\'}$s%[*-\x12@$\'\xf8!'}, {0x20, '/-}.]'}, {0x20, '\xb7C'}, {0x20, '(\\.'}, {}, {}, {0x20, '/{![*'}], 0xa, "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"}, 0x1031) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r1, 0x36) ioctl$BINDER_FREEZE(0xffffffffffffffff, 0x400c620e, &(0x7f0000000080)={r1, 0x1, 0x40}) r3 = gettid() tkill(r3, 0xb) perf_event_open(&(0x7f0000001180)={0x3, 0x80, 0xff, 0x7, 0x4, 0x2, 0x0, 0xb36, 0x40, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_config_ext={0xffffffffffffffc0, 0x7}, 0x8000, 0x7, 0x7ff, 0x0, 0x6, 0x9, 0x9, 0x0, 0x7, 0x0, 0x7fffffff}, r3, 0xffffffffffffffff, r2, 0x0) syz_open_dev$dri(&(0x7f00000000c0), 0x40, 0x200) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r0, 0xc00864bf, &(0x7f0000001140)) (async) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0', [{0x20, '&{\'}$s%[*-\x12@$\'\xf8!'}, {0x20, '/-}.]'}, {0x20, '\xb7C'}, {0x20, '(\\.'}, {}, {}, {0x20, '/{![*'}], 0xa, "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"}, 0x1031) (async) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r1, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r1, 0x36) (async) ioctl$BINDER_FREEZE(0xffffffffffffffff, 0x400c620e, &(0x7f0000000080)={r1, 0x1, 0x40}) (async) gettid() (async) tkill(r3, 0xb) (async) perf_event_open(&(0x7f0000001180)={0x3, 0x80, 0xff, 0x7, 0x4, 0x2, 0x0, 0xb36, 0x40, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_config_ext={0xffffffffffffffc0, 0x7}, 0x8000, 0x7, 0x7ff, 0x0, 0x6, 0x9, 0x9, 0x0, 0x7, 0x0, 0x7fffffff}, r3, 0xffffffffffffffff, r2, 0x0) (async) 01:49:01 executing program 0: r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() tkill(r1, 0xb) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x4, 0x0, 0x0, 0xffffffffffffff84, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x3}, 0x18522, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x508}, r1, 0xffffffffffffffff, r0, 0x2) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f0000000900)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0x6b4, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x0, 0x1f}}}}, [@NL80211_ATTR_FRAME={0x68c, 0x33, @beacon={@wo_ht={{0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1}, {0x7ffd}, @broadcast, @device_b, @random="30cd1f83a8f7", {0x6, 0x7}}, 0x9, @random=0x9, 0x400, @val={0x0, 0x6, @default_ibss_ssid}, @void, @void, @val={0x4, 0x6, {0x7, 0x0, 0x5, 0x1}}, @void, @void, @val={0x25, 0x3, {0x0, 0x95, 0x2}}, @val={0x2a, 0x1}, @void, @void, @void, @void, @val={0x76, 0x6, {0x9, 0x20, 0x16}}, [{0xdd, 0x1b, "52fbf4d666628dc150891915587979e24956ae4a772f046a6a6e65"}, {0xdd, 0x92, "5d7211085a927fd48032ed5b9c8d6128d248503613f6c4d8c8ddd76694a0a7809983152be83fce8ec476c0ebe027990dc0db6248c85bf38676508217a7ee5609809a151ff0bd9054d8e55c542063303dba3473e6f75d4d6b6a2f9eb95a666905ab8ac26184c52c017c003d5b0adc85df40f5e6272d2ec521a9d2ad00142759f85ccacd41cfb7dee4df7b96d17091c8b472de"}, {0xdd, 0x80, "3b26b1b8389b63e6ce50c118aa6de9c98eb2be1c8703680c398b54a517abcb581191b0f64c9e787d01e794a6617b9d17924ef4b0b64a6855b14aeaab0168269158c46a4e99ecc80d5ec5ceda251fa7aae7be333cc004be49ba54b65bd1dc2b5f974f4472746f2c35a99c4fea659c7dab7923ef838d720f1ff8a6871858b828fc"}, {0xdd, 0xb2, "bdce7b8db52ec62fd49b258aec7588e87814810d8aa7a8d4a9b23135e818131234164dc8ec3ac9ef9ca484b0a6ad81381dfdbf28e77976e0e606a329b3bed9632673ee5970afc0e365215ed63240c601d46f94ea01df47da5d2b5e1acc6950db91cab5c784e8e5e897538adab5070f6d72ecf8a295a5df911c8870f7f8183ba9171e02c4c5d2ca712ae7464f10f46d5940f9e1c40ee1f41ef87a0c878fb289e38b3c0bac602b1f60ae57122c295217559198"}, {0xdd, 0xc5, "4e88734a310fa780de15922094e91577b8cc907d5c2f3195d7e74bb9448d007e658f28026909e670c4ea10e62992adc6b7aa3836ac38183e05f7b5fc00c8a554b119558d440600e545dcf299405cfd8df2e6b649c617822be420ef40d272d94981013cfa5e04bc7f886814aea014db7725d4c5b7fbae260b4e7aa0d4849f66dd45b343d1e6fa33fb1edd85a2886b25e99144d352f70efebb32935a9614cf8be6d1d8932cb65871ccf7198fdeabd5288ba95fe05e7356475a9bf7155251b596ee1ef6a6c4f9"}, {0xdd, 0xca, "a88e85bef403a090ecae5f2b32a761b4886c138e73732228f50f85a59dce3ead5e5fd789dfb33c2a77e79fa8badb904cbbb406e3c8971589e50a6055947f405aee73c0283f998dc13a47e53e1772de5f5fc2f40db66559a7406c3e6ea781e36cbb89a08354a773cfce26a7d27052d37422830798e9929ee7520b5050e1779029d0b5ed029a7846a63c45c0b609e11e9334398ca8e3a8b2aed7dc91b7b2eca9daef4e6f892d9a80370e50dc611905aea33dbca5d5b35e5d96cbdb309794270ebd5a92ed1544b0d5107a94"}, {0xdd, 0x4a, "64a5ac1f0e611315988a1d90195c2c0b1f0bbc5d2d512911a184baad01ac2f514044e755df91a360b960cf347d089390a83e5f6dad2c2c9f1aa1d0b80e924a49aa4100b7e0ac827d1deb"}, {0xdd, 0xb0, "9566ce5b5b208eec93877dcde3d1e9d974a60373007e745f34461dcab41b715244cb07d5a7fa9d9645d099901cfe6fcea2b3e06f34476a5ce6ad20e12f33a0cb636daf0e6bf69a08da13107b2b2b71b19626b5f791d7d915ca996419b654c3ec1f21dff7e185fe060f43a396f2ca06b2baa8620ea1e3412647867c3459952eb090f1c5b162fca9c7592192f9206a7a675aeee7e48181c23a07b4162d19e5c63753456bff75738d4ea2ce676024144104"}, {0xdd, 0xdf, "ac6613b4108feddee9058729cf22e2af6f4aea8812a7a16f12257d03466223448d4befdc4d6e239beaea06bce9fb0a330dc0cc4f698e31b73b3085a4fa350441b6b48dda0e82b1cb06f7e784fbe079447ca660de3d8334eea2067c5eda1e8d75cd168eb3e882a85609b3b5aa7c052afe7540f897033edf1c46565e7a52b0b8224e2f42f2b2e89785307e3af415939b4e33a5ddd5ef1adab0c1721be200f7961510c3f463ae974d8732a3213bf75734f4f3a5f037b19ea94da0432e3b6395d9fd70439c3a04e9d7dbb91fd8d566084e27a3688f57024f861f0af693dc14eea7"}, {0xdd, 0xe9, "c1bf9ed51087eca060d7b8d5026fcb503d0a62be5c5c8afde70b6d0ac3983e7498f795e78c61064776209154f35360d636c9a2132a65248f42cde9862cc3cd027e2415bb8b4a22c1fc5a95fe150fed683b3e4cd79bbe1b21f956984b140fe2b1fe89f53f418f14d2fc61d491c92b4f740e20c723c662a116727b22a44fddea28c56e3f5098cc79c09695ba0729ad808974bb0411934adac361b756ab566b425c95d728a79e987c158adc83e6416061ae9df01fde88b227003649875fdc4690345cbe827298f79bdb79e77867c6f1703051e0f735151a6b048cfab09d5ba8f5711a4f6bf7bc7401bcb5"}]}}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_DONT_WAIT_FOR_ACK={0x4}]}, 0x6b4}, 0x1, 0x0, 0x0, 0x3}, 0x41) (async) sendmsg$inet(r3, &(0x7f0000000b40)={&(0x7f0000000940)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b00)=[{&(0x7f0000000980)="717ec6bffc6ff0ced05c7cc5d6dad71806cdcb172c9b8289426af096167f0ec6b50eca24606f95ca58760540a30891310c15fce47d2d3ade21ed0e660a97c35a314c4a993f1b729e257e1e639fa568a8f38228f3837e9f9123d556edfb33ed6cfd8b6da80bee82eff96bb4c08862f57dc8a1e00dfd3f45117772c19f64c31934dbcdf9009ef4916a63972e4e8babed65be2740fa1c5aebf0a3dcd9f092b8dace47b140e6e6216ca9b9f7fed176a778ab15e409e8152cde896ce097209f06916be2e50c225f5d4cd13acaa7040929", 0xce}, {&(0x7f0000000a80)="d703137e1af54388042784630befaf1f2e610d15f18d20a22313cc373aac258b1a1a205551cd7676a9d658415cb44984745d1ba02a284815ecaa0bdadb095c86a3616fbd249b9106e2b7c09947597e38189cf1", 0x53}], 0x2, 0xffffffffffffffff}, 0x0) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (rerun: 64) 01:49:01 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00'}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000240)={r0}, 0x8) r5 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r6 = openat(r5, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r6, &(0x7f0000004200)='t', 0xfff4) recvmsg$unix(r2, &(0x7f0000000400)={&(0x7f0000000280), 0x6e, &(0x7f0000000900)=[{&(0x7f0000000300)=""/78, 0x4e}, {&(0x7f0000000380)=""/73, 0x49}, {&(0x7f0000000480)=""/180, 0xb4}, {&(0x7f0000000540)=""/91, 0x5b}, {&(0x7f00000005c0)=""/209, 0xd1}, {&(0x7f00000006c0)=""/133, 0x85}, {&(0x7f0000000780)=""/102, 0x66}, {&(0x7f0000000800)=""/245, 0xf5}], 0x8, &(0x7f0000000980)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x100) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000a00)={{0x1, 0x1, 0x18, r1, {0x80dc}}, './file0\x00'}) r9 = creat(&(0x7f0000000a40)='./file0\x00', 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000ac0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xa4}, [@jmp={0x5, 0x0, 0xa, 0x7, 0x0, 0x0, 0xfffffffffffffffc}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x4}]}, &(0x7f0000000100)='GPL\x00', 0x100, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0xc, 0x8001, 0x401}, 0x10, 0x1661c, 0xffffffffffffffff, 0x0, &(0x7f0000000a80)=[r3, r4, r6, r7, r8, r9]}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:01 executing program 0: r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = gettid() tkill(r1, 0xb) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x4, 0x0, 0x0, 0xffffffffffffff84, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x3}, 0x18522, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x508}, r1, 0xffffffffffffffff, r0, 0x2) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f0000000900)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0x6b4, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x0, 0x1f}}}}, [@NL80211_ATTR_FRAME={0x68c, 0x33, @beacon={@wo_ht={{0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1}, {0x7ffd}, @broadcast, @device_b, @random="30cd1f83a8f7", {0x6, 0x7}}, 0x9, @random=0x9, 0x400, @val={0x0, 0x6, @default_ibss_ssid}, @void, @void, @val={0x4, 0x6, {0x7, 0x0, 0x5, 0x1}}, @void, @void, @val={0x25, 0x3, {0x0, 0x95, 0x2}}, @val={0x2a, 0x1}, @void, @void, @void, @void, @val={0x76, 0x6, {0x9, 0x20, 0x16}}, [{0xdd, 0x1b, "52fbf4d666628dc150891915587979e24956ae4a772f046a6a6e65"}, {0xdd, 0x92, "5d7211085a927fd48032ed5b9c8d6128d248503613f6c4d8c8ddd76694a0a7809983152be83fce8ec476c0ebe027990dc0db6248c85bf38676508217a7ee5609809a151ff0bd9054d8e55c542063303dba3473e6f75d4d6b6a2f9eb95a666905ab8ac26184c52c017c003d5b0adc85df40f5e6272d2ec521a9d2ad00142759f85ccacd41cfb7dee4df7b96d17091c8b472de"}, {0xdd, 0x80, "3b26b1b8389b63e6ce50c118aa6de9c98eb2be1c8703680c398b54a517abcb581191b0f64c9e787d01e794a6617b9d17924ef4b0b64a6855b14aeaab0168269158c46a4e99ecc80d5ec5ceda251fa7aae7be333cc004be49ba54b65bd1dc2b5f974f4472746f2c35a99c4fea659c7dab7923ef838d720f1ff8a6871858b828fc"}, {0xdd, 0xb2, "bdce7b8db52ec62fd49b258aec7588e87814810d8aa7a8d4a9b23135e818131234164dc8ec3ac9ef9ca484b0a6ad81381dfdbf28e77976e0e606a329b3bed9632673ee5970afc0e365215ed63240c601d46f94ea01df47da5d2b5e1acc6950db91cab5c784e8e5e897538adab5070f6d72ecf8a295a5df911c8870f7f8183ba9171e02c4c5d2ca712ae7464f10f46d5940f9e1c40ee1f41ef87a0c878fb289e38b3c0bac602b1f60ae57122c295217559198"}, {0xdd, 0xc5, "4e88734a310fa780de15922094e91577b8cc907d5c2f3195d7e74bb9448d007e658f28026909e670c4ea10e62992adc6b7aa3836ac38183e05f7b5fc00c8a554b119558d440600e545dcf299405cfd8df2e6b649c617822be420ef40d272d94981013cfa5e04bc7f886814aea014db7725d4c5b7fbae260b4e7aa0d4849f66dd45b343d1e6fa33fb1edd85a2886b25e99144d352f70efebb32935a9614cf8be6d1d8932cb65871ccf7198fdeabd5288ba95fe05e7356475a9bf7155251b596ee1ef6a6c4f9"}, {0xdd, 0xca, "a88e85bef403a090ecae5f2b32a761b4886c138e73732228f50f85a59dce3ead5e5fd789dfb33c2a77e79fa8badb904cbbb406e3c8971589e50a6055947f405aee73c0283f998dc13a47e53e1772de5f5fc2f40db66559a7406c3e6ea781e36cbb89a08354a773cfce26a7d27052d37422830798e9929ee7520b5050e1779029d0b5ed029a7846a63c45c0b609e11e9334398ca8e3a8b2aed7dc91b7b2eca9daef4e6f892d9a80370e50dc611905aea33dbca5d5b35e5d96cbdb309794270ebd5a92ed1544b0d5107a94"}, {0xdd, 0x4a, "64a5ac1f0e611315988a1d90195c2c0b1f0bbc5d2d512911a184baad01ac2f514044e755df91a360b960cf347d089390a83e5f6dad2c2c9f1aa1d0b80e924a49aa4100b7e0ac827d1deb"}, {0xdd, 0xb0, "9566ce5b5b208eec93877dcde3d1e9d974a60373007e745f34461dcab41b715244cb07d5a7fa9d9645d099901cfe6fcea2b3e06f34476a5ce6ad20e12f33a0cb636daf0e6bf69a08da13107b2b2b71b19626b5f791d7d915ca996419b654c3ec1f21dff7e185fe060f43a396f2ca06b2baa8620ea1e3412647867c3459952eb090f1c5b162fca9c7592192f9206a7a675aeee7e48181c23a07b4162d19e5c63753456bff75738d4ea2ce676024144104"}, {0xdd, 0xdf, "ac6613b4108feddee9058729cf22e2af6f4aea8812a7a16f12257d03466223448d4befdc4d6e239beaea06bce9fb0a330dc0cc4f698e31b73b3085a4fa350441b6b48dda0e82b1cb06f7e784fbe079447ca660de3d8334eea2067c5eda1e8d75cd168eb3e882a85609b3b5aa7c052afe7540f897033edf1c46565e7a52b0b8224e2f42f2b2e89785307e3af415939b4e33a5ddd5ef1adab0c1721be200f7961510c3f463ae974d8732a3213bf75734f4f3a5f037b19ea94da0432e3b6395d9fd70439c3a04e9d7dbb91fd8d566084e27a3688f57024f861f0af693dc14eea7"}, {0xdd, 0xe9, "c1bf9ed51087eca060d7b8d5026fcb503d0a62be5c5c8afde70b6d0ac3983e7498f795e78c61064776209154f35360d636c9a2132a65248f42cde9862cc3cd027e2415bb8b4a22c1fc5a95fe150fed683b3e4cd79bbe1b21f956984b140fe2b1fe89f53f418f14d2fc61d491c92b4f740e20c723c662a116727b22a44fddea28c56e3f5098cc79c09695ba0729ad808974bb0411934adac361b756ab566b425c95d728a79e987c158adc83e6416061ae9df01fde88b227003649875fdc4690345cbe827298f79bdb79e77867c6f1703051e0f735151a6b048cfab09d5ba8f5711a4f6bf7bc7401bcb5"}]}}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_DONT_WAIT_FOR_ACK={0x4}]}, 0x6b4}, 0x1, 0x0, 0x0, 0x3}, 0x41) sendmsg$inet(r3, &(0x7f0000000b40)={&(0x7f0000000940)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b00)=[{&(0x7f0000000980)="717ec6bffc6ff0ced05c7cc5d6dad71806cdcb172c9b8289426af096167f0ec6b50eca24606f95ca58760540a30891310c15fce47d2d3ade21ed0e660a97c35a314c4a993f1b729e257e1e639fa568a8f38228f3837e9f9123d556edfb33ed6cfd8b6da80bee82eff96bb4c08862f57dc8a1e00dfd3f45117772c19f64c31934dbcdf9009ef4916a63972e4e8babed65be2740fa1c5aebf0a3dcd9f092b8dace47b140e6e6216ca9b9f7fed176a778ab15e409e8152cde896ce097209f06916be2e50c225f5d4cd13acaa7040929", 0xce}, {&(0x7f0000000a80)="d703137e1af54388042784630befaf1f2e610d15f18d20a22313cc373aac258b1a1a205551cd7676a9d658415cb44984745d1ba02a284815ecaa0bdadb095c86a3616fbd249b9106e2b7c09947597e38189cf1", 0x53}], 0x2, 0xffffffffffffffff}, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:01 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000140)={0x80000000, 0x8000, 0x8, 0x3, 0x1, 0x5, 0x4, 0x47a}, &(0x7f0000000180)={0x81, 0x6, 0x7fff, 0x6, 0x401, 0x3, 0x4, 0x5}, &(0x7f00000001c0)={0x800, 0x2, 0x2, 0x7, 0xc40, 0x5, 0x82d2, 0xffff}, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)={&(0x7f0000000240)={[0x7ff]}, 0x8}) wait4(r0, 0x0, 0x20000000, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) [ 386.657573][ T509] loop5: detected capacity change from 0 to 16 01:49:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) connect(r0, &(0x7f00000002c0)=@x25, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) dup3(r0, r3, 0x80000) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) connect(r0, &(0x7f00000002c0)=@x25, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) (async) dup3(r0, r3, 0x80000) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async) [ 386.718101][ T509] FAT-fs (loop5): Unrecognized mount option "€" or missing value 01:49:01 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00'}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000240)={r0}, 0x8) r5 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r6 = openat(r5, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r6, &(0x7f0000004200)='t', 0xfff4) recvmsg$unix(r2, &(0x7f0000000400)={&(0x7f0000000280), 0x6e, &(0x7f0000000900)=[{&(0x7f0000000300)=""/78, 0x4e}, {&(0x7f0000000380)=""/73, 0x49}, {&(0x7f0000000480)=""/180, 0xb4}, {&(0x7f0000000540)=""/91, 0x5b}, {&(0x7f00000005c0)=""/209, 0xd1}, {&(0x7f00000006c0)=""/133, 0x85}, {&(0x7f0000000780)=""/102, 0x66}, {&(0x7f0000000800)=""/245, 0xf5}], 0x8, &(0x7f0000000980)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x100) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000a00)={{0x1, 0x1, 0x18, r1, {0x80dc}}, './file0\x00'}) r9 = creat(&(0x7f0000000a40)='./file0\x00', 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000ac0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xa4}, [@jmp={0x5, 0x0, 0xa, 0x7, 0x0, 0x0, 0xfffffffffffffffc}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x4}]}, &(0x7f0000000100)='GPL\x00', 0x100, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0xc, 0x8001, 0x401}, 0x10, 0x1661c, 0xffffffffffffffff, 0x0, &(0x7f0000000a80)=[r3, r4, r6, r7, r8, r9]}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00'}, 0x10) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r3, &(0x7f0000004200)='t', 0xfff4) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000240)={r0}, 0x8) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r5, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r6, &(0x7f0000004200)='t', 0xfff4) (async) recvmsg$unix(r2, &(0x7f0000000400)={&(0x7f0000000280), 0x6e, &(0x7f0000000900)=[{&(0x7f0000000300)=""/78, 0x4e}, {&(0x7f0000000380)=""/73, 0x49}, {&(0x7f0000000480)=""/180, 0xb4}, {&(0x7f0000000540)=""/91, 0x5b}, {&(0x7f00000005c0)=""/209, 0xd1}, {&(0x7f00000006c0)=""/133, 0x85}, {&(0x7f0000000780)=""/102, 0x66}, {&(0x7f0000000800)=""/245, 0xf5}], 0x8, &(0x7f0000000980)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x100) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000a00)={{0x1, 0x1, 0x18, r1, {0x80dc}}, './file0\x00'}) (async) creat(&(0x7f0000000a40)='./file0\x00', 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000ac0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xa4}, [@jmp={0x5, 0x0, 0xa, 0x7, 0x0, 0x0, 0xfffffffffffffffc}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x4}]}, &(0x7f0000000100)='GPL\x00', 0x100, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0xc, 0x8001, 0x401}, 0x10, 0x1661c, 0xffffffffffffffff, 0x0, &(0x7f0000000a80)=[r3, r4, r6, r7, r8, r9]}, 0x80) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 01:49:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:01 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000140)={0x80000000, 0x8000, 0x8, 0x3, 0x1, 0x5, 0x4, 0x47a}, &(0x7f0000000180)={0x81, 0x6, 0x7fff, 0x6, 0x401, 0x3, 0x4, 0x5}, &(0x7f00000001c0)={0x800, 0x2, 0x2, 0x7, 0xc40, 0x5, 0x82d2, 0xffff}, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)={&(0x7f0000000240)={[0x7ff]}, 0x8}) wait4(r0, 0x0, 0x20000000, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) pselect6(0x40, &(0x7f0000000140)={0x80000000, 0x8000, 0x8, 0x3, 0x1, 0x5, 0x4, 0x47a}, &(0x7f0000000180)={0x81, 0x6, 0x7fff, 0x6, 0x401, 0x3, 0x4, 0x5}, &(0x7f00000001c0)={0x800, 0x2, 0x2, 0x7, 0xc40, 0x5, 0x82d2, 0xffff}, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)={&(0x7f0000000240)={[0x7ff]}, 0x8}) (async) wait4(r0, 0x0, 0x20000000, &(0x7f0000000080)) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) (async) [ 387.261848][ T659] loop5: detected capacity change from 0 to 16 01:49:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 387.527459][ T596] warn_alloc: 2 callbacks suppressed 01:49:02 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000140)={0x80000000, 0x8000, 0x8, 0x3, 0x1, 0x5, 0x4, 0x47a}, &(0x7f0000000180)={0x81, 0x6, 0x7fff, 0x6, 0x401, 0x3, 0x4, 0x5}, &(0x7f00000001c0)={0x800, 0x2, 0x2, 0x7, 0xc40, 0x5, 0x82d2, 0xffff}, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)={&(0x7f0000000240)={[0x7ff]}, 0x8}) wait4(r0, 0x0, 0x20000000, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) [ 387.527477][ T596] syz-executor.5: vmalloc error: size 12288, page order 0, failed to allocate pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz5,mems_allowed=0-1 [ 387.680358][ T596] CPU: 0 PID: 596 Comm: syz-executor.5 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 [ 387.690285][ T596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 387.700345][ T596] Call Trace: [ 387.703625][ T596] [ 387.706567][ T596] dump_stack_lvl+0xcd/0x134 [ 387.711183][ T596] warn_alloc.cold+0x87/0x17a [ 387.715892][ T596] ? zone_watermark_ok_safe+0x290/0x290 [ 387.721453][ T596] ? find_held_lock+0x2d/0x110 [ 387.726242][ T596] ? lock_downgrade+0x6e0/0x6e0 [ 387.731118][ T596] ? __vmalloc_node_range+0x6b0/0xf80 [ 387.736498][ T596] __vmalloc_node_range+0xd01/0xf80 [ 387.741719][ T596] ? vfree_atomic+0xe0/0xe0 [ 387.746236][ T596] ? rcu_read_lock_sched_held+0x3a/0x70 [ 387.751791][ T596] ? kernel_clone+0xe7/0xab0 [ 387.756396][ T596] copy_process+0x926/0x7490 [ 387.760992][ T596] ? kernel_clone+0xe7/0xab0 [ 387.765584][ T596] ? lock_chain_count+0x20/0x20 [ 387.770441][ T596] ? lock_chain_count+0x20/0x20 [ 387.775310][ T596] ? __cleanup_sighand+0xb0/0xb0 [ 387.780248][ T596] ? lock_downgrade+0x6e0/0x6e0 [ 387.785112][ T596] ? __lock_acquire+0x1655/0x5470 [ 387.790147][ T596] ? kernel_clone+0x314/0xab0 [ 387.794831][ T596] kernel_clone+0xe7/0xab0 [ 387.799254][ T596] ? copy_init_mm+0x20/0x20 [ 387.803760][ T596] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 387.809748][ T596] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 387.815748][ T596] ? find_held_lock+0x2d/0x110 [ 387.820519][ T596] __do_sys_clone+0xc1/0x100 [ 387.825113][ T596] ? kernel_clone+0xab0/0xab0 [ 387.829789][ T596] ? lock_downgrade+0x6e0/0x6e0 [ 387.834666][ T596] ? syscall_enter_from_user_mode+0x21/0x70 [ 387.840572][ T596] do_syscall_64+0x35/0xb0 [ 387.844987][ T596] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 387.850896][ T596] RIP: 0033:0x7f6238b7c2c1 [ 387.855307][ T596] Code: 48 85 ff 74 3d 48 85 f6 74 38 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 7c 13 74 01 c3 31 ed 58 5f ff d0 48 89 c7 b8 3c 00 00 00 [ 387.874914][ T596] RSP: 002b:00007ffd1c9c2938 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 387.883327][ T596] RAX: ffffffffffffffda RBX: 00007f623729e700 RCX: 00007f6238b7c2c1 [ 387.891294][ T596] RDX: 00007f623729e9d0 RSI: 00007f623729e2f0 RDI: 00000000003d0f00 [ 387.899259][ T596] RBP: 00007ffd1c9c2b80 R08: 00007f623729e700 R09: 00007f623729e700 [ 387.907225][ T596] R10: 00007f623729e9d0 R11: 0000000000000206 R12: 00007ffd1c9c29ee [ 387.915193][ T596] R13: 00007ffd1c9c29ef R14: 00007f623729e300 R15: 0000000000022000 [ 387.923181][ T596] 01:49:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x10000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 387.981665][ T596] Mem-Info: [ 387.985199][ T596] active_anon:520 inactive_anon:242094 isolated_anon:0 [ 387.985199][ T596] active_file:4769 inactive_file:8085 isolated_file:0 [ 387.985199][ T596] unevictable:768 dirty:20 writeback:0 [ 387.985199][ T596] slab_reclaimable:16193 slab_unreclaimable:97689 [ 387.985199][ T596] mapped:33732 shmem:7990 pagetables:1814 bounce:0 [ 387.985199][ T596] kernel_misc_reclaimable:0 [ 387.985199][ T596] free:1230436 free_pcp:11130 free_cma:0 [ 388.031259][ T596] Node 0 active_anon:2072kB inactive_anon:967444kB active_file:19000kB inactive_file:32340kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:134928kB dirty:76kB writeback:0kB shmem:29484kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 786432kB writeback_tmp:0kB kernel_stack:13156kB pagetables:7252kB all_unreclaimable? no 01:49:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(r0, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r1, &(0x7f0000004200)='t', 0xfff4) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x81, 0x1, 0x9, 0x0, 0x22, 0x80000, 0xc, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x10400, 0x8, 0x4, 0x4, 0x2, 0xfffffffe, 0x7, 0x0, 0x9, 0x0, 0x54f2}, 0xffffffffffffffff, 0xc, r1, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) open(&(0x7f0000000080)='./file0\x00', 0x20000, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 388.075396][ T596] Node 1 active_anon:8kB inactive_anon:932kB active_file:76kB inactive_file:0kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:2476kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:4kB all_unreclaimable? no [ 388.106311][ T596] Node 0 DMA free:15360kB boost:0kB min:200kB low:248kB high:296kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 388.153946][ T596] lowmem_reserve[]: 0 2645 2645 2645 2645 [ 388.166950][ T596] Node 0 DMA32 free:955640kB boost:0kB min:35676kB low:44592kB high:53508kB reserved_highatomic:0KB active_anon:2072kB inactive_anon:967520kB active_file:19000kB inactive_file:32340kB unevictable:1536kB writepending:76kB present:3129332kB managed:2716620kB mlocked:0kB bounce:0kB free_pcp:43188kB local_pcp:21952kB free_cma:0kB 01:49:02 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) r2 = fcntl$dupfd(r1, 0x406, r1) epoll_pwait2(r2, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000140), 0x8) [ 388.222112][ T596] lowmem_reserve[]: 0 0 0 0 0 [ 388.226978][ T596] Node 0 Normal free:0kB boost:0kB min:4kB low:4kB high:4kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:400kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 388.270034][ T596] lowmem_reserve[]: 0 0 0 0 0 [ 388.274927][ T596] Node 1 Normal free:3951168kB boost:0kB min:54224kB low:67780kB high:81336kB reserved_highatomic:0KB active_anon:8kB inactive_anon:932kB active_file:76kB inactive_file:0kB unevictable:1536kB writepending:4kB present:4194304kB managed:4117620kB mlocked:0kB bounce:0kB free_pcp:828kB local_pcp:0kB free_cma:0kB [ 388.322736][ T596] lowmem_reserve[]: 0 0 0 0 0 [ 388.333644][ T596] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB 01:49:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x10000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async, rerun: 32) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (rerun: 32) [ 388.355139][ T596] Node 0 DMA32: 4383*4kB (UME) 1828*8kB (UME) 1555*16kB (UME) 304*32kB (UME) 376*64kB (UME) 137*128kB (UME) 17*256kB (UME) 9*512kB (UME) 3*1024kB (M) 3*2048kB (ME) 203*4096kB (UM) = 958028kB [ 388.398747][ T596] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 388.442829][ T596] Node 1 Normal: 124*4kB (UME) 24*8kB (UME) 23*16kB (UME) 159*32kB (UME) 67*64kB (UME) 23*128kB (UE) 8*256kB (U) 7*512kB (UE) 2*1024kB (UE) 3*2048kB (UM) 958*4096kB (M) = 3951168kB [ 388.465781][ T596] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 388.475815][ T596] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 388.485589][ T596] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 388.495624][ T596] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 388.505396][ T596] 20482 total pagecache pages [ 388.510523][ T596] 0 pages in swap cache [ 388.515299][ T596] Swap cache stats: add 0, delete 0, find 0/0 [ 388.522103][ T596] Free swap = 0kB [ 388.526019][ T596] Total swap = 0kB [ 388.530421][ T596] 2097051 pages RAM [ 388.534423][ T596] 0 pages HighMem/MovableOnly 01:49:03 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) (async) r2 = fcntl$dupfd(r1, 0x406, r1) epoll_pwait2(r2, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000140), 0x8) 01:49:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(r0, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r1, &(0x7f0000004200)='t', 0xfff4) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x81, 0x1, 0x9, 0x0, 0x22, 0x80000, 0xc, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x10400, 0x8, 0x4, 0x4, 0x2, 0xfffffffe, 0x7, 0x0, 0x9, 0x0, 0x54f2}, 0xffffffffffffffff, 0xc, r1, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) open(&(0x7f0000000080)='./file0\x00', 0x20000, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 388.540227][ T596] 384551 pages reserved [ 388.556044][ T596] 0 pages cma reserved 01:49:03 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00'}, 0x10) (rerun: 32) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async, rerun: 32) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (rerun: 32) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) (async, rerun: 64) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000240)={r0}, 0x8) (async, rerun: 64) r5 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r6 = openat(r5, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r6, &(0x7f0000004200)='t', 0xfff4) recvmsg$unix(r2, &(0x7f0000000400)={&(0x7f0000000280), 0x6e, &(0x7f0000000900)=[{&(0x7f0000000300)=""/78, 0x4e}, {&(0x7f0000000380)=""/73, 0x49}, {&(0x7f0000000480)=""/180, 0xb4}, {&(0x7f0000000540)=""/91, 0x5b}, {&(0x7f00000005c0)=""/209, 0xd1}, {&(0x7f00000006c0)=""/133, 0x85}, {&(0x7f0000000780)=""/102, 0x66}, {&(0x7f0000000800)=""/245, 0xf5}], 0x8, &(0x7f0000000980)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x100) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000a00)={{0x1, 0x1, 0x18, r1, {0x80dc}}, './file0\x00'}) (async, rerun: 32) r9 = creat(&(0x7f0000000a40)='./file0\x00', 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000ac0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xa4}, [@jmp={0x5, 0x0, 0xa, 0x7, 0x0, 0x0, 0xfffffffffffffffc}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x4}]}, &(0x7f0000000100)='GPL\x00', 0x100, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0xc, 0x8001, 0x401}, 0x10, 0x1661c, 0xffffffffffffffff, 0x0, &(0x7f0000000a80)=[r3, r4, r6, r7, r8, r9]}, 0x80) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x10000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x10000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async) 01:49:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(r0, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r1, &(0x7f0000004200)='t', 0xfff4) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x81, 0x1, 0x9, 0x0, 0x22, 0x80000, 0xc, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x10400, 0x8, 0x4, 0x4, 0x2, 0xfffffffe, 0x7, 0x0, 0x9, 0x0, 0x54f2}, 0xffffffffffffffff, 0xc, r1, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) open(&(0x7f0000000080)='./file0\x00', 0x20000, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r0, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r1, &(0x7f0000004200)='t', 0xfff4) (async) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x81, 0x1, 0x9, 0x0, 0x22, 0x80000, 0xc, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x10400, 0x8, 0x4, 0x4, 0x2, 0xfffffffe, 0x7, 0x0, 0x9, 0x0, 0x54f2}, 0xffffffffffffffff, 0xc, r1, 0x2) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) open(&(0x7f0000000080)='./file0\x00', 0x20000, 0x2) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 01:49:03 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) (async) r2 = fcntl$dupfd(r1, 0x406, r1) epoll_pwait2(r2, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000140), 0x8) [ 388.731003][ T1272] loop5: detected capacity change from 0 to 16 [ 388.758809][ T1272] FAT-fs (loop5): Unrecognized mount option "€" or missing value 01:49:03 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_USERNS(r4, 0xb701, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f00000001c0)) lseek(r5, 0x7, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:03 executing program 3: rt_sigprocmask(0x0, &(0x7f00000000c0)={[0x2000000fffbfff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = gettid() tkill(r1, 0xb) rt_sigqueueinfo(r1, 0x35, &(0x7f0000000100)={0x10, 0x8d4, 0x1}) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) ptrace$cont(0x18, r2, 0xffffffffffffff80, 0x10001) ptrace$setopts(0x4206, r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) 01:49:03 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x20}, 0x20}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newqdisc={0x44, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0x14, 0x2, [@TCA_DSMARK_DEFAULT_INDEX={0x6}, @TCA_DSMARK_INDICES={0x6, 0x1, 0x8}]}}]}, 0x44}}, 0x0) r7 = signalfd4(r0, &(0x7f0000000380)={[0x44]}, 0x8, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000440)={r1, 0x100, 0x6, 0x400}) r9 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r10 = openat(r9, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r10, &(0x7f0000004200)='t', 0xfff4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000080)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0xa, 0x1, 0x0, r1}], &(0x7f0000000300)='syzkaller\x00', 0x4, 0x3b, &(0x7f0000000340)=""/59, 0x40f00, 0x2, '\x00', r6, 0x1b, r7, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xa, 0x0, 0x8000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r8, r1, r10]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='kvm_age_page\x00', r2}, 0x5) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 01:49:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:03 executing program 3: rt_sigprocmask(0x0, &(0x7f00000000c0)={[0x2000000fffbfff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = gettid() tkill(r1, 0xb) rt_sigqueueinfo(r1, 0x35, &(0x7f0000000100)={0x10, 0x8d4, 0x1}) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) ptrace$cont(0x18, r2, 0xffffffffffffff80, 0x10001) ptrace$setopts(0x4206, r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) rt_sigprocmask(0x0, &(0x7f00000000c0)={[0x2000000fffbfff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) gettid() (async) tkill(r1, 0xb) (async) rt_sigqueueinfo(r1, 0x35, &(0x7f0000000100)={0x10, 0x8d4, 0x1}) (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) (async) ptrace$cont(0x18, r2, 0xffffffffffffff80, 0x10001) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) (async) [ 389.227082][ T1563] loop5: detected capacity change from 0 to 16 [ 389.253282][ T1560] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 01:49:03 executing program 3: rt_sigprocmask(0x0, &(0x7f00000000c0)={[0x2000000fffbfff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = gettid() tkill(r1, 0xb) rt_sigqueueinfo(r1, 0x35, &(0x7f0000000100)={0x10, 0x8d4, 0x1}) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) ptrace$cont(0x18, r2, 0xffffffffffffff80, 0x10001) ptrace$setopts(0x4206, r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) rt_sigprocmask(0x0, &(0x7f00000000c0)={[0x2000000fffbfff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) gettid() (async) tkill(r1, 0xb) (async) rt_sigqueueinfo(r1, 0x35, &(0x7f0000000100)={0x10, 0x8d4, 0x1}) (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) (async) ptrace$cont(0x18, r2, 0xffffffffffffff80, 0x10001) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) (async) [ 389.294518][ T1563] FAT-fs (loop5): Unrecognized mount option "€" or missing value 01:49:04 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) r0 = gettid() tkill(r0, 0xb) r1 = clone3(&(0x7f00000003c0)={0x4260200, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x6}, &(0x7f0000000240)=""/56, 0x38, &(0x7f0000000280)=""/226, &(0x7f0000000380)=[r0, r0, r0, r0], 0x4}, 0x58) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) gettid() rt_sigtimedwait(&(0x7f0000000080)={[0x1]}, &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x3938700}, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r2, 0x25) 01:49:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:04 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_USERNS(r4, 0xb701, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f00000001c0)) lseek(r5, 0x7, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r3, &(0x7f0000004200)='t', 0xfff4) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') (async) ioctl$NS_GET_USERNS(r4, 0xb701, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) (async) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f00000001c0)) (async) lseek(r5, 0x7, 0x1) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 01:49:04 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) (async) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x20}, 0x20}}, 0x0) (async) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newqdisc={0x44, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0x14, 0x2, [@TCA_DSMARK_DEFAULT_INDEX={0x6}, @TCA_DSMARK_INDICES={0x6, 0x1, 0x8}]}}]}, 0x44}}, 0x0) (async) r7 = signalfd4(r0, &(0x7f0000000380)={[0x44]}, 0x8, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000440)={r1, 0x100, 0x6, 0x400}) (async) r9 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r10 = openat(r9, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r10, &(0x7f0000004200)='t', 0xfff4) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000080)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0xa, 0x1, 0x0, r1}], &(0x7f0000000300)='syzkaller\x00', 0x4, 0x3b, &(0x7f0000000340)=""/59, 0x40f00, 0x2, '\x00', r6, 0x1b, r7, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xa, 0x0, 0x8000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r8, r1, r10]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='kvm_age_page\x00', r2}, 0x5) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 01:49:04 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) r0 = gettid() tkill(r0, 0xb) r1 = clone3(&(0x7f00000003c0)={0x4260200, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x6}, &(0x7f0000000240)=""/56, 0x38, &(0x7f0000000280)=""/226, &(0x7f0000000380)=[r0, r0, r0, r0], 0x4}, 0x58) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) gettid() rt_sigtimedwait(&(0x7f0000000080)={[0x1]}, &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x3938700}, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r2, 0x25) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) gettid() (async) tkill(r0, 0xb) (async) clone3(&(0x7f00000003c0)={0x4260200, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x6}, &(0x7f0000000240)=""/56, 0x38, &(0x7f0000000280)=""/226, &(0x7f0000000380)=[r0, r0, r0, r0], 0x4}, 0x58) (async) prctl$PR_SET_PTRACER(0x59616d61, r1) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) gettid() (async) rt_sigtimedwait(&(0x7f0000000080)={[0x1]}, &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x3938700}, 0x8) (async) ptrace$setopts(0x4206, r2, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r2, 0x25) (async) 01:49:04 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_USERNS(r4, 0xb701, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f00000001c0)) lseek(r5, 0x7, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x100000000}, 0x0, 0x86}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() tkill(r0, 0xb) r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r2, &(0x7f0000004200)='t', 0xfff4) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x1f, 0x7, 0x0, 0x7, 0x644, 0x9, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f00000003c0), 0x6}, 0x10808, 0xffffffffffffff08, 0x3, 0x1, 0x3, 0x4, 0x9, 0x0, 0xffff, 0x0, 0x9}, r0, 0x7, r2, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="180000002fcf438a979646308a010000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r6 = openat$incfs(r3, &(0x7f0000000340)='.log\x00', 0x400, 0x1d0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000300)='afs_call\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r7, 0x40089413, &(0x7f00000002c0)=0xffffffff) write$cgroup_type(r4, &(0x7f0000000000), 0x248800) mount$fuseblk(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), 0xffc2e329f2b1cfbc, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="266203000000002000fa", @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,blksize=0x0000000000001e00,\x00']) socket$kcm(0x29, 0x7, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 389.911104][ T1679] loop5: detected capacity change from 0 to 16 01:49:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) [ 389.992274][ T1679] FAT-fs (loop5): Unrecognized mount option "€" or missing value [ 390.056807][ T1681] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 01:49:05 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) (async) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_USERNS(r4, 0xb701, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) (async) r5 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f00000001c0)) lseek(r5, 0x7, 0x1) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:05 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) r0 = gettid() tkill(r0, 0xb) r1 = clone3(&(0x7f00000003c0)={0x4260200, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x6}, &(0x7f0000000240)=""/56, 0x38, &(0x7f0000000280)=""/226, &(0x7f0000000380)=[r0, r0, r0, r0], 0x4}, 0x58) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) gettid() rt_sigtimedwait(&(0x7f0000000080)={[0x1]}, &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x3938700}, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r2, 0x25) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) gettid() (async) tkill(r0, 0xb) (async) clone3(&(0x7f00000003c0)={0x4260200, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x6}, &(0x7f0000000240)=""/56, 0x38, &(0x7f0000000280)=""/226, &(0x7f0000000380)=[r0, r0, r0, r0], 0x4}, 0x58) (async) prctl$PR_SET_PTRACER(0x59616d61, r1) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) gettid() (async) rt_sigtimedwait(&(0x7f0000000080)={[0x1]}, &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x3938700}, 0x8) (async) ptrace$setopts(0x4206, r2, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r2, 0x25) (async) 01:49:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x24887b) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:49:05 executing program 4: stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f0000000040), &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x10002, &(0x7f0000000400)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@timeout={'timeout', 0x3d, 0xc120}}, {@rq={'rq', 0x3d, 0x3}}, {@common=@dfltuid={'dfltuid', 0x3d, r0}}, {@sq={'sq', 0x3d, 0x80}}, {@sq={'sq', 0x3d, 0x8e8c}}, {@common=@noextend}, {@common=@noextend}, {@rq={'rq', 0x3d, 0xfa}}], [{@obj_type={'obj_type', 0x3d, '-'}}, {@fsname}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@pcr={'pcr', 0x3d, 0xb}}]}}) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x48000, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x180, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 391.135463][ T1931] loop5: detected capacity change from 0 to 16 01:49:05 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x20}, 0x20}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newqdisc={0x44, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0x14, 0x2, [@TCA_DSMARK_DEFAULT_INDEX={0x6}, @TCA_DSMARK_INDICES={0x6, 0x1, 0x8}]}}]}, 0x44}}, 0x0) r7 = signalfd4(r0, &(0x7f0000000380)={[0x44]}, 0x8, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000440)={r1, 0x100, 0x6, 0x400}) r9 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r10 = openat(r9, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r10, &(0x7f0000004200)='t', 0xfff4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000080)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0xa, 0x1, 0x0, r1}], &(0x7f0000000300)='syzkaller\x00', 0x4, 0x3b, &(0x7f0000000340)=""/59, 0x40f00, 0x2, '\x00', r6, 0x1b, r7, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xa, 0x0, 0x8000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r8, r1, r10]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='kvm_age_page\x00', r2}, 0x5) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x10, 0x803, 0x0) (async) socket(0x10, 0x3, 0x0) (async) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x20}, 0x20}}, 0x0) (async) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) (async) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newqdisc={0x44, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0x14, 0x2, [@TCA_DSMARK_DEFAULT_INDEX={0x6}, @TCA_DSMARK_INDICES={0x6, 0x1, 0x8}]}}]}, 0x44}}, 0x0) (async) signalfd4(r0, &(0x7f0000000380)={[0x44]}, 0x8, 0x0) (async) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000440)={r1, 0x100, 0x6, 0x400}) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r9, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r10, &(0x7f0000004200)='t', 0xfff4) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000080)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0xa, 0x1, 0x0, r1}], &(0x7f0000000300)='syzkaller\x00', 0x4, 0x3b, &(0x7f0000000340)=""/59, 0x40f00, 0x2, '\x00', r6, 0x1b, r7, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xa, 0x0, 0x8000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r8, r1, r10]}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='kvm_age_page\x00', r2}, 0x5) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) 01:49:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4009, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x4, 0x80, 0x0, 0x10, 0x0, 0x0, 0x0, 0x100000000001000, 0x52027, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248879) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 391.346395][ T1931] FAT-fs (loop5): Unrecognized mount option "€" or missing value 01:49:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248878) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:49:06 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100), 0x4000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='xen_mmu_flush_tlb_one_user\x00', r2}, 0x10) [ 391.463646][ T2037] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 01:49:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4009, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async, rerun: 32) perf_event_open(&(0x7f0000002500)={0x4, 0x80, 0x0, 0x10, 0x0, 0x0, 0x0, 0x100000000001000, 0x52027, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async, rerun: 32) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x24881d) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:49:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x24880e) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:49:06 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100), 0x4000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='xen_mmu_flush_tlb_one_user\x00', r2}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100), 0x4000, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='xen_mmu_flush_tlb_one_user\x00', r2}, 0x10) (async) 01:49:06 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100), 0x4000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='xen_mmu_flush_tlb_one_user\x00', r2}, 0x10) 01:49:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4009, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x4, 0x80, 0x0, 0x10, 0x0, 0x0, 0x0, 0x100000000001000, 0x52027, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x24880e) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:49:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000401100000000000000958255ae3c82321891e800000000000000000000007178dd7c05aba1cc185efec2069ac435df4a09854859844acaa19f04de1d67ebf9303bdc57f0cbe292f5ef85aae67caa7e0172845260ac8e15316aaf424c27e6516112c87b0d3b740e"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:49:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 01:49:07 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (fail_nth: 1) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) write$cgroup_int(r2, &(0x7f0000000440), 0x12) 01:49:07 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100), 0x4000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='xen_mmu_flush_tlb_one_user\x00', r2}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100), 0x4000, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='xen_mmu_flush_tlb_one_user\x00', r2}, 0x10) (async) [ 393.226581][ T2233] FAULT_INJECTION: forcing a failure. [ 393.226581][ T2233] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 393.309884][ T2232] FAULT_INJECTION: forcing a failure. [ 393.309884][ T2232] name failslab, interval 1, probability 0, space 0, times 0 [ 393.316757][ T2233] CPU: 0 PID: 2233 Comm: syz-executor.4 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 [ 393.334732][ T2233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 393.344992][ T2233] Call Trace: [ 393.348292][ T2233] [ 393.351329][ T2233] dump_stack_lvl+0xcd/0x134 [ 393.355967][ T2233] should_fail.cold+0x5/0xa [ 393.360507][ T2233] _copy_from_user+0x2c/0x180 [ 393.365217][ T2233] __sys_bpf+0x319/0x5970 [ 393.369628][ T2233] ? bpf_link_get_from_fd+0x110/0x110 [ 393.375042][ T2233] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 393.381075][ T2233] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 393.387100][ T2233] ? find_held_lock+0x2d/0x110 [ 393.391916][ T2233] ? trace_hardirqs_on+0x38/0x1c0 [ 393.396968][ T2233] __x64_sys_bpf+0x75/0xb0 [ 393.401406][ T2233] ? syscall_enter_from_user_mode+0x21/0x70 [ 393.407328][ T2233] do_syscall_64+0x35/0xb0 [ 393.411769][ T2233] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 393.417692][ T2233] RIP: 0033:0x7f56a7d02e99 [ 393.422129][ T2233] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 393.441924][ T2233] RSP: 002b:00007f56a6678168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 393.450360][ T2233] RAX: ffffffffffffffda RBX: 00007f56a7e15f60 RCX: 00007f56a7d02e99 [ 393.458343][ T2233] RDX: 0000000000000080 RSI: 0000000020000200 RDI: 0000000000000005 [ 393.466326][ T2233] RBP: 00007f56a66781d0 R08: 0000000000000000 R09: 0000000000000000 [ 393.474303][ T2233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 393.482283][ T2233] R13: 00007ffccd37371f R14: 00007f56a6678300 R15: 0000000000022000 [ 393.490279][ T2233] [ 393.493301][ T2232] CPU: 1 PID: 2232 Comm: syz-executor.1 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 [ 393.503218][ T2232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 393.513279][ T2232] Call Trace: [ 393.516559][ T2232] [ 393.519489][ T2232] dump_stack_lvl+0xcd/0x134 [ 393.524096][ T2232] should_fail.cold+0x5/0xa [ 393.528607][ T2232] ? jbd2__journal_start+0x191/0x930 [ 393.533906][ T2232] should_failslab+0x5/0x10 [ 393.538427][ T2232] kmem_cache_alloc+0x5e/0x3a0 [ 393.543230][ T2232] jbd2__journal_start+0x191/0x930 [ 393.548358][ T2232] ? ext4_dirty_inode+0x9d/0x110 [ 393.553294][ T2232] __ext4_journal_start_sb+0x227/0x4a0 [ 393.558772][ T2232] ? ext4_setattr+0x21a0/0x21a0 [ 393.563624][ T2232] ext4_dirty_inode+0x9d/0x110 [ 393.568394][ T2232] __mark_inode_dirty+0x45b/0xfe0 [ 393.573434][ T2232] generic_update_time+0x21d/0x350 [ 393.578551][ T2232] ? file_update_time+0x176/0x520 [ 393.583585][ T2232] file_update_time+0x434/0x520 [ 393.588444][ T2232] ? iunique+0x330/0x330 [ 393.592691][ T2232] ? down_write_killable_nested+0x180/0x180 [ 393.598603][ T2232] file_modified+0x7d/0xa0 [ 393.603027][ T2232] ext4_file_write_iter+0xce7/0x14e0 [ 393.608330][ T2232] ? ext4_buffered_write_iter+0x3b0/0x3b0 [ 393.614065][ T2232] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 393.620054][ T2232] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 393.626314][ T2232] new_sync_write+0x431/0x660 [ 393.631005][ T2232] ? new_sync_read+0x6e0/0x6e0 [ 393.635789][ T2232] ? lock_release+0x720/0x720 [ 393.640495][ T2232] vfs_write+0x7cd/0xae0 [ 393.644756][ T2232] ksys_write+0x12d/0x250 [ 393.649096][ T2232] ? __ia32_sys_read+0xb0/0xb0 [ 393.653872][ T2232] ? syscall_enter_from_user_mode+0x21/0x70 [ 393.659781][ T2232] do_syscall_64+0x35/0xb0 [ 393.664201][ T2232] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 393.670107][ T2232] RIP: 0033:0x7f3b2dc21e99 [ 393.674525][ T2232] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 393.694134][ T2232] RSP: 002b:00007f3b2c597168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 393.702554][ T2232] RAX: ffffffffffffffda RBX: 00007f3b2dd34f60 RCX: 00007f3b2dc21e99 [ 393.710524][ T2232] RDX: 0000000000248800 RSI: 0000000020000000 RDI: 0000000000000005 [ 393.718489][ T2232] RBP: 00007f3b2c5971d0 R08: 0000000000000000 R09: 0000000000000000 [ 393.726458][ T2232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 393.734428][ T2232] R13: 00007ffc1f830b9f R14: 00007f3b2c597300 R15: 0000000000022000 [ 393.742419][ T2232] 01:49:08 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x1, 0x5, 0x6, 0x7, 0x0, 0x1, 0x80000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x8, 0x9}, 0x21, 0x6, 0x8, 0x2ad2abf67964e495, 0x8, 0x1ff, 0x200, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 01:49:08 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) r1 = gettid() tkill(r1, 0xb) wait4(r1, &(0x7f0000000080), 0x1, &(0x7f00000000c0)) ptrace$setopts(0x4206, r0, 0x6, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = gettid() tkill(r2, 0xb) tkill(r0, 0x2b) 01:49:08 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) write$cgroup_int(r2, &(0x7f0000000440), 0x12) [ 394.070926][ T2252] FAULT_INJECTION: forcing a failure. [ 394.070926][ T2252] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 394.129115][ T2252] CPU: 0 PID: 2252 Comm: syz-executor.4 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 [ 394.139051][ T2252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.149119][ T2252] Call Trace: [ 394.152405][ T2252] [ 394.155342][ T2252] dump_stack_lvl+0xcd/0x134 [ 394.159968][ T2252] should_fail.cold+0x5/0xa [ 394.164512][ T2252] strncpy_from_user+0x34/0x3e0 [ 394.169473][ T2252] bpf_prog_load+0x5a0/0x21f0 [ 394.174182][ T2252] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 394.180095][ T2252] ? find_held_lock+0x2d/0x110 [ 394.184890][ T2252] ? lock_downgrade+0x6e0/0x6e0 [ 394.189780][ T2252] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 394.196065][ T2252] __sys_bpf+0x68a/0x5970 [ 394.200422][ T2252] ? bpf_link_get_from_fd+0x110/0x110 [ 394.205819][ T2252] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 394.211847][ T2252] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 394.217868][ T2252] ? find_held_lock+0x2d/0x110 [ 394.223029][ T2252] ? trace_hardirqs_on+0x38/0x1c0 [ 394.228084][ T2252] __x64_sys_bpf+0x75/0xb0 [ 394.232526][ T2252] ? syscall_enter_from_user_mode+0x21/0x70 [ 394.238446][ T2252] do_syscall_64+0x35/0xb0 [ 394.242885][ T2252] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 394.248805][ T2252] RIP: 0033:0x7f56a7d02e99 [ 394.253238][ T2252] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 394.272863][ T2252] RSP: 002b:00007f56a6678168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 394.281294][ T2252] RAX: ffffffffffffffda RBX: 00007f56a7e15f60 RCX: 00007f56a7d02e99 [ 394.289285][ T2252] RDX: 0000000000000080 RSI: 0000000020000200 RDI: 0000000000000005 [ 394.297271][ T2252] RBP: 00007f56a66781d0 R08: 0000000000000000 R09: 0000000000000000 [ 394.305261][ T2252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 394.313247][ T2252] R13: 00007ffccd37371f R14: 00007f56a6678300 R15: 0000000000022000 [ 394.321250][ T2252] 01:49:09 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x1, 0x5, 0x6, 0x7, 0x0, 0x1, 0x80000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x8, 0x9}, 0x21, 0x6, 0x8, 0x2ad2abf67964e495, 0x8, 0x1ff, 0x200, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async, rerun: 64) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (rerun: 64) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 01:49:09 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248807) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) write$cgroup_int(r2, &(0x7f0000000440), 0x12) [ 394.643918][ T2388] FAULT_INJECTION: forcing a failure. [ 394.643918][ T2388] name failslab, interval 1, probability 0, space 0, times 0 [ 394.735091][ T2388] CPU: 1 PID: 2388 Comm: syz-executor.4 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 [ 394.745035][ T2388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.755108][ T2388] Call Trace: [ 394.758404][ T2388] [ 394.761358][ T2388] dump_stack_lvl+0xcd/0x134 [ 394.765975][ T2388] should_fail.cold+0x5/0xa [ 394.770504][ T2388] ? __get_vm_area_node.constprop.0+0xd3/0x380 [ 394.776737][ T2388] should_failslab+0x5/0x10 [ 394.781272][ T2388] kmem_cache_alloc_node_trace+0x59/0x300 [ 394.787024][ T2388] __get_vm_area_node.constprop.0+0xd3/0x380 [ 394.793041][ T2388] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 394.799038][ T2388] __vmalloc_node_range+0x154/0xf80 [ 394.804243][ T2388] ? bpf_prog_alloc_no_stats+0x38/0x350 [ 394.809861][ T2388] ? bpf_prog_alloc_no_stats+0x38/0x350 [ 394.815597][ T2388] ? find_held_lock+0x2d/0x110 [ 394.820372][ T2388] ? vfree_atomic+0xe0/0xe0 [ 394.824872][ T2388] ? __might_fault+0xd1/0x170 [ 394.829559][ T2388] ? lock_downgrade+0x6e0/0x6e0 [ 394.834427][ T2388] ? bpf_prog_alloc_no_stats+0x38/0x350 [ 394.839988][ T2388] __vmalloc+0x69/0x80 [ 394.844059][ T2388] ? bpf_prog_alloc_no_stats+0x38/0x350 [ 394.849622][ T2388] bpf_prog_alloc_no_stats+0x38/0x350 [ 394.855005][ T2388] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 394.861271][ T2388] bpf_prog_alloc+0x28/0x1a0 [ 394.865872][ T2388] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 394.871780][ T2388] bpf_prog_load+0x749/0x21f0 [ 394.876472][ T2388] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 394.882378][ T2388] ? find_held_lock+0x2d/0x110 [ 394.887175][ T2388] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 394.893438][ T2388] __sys_bpf+0x68a/0x5970 [ 394.897777][ T2388] ? bpf_link_get_from_fd+0x110/0x110 [ 394.903163][ T2388] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 394.909157][ T2388] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 394.915160][ T2388] ? find_held_lock+0x2d/0x110 [ 394.919957][ T2388] ? trace_hardirqs_on+0x38/0x1c0 [ 394.924988][ T2388] __x64_sys_bpf+0x75/0xb0 [ 394.929413][ T2388] ? syscall_enter_from_user_mode+0x21/0x70 [ 394.935318][ T2388] do_syscall_64+0x35/0xb0 [ 394.939735][ T2388] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 394.945641][ T2388] RIP: 0033:0x7f56a7d02e99 [ 394.950054][ T2388] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 394.969757][ T2388] RSP: 002b:00007f56a6678168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 394.978170][ T2388] RAX: ffffffffffffffda RBX: 00007f56a7e15f60 RCX: 00007f56a7d02e99 01:49:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000401100000000000000958255ae3c82321891e800000000000000000000007178dd7c05aba1cc185efec2069ac435df4a09854859844acaa19f04de1d67ebf9303bdc57f0cbe292f5ef85aae67caa7e0172845260ac8e15316aaf424c27e6516112c87b0d3b740e"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:49:09 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) r1 = gettid() tkill(r1, 0xb) wait4(r1, &(0x7f0000000080), 0x1, &(0x7f00000000c0)) ptrace$setopts(0x4206, r0, 0x6, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = gettid() tkill(r2, 0xb) tkill(r0, 0x2b) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) gettid() (async) tkill(r1, 0xb) (async) wait4(r1, &(0x7f0000000080), 0x1, &(0x7f00000000c0)) (async) ptrace$setopts(0x4206, r0, 0x6, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) gettid() (async) tkill(r2, 0xb) (async) tkill(r0, 0x2b) (async) 01:49:09 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64cac4e, 0x0, @perf_bp={0x0, 0x14}, 0x40280, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) syz_usbip_server_init(0x5) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000d80), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @alu={0x7, 0x0, 0x8, 0xa, 0x2, 0xfffffffffffffffc, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x0, 0xb, 0xa, 0x100, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000040)='GPL\x00', 0xb11, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0xe, 0x20, 0x3}, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffd}, 0x80) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) [ 394.986140][ T2388] RDX: 0000000000000080 RSI: 0000000020000200 RDI: 0000000000000005 [ 394.994111][ T2388] RBP: 00007f56a66781d0 R08: 0000000000000000 R09: 0000000000000000 [ 395.002079][ T2388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 395.010052][ T2388] R13: 00007ffccd37371f R14: 00007f56a6678300 R15: 0000000000022000 [ 395.018043][ T2388] 01:49:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 395.314231][ T2526] loop5: detected capacity change from 0 to 16 [ 395.353206][ T2466] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(6) [ 395.360189][ T2466] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) 01:49:10 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async, rerun: 32) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async, rerun: 32) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) r0 = gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) r1 = gettid() tkill(r1, 0xb) (async) wait4(r1, &(0x7f0000000080), 0x1, &(0x7f00000000c0)) (async) ptrace$setopts(0x4206, r0, 0x6, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) r2 = gettid() (rerun: 32) tkill(r2, 0xb) (async) tkill(r0, 0x2b) [ 395.403576][ T2526] FAT-fs (loop5): Unrecognized mount option "€" or missing value [ 395.486700][ T2466] vhci_hcd vhci_hcd.0: Device attached [ 395.599496][ T2649] FAULT_INJECTION: forcing a failure. [ 395.599496][ T2649] name failslab, interval 1, probability 0, space 0, times 0 [ 395.614769][ T2649] CPU: 1 PID: 2649 Comm: syz-executor.4 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 [ 395.624699][ T2649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.634848][ T2649] Call Trace: [ 395.638130][ T2649] [ 395.641088][ T2649] dump_stack_lvl+0xcd/0x134 [ 395.645694][ T2649] should_fail.cold+0x5/0xa [ 395.650208][ T2649] should_failslab+0x5/0x10 [ 395.654738][ T2649] kmem_cache_alloc_node+0x65/0x3e0 [ 395.659959][ T2649] ? alloc_vmap_area+0x164/0x1dc0 [ 395.665006][ T2649] alloc_vmap_area+0x164/0x1dc0 [ 395.669876][ T2649] ? kmem_cache_alloc_node_trace+0x46/0x300 [ 395.675805][ T2649] ? free_vmap_area+0x1ac0/0x1ac0 [ 395.680851][ T2649] ? rcu_read_lock_sched_held+0x3a/0x70 [ 395.686675][ T2649] ? trace_kmalloc_node+0x32/0x100 [ 395.691812][ T2649] __get_vm_area_node.constprop.0+0x128/0x380 [ 395.697910][ T2649] __vmalloc_node_range+0x154/0xf80 [ 395.703120][ T2649] ? bpf_prog_alloc_no_stats+0x38/0x350 [ 395.708682][ T2649] ? bpf_prog_alloc_no_stats+0x38/0x350 [ 395.714248][ T2649] ? find_held_lock+0x2d/0x110 [ 395.719029][ T2649] ? vfree_atomic+0xe0/0xe0 [ 395.723537][ T2649] ? __might_fault+0xd1/0x170 [ 395.728230][ T2649] ? lock_downgrade+0x6e0/0x6e0 [ 395.733108][ T2649] ? bpf_prog_alloc_no_stats+0x38/0x350 [ 395.738674][ T2649] __vmalloc+0x69/0x80 [ 395.742748][ T2649] ? bpf_prog_alloc_no_stats+0x38/0x350 [ 395.748309][ T2649] bpf_prog_alloc_no_stats+0x38/0x350 [ 395.753696][ T2649] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 395.759959][ T2649] bpf_prog_alloc+0x28/0x1a0 [ 395.764562][ T2649] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 395.770473][ T2649] bpf_prog_load+0x749/0x21f0 [ 395.775172][ T2649] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 395.781157][ T2649] ? find_held_lock+0x2d/0x110 [ 395.785957][ T2649] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 395.792227][ T2649] __sys_bpf+0x68a/0x5970 [ 395.796571][ T2649] ? bpf_link_get_from_fd+0x110/0x110 [ 395.801957][ T2649] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 395.807957][ T2649] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 395.813964][ T2649] ? find_held_lock+0x2d/0x110 [ 395.818759][ T2649] ? trace_hardirqs_on+0x38/0x1c0 [ 395.823798][ T2649] __x64_sys_bpf+0x75/0xb0 [ 395.828223][ T2649] ? syscall_enter_from_user_mode+0x21/0x70 [ 395.834130][ T2649] do_syscall_64+0x35/0xb0 [ 395.838551][ T2649] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 395.844461][ T2649] RIP: 0033:0x7f56a7d02e99 [ 395.848878][ T2649] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 395.868488][ T2649] RSP: 002b:00007f56a6678168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 395.876908][ T2649] RAX: ffffffffffffffda RBX: 00007f56a7e15f60 RCX: 00007f56a7d02e99 [ 395.884879][ T2649] RDX: 0000000000000080 RSI: 0000000020000200 RDI: 0000000000000005 [ 395.892849][ T2649] RBP: 00007f56a66781d0 R08: 0000000000000000 R09: 0000000000000000 [ 395.900817][ T2649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 395.908785][ T2649] R13: 00007ffccd37371f R14: 00007f56a6678300 R15: 0000000000022000 [ 395.916770][ T2649] [ 395.921784][ T2508] vhci_hcd: connection closed [ 395.955979][T25324] vhci_hcd: stop threads [ 395.969863][T25324] vhci_hcd: release socket [ 395.992280][T25324] vhci_hcd: disconnect device [ 395.997773][ T5] usb 20-1: SetAddress Request (2) to port 0 01:49:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000401100000000000000958255ae3c82321891e800000000000000000000007178dd7c05aba1cc185efec2069ac435df4a09854859844acaa19f04de1d67ebf9303bdc57f0cbe292f5ef85aae67caa7e0172845260ac8e15316aaf424c27e6516112c87b0d3b740e"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:49:10 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r2, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newqdisc={0x44, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}, {0x1}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0x14, 0x2, [@TCA_DSMARK_DEFAULT_INDEX={0x6}, @TCA_DSMARK_INDICES={0x6, 0x1, 0x8}]}}]}, 0x44}}, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/dvb_usb_pctv452e', 0x400002, 0x121) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000500)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x8, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000020000000000000000010000184400000000000000000000ffff00009500000000000000183200000100000000000000000000009500000000000000ae1e0bf15393403feb26ff873a3a218dd3df5f3cc61a338dc78f11512f1fb50b523579dec728dd03edbddfee900886c260120a470d8f813be6b1f9f12beb1e3c5645536849837e15d11a5200bda2c0af853cad1a719ca61da599d3fb9e5d0d36beee7e0e6383e156624b11fcdf675323a102dd8eb447a41bdac523be54a7bb348a5052873a95c05278995ec273fd063a2a6089a00d9674c160291a1573baf968a928d089a586337ad2b5359342c27b50c84dfd883b61b06f599ad160fbcfe76e737ead6c8fa6bb7923abf6893a87b9337d3e99a7644efffa6a0e044b56fb09aa4d49"], &(0x7f00000002c0)='syzkaller\x00', 0x5bd, 0xad, &(0x7f0000000300)=""/173, 0x60880, 0xc, '\x00', r2, 0x1, r1, 0x8, &(0x7f00000003c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0x3, 0x3ff, 0xb5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000540)=[r1, r3, r1, r5, r1, r6, 0xffffffffffffffff, r1, r7]}, 0x80) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r9}, 0x10) write$cgroup_type(r8, &(0x7f0000000000), 0x248800) r10 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40086602, &(0x7f0000000040)) write$cgroup_int(r10, &(0x7f0000000440), 0x12) [ 396.006587][ T5] usb 20-1: new SuperSpeed USB device number 2 using vhci_hcd 01:49:10 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) 01:49:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 5) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 01:49:10 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x1, 0x5, 0x6, 0x7, 0x0, 0x1, 0x80000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x8, 0x9}, 0x21, 0x6, 0x8, 0x2ad2abf67964e495, 0x8, 0x1ff, 0x200, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 396.057497][ T5] usb 20-1: enqueue for inactive port 0 [ 396.063642][ T5] usb 20-1: enqueue for inactive port 0 [ 396.110620][ T5] usb 20-1: enqueue for inactive port 0 [ 396.118672][ T2752] FAULT_INJECTION: forcing a failure. [ 396.118672][ T2752] name failslab, interval 1, probability 0, space 0, times 0 [ 396.210616][ T2752] CPU: 0 PID: 2752 Comm: syz-executor.4 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 [ 396.220558][ T2752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.230633][ T2752] Call Trace: [ 396.233922][ T2752] [ 396.236860][ T2752] dump_stack_lvl+0xcd/0x134 [ 396.241480][ T2752] should_fail.cold+0x5/0xa [ 396.246020][ T2752] should_failslab+0x5/0x10 [ 396.250561][ T2752] kmem_cache_alloc_node+0x65/0x3e0 [ 396.255799][ T2752] ? alloc_vmap_area+0xb04/0x1dc0 [ 396.260865][ T2752] alloc_vmap_area+0xb04/0x1dc0 [ 396.265851][ T2752] ? free_vmap_area+0x1ac0/0x1ac0 [ 396.270999][ T2752] ? rcu_read_lock_sched_held+0x3a/0x70 [ 396.276579][ T2752] ? trace_kmalloc_node+0x32/0x100 [ 396.281724][ T2752] __get_vm_area_node.constprop.0+0x128/0x380 [ 396.287831][ T2752] __vmalloc_node_range+0x154/0xf80 [ 396.293047][ T2752] ? bpf_prog_alloc_no_stats+0x38/0x350 [ 396.298623][ T2752] ? bpf_prog_alloc_no_stats+0x38/0x350 [ 396.304198][ T2752] ? find_held_lock+0x2d/0x110 [ 396.308987][ T2752] ? vfree_atomic+0xe0/0xe0 [ 396.313502][ T2752] ? __might_fault+0xd1/0x170 [ 396.318202][ T2752] ? lock_downgrade+0x6e0/0x6e0 [ 396.323073][ T2752] ? bpf_prog_alloc_no_stats+0x38/0x350 [ 396.328642][ T2752] __vmalloc+0x69/0x80 [ 396.332727][ T2752] ? bpf_prog_alloc_no_stats+0x38/0x350 [ 396.338301][ T2752] bpf_prog_alloc_no_stats+0x38/0x350 [ 396.343778][ T2752] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 396.350048][ T2752] bpf_prog_alloc+0x28/0x1a0 [ 396.354659][ T2752] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 396.360580][ T2752] bpf_prog_load+0x749/0x21f0 [ 396.365281][ T2752] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 396.371183][ T2752] ? find_held_lock+0x2d/0x110 [ 396.376000][ T2752] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 396.382269][ T2752] __sys_bpf+0x68a/0x5970 [ 396.386619][ T2752] ? bpf_link_get_from_fd+0x110/0x110 [ 396.392013][ T2752] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 396.398020][ T2752] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 396.404124][ T2752] ? find_held_lock+0x2d/0x110 [ 396.408923][ T2752] ? trace_hardirqs_on+0x38/0x1c0 [ 396.413967][ T2752] __x64_sys_bpf+0x75/0xb0 [ 396.418398][ T2752] ? syscall_enter_from_user_mode+0x21/0x70 [ 396.424309][ T2752] do_syscall_64+0x35/0xb0 [ 396.428736][ T2752] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 396.434648][ T2752] RIP: 0033:0x7f56a7d02e99 [ 396.439072][ T2752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 396.458683][ T2752] RSP: 002b:00007f56a6678168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 396.467102][ T2752] RAX: ffffffffffffffda RBX: 00007f56a7e15f60 RCX: 00007f56a7d02e99 [ 396.475078][ T2752] RDX: 0000000000000080 RSI: 0000000020000200 RDI: 0000000000000005 [ 396.483051][ T2752] RBP: 00007f56a66781d0 R08: 0000000000000000 R09: 0000000000000000 [ 396.491025][ T2752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 396.498999][ T2752] R13: 00007ffccd37371f R14: 00007f56a6678300 R15: 0000000000022000 [ 396.506991][ T2752] [ 396.838083][ T5] usb usb20-port1: Cannot enable. Maybe the USB cable is bad? [ 396.868400][ T5] usb usb20-port1: attempt power cycle 01:49:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 01:49:11 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64cac4e, 0x0, @perf_bp={0x0, 0x14}, 0x40280, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) syz_usbip_server_init(0x5) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000d80), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @alu={0x7, 0x0, 0x8, 0xa, 0x2, 0xfffffffffffffffc, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x0, 0xb, 0xa, 0x100, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000040)='GPL\x00', 0xb11, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0xe, 0x20, 0x3}, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffd}, 0x80) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64cac4e, 0x0, @perf_bp={0x0, 0x14}, 0x40280, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) (async) syz_usbip_server_init(0x5) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r3, &(0x7f0000004200)='t', 0xfff4) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000d80), 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @alu={0x7, 0x0, 0x8, 0xa, 0x2, 0xfffffffffffffffc, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x0, 0xb, 0xa, 0x100, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000040)='GPL\x00', 0xb11, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0xe, 0x20, 0x3}, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffd}, 0x80) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r5, &(0x7f0000004200)='t', 0xfff4) (async) 01:49:11 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async, rerun: 32) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async, rerun: 32) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) [ 397.038595][ T2954] FAULT_INJECTION: forcing a failure. [ 397.038595][ T2954] name failslab, interval 1, probability 0, space 0, times 0 [ 397.072648][ T2954] CPU: 1 PID: 2954 Comm: syz-executor.4 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 01:49:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000080)={r1, 0x7, 0x6, 0x19d}) perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x3, 0x5, 0x1, 0x5, 0x0, 0x1f, 0x1010c, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x402, 0x10000, 0x8562, 0x8, 0x5, 0x7f, 0x3, 0x0, 0x9, 0x0, 0xa34}, 0xffffffffffffffff, 0x3, r4, 0xa) write(r3, &(0x7f0000004200)='t', 0xfff4) write$UHID_INPUT2(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="0c0000008500ad963e575e58ec85891ce2b6d6c08c272ecc6c3b945a99187dbe99b7490a60b21c9496bd6c857079296624e1c75b4dd571069c8b9a014e64f8fc1f60d6eb2de0249952b1ccaa4467660a105b6b3e4c3e9933d76aa50a7501248762031db505edaa4865ce3ecd24e96d0e843f757773dedd13eca150bad6e61ff1f7531d73e603e97899da3a6f00c2226a1b6c76a6b5b8a8186c574391264c3877a5d6dc0e525312e6eee8155cfd00"/189], 0x8b) preadv(r1, &(0x7f0000000040), 0x0, 0x10000, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 397.082606][ T2954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.092679][ T2954] Call Trace: [ 397.094588][ T2952] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(6) [ 397.095964][ T2954] [ 397.102461][ T2952] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 397.105388][ T2954] dump_stack_lvl+0xcd/0x134 [ 397.117571][ T2954] should_fail.cold+0x5/0xa [ 397.122106][ T2954] ? __vmalloc_node_range+0x447/0xf80 [ 397.127499][ T2954] should_failslab+0x5/0x10 [ 397.132036][ T2954] __kmalloc_node+0x75/0x380 [ 397.136667][ T2954] __vmalloc_node_range+0x447/0xf80 [ 397.141885][ T2954] ? find_held_lock+0x2d/0x110 [ 397.146692][ T2954] ? vfree_atomic+0xe0/0xe0 [ 397.151206][ T2954] ? __might_fault+0xd1/0x170 [ 397.155909][ T2954] ? lock_downgrade+0x6e0/0x6e0 [ 397.157768][ T2952] vhci_hcd vhci_hcd.0: Device attached [ 397.160787][ T2954] ? bpf_prog_alloc_no_stats+0x38/0x350 [ 397.160832][ T2954] __vmalloc+0x69/0x80 [ 397.175866][ T2954] ? bpf_prog_alloc_no_stats+0x38/0x350 [ 397.181442][ T2954] bpf_prog_alloc_no_stats+0x38/0x350 [ 397.186842][ T2954] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 397.193121][ T2954] bpf_prog_alloc+0x28/0x1a0 [ 397.194433][ T2947] loop5: detected capacity change from 0 to 16 [ 397.197734][ T2954] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 397.197782][ T2954] bpf_prog_load+0x749/0x21f0 [ 397.197818][ T2954] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 397.197848][ T2954] ? find_held_lock+0x2d/0x110 [ 397.197907][ T2954] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 397.197954][ T2954] __sys_bpf+0x68a/0x5970 [ 397.197989][ T2954] ? bpf_link_get_from_fd+0x110/0x110 [ 397.198028][ T2954] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 397.198066][ T2954] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 397.198114][ T2954] ? find_held_lock+0x2d/0x110 [ 397.198170][ T2954] ? trace_hardirqs_on+0x38/0x1c0 [ 397.198201][ T2954] __x64_sys_bpf+0x75/0xb0 [ 397.198231][ T2954] ? syscall_enter_from_user_mode+0x21/0x70 [ 397.198268][ T2954] do_syscall_64+0x35/0xb0 [ 397.198293][ T2954] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 397.198334][ T2954] RIP: 0033:0x7f56a7d02e99 [ 397.198356][ T2954] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 397.198382][ T2954] RSP: 002b:00007f56a6657168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 01:49:11 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) (async) 01:49:11 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r2, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newqdisc={0x44, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}, {0x1}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0x14, 0x2, [@TCA_DSMARK_DEFAULT_INDEX={0x6}, @TCA_DSMARK_INDICES={0x6, 0x1, 0x8}]}}]}, 0x44}}, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/dvb_usb_pctv452e', 0x400002, 0x121) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000500)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x8, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)='syzkaller\x00', 0x5bd, 0xad, &(0x7f0000000300)=""/173, 0x60880, 0xc, '\x00', r2, 0x1, r1, 0x8, &(0x7f00000003c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0x3, 0x3ff, 0xb5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000540)=[r1, r3, r1, r5, r1, r6, 0xffffffffffffffff, r1, r7]}, 0x80) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r9}, 0x10) write$cgroup_type(r8, &(0x7f0000000000), 0x248800) r10 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40086602, &(0x7f0000000040)) write$cgroup_int(r10, &(0x7f0000000440), 0x12) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r2, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newqdisc={0x44, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}, {0x1}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0x14, 0x2, [@TCA_DSMARK_DEFAULT_INDEX={0x6}, @TCA_DSMARK_INDICES={0x6, 0x1, 0x8}]}}]}, 0x44}}, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/dvb_usb_pctv452e', 0x400002, 0x121) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r5, &(0x7f0000004200)='t', 0xfff4) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000500)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x8, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)='syzkaller\x00', 0x5bd, 0xad, &(0x7f0000000300)=""/173, 0x60880, 0xc, '\x00', r2, 0x1, r1, 0x8, &(0x7f00000003c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0x3, 0x3ff, 0xb5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000540)=[r1, r3, r1, r5, r1, r6, 0xffffffffffffffff, r1, r7]}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r9}, 0x10) (async) write$cgroup_type(r8, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40086602, &(0x7f0000000040)) (async) write$cgroup_int(r10, &(0x7f0000000440), 0x12) (async) 01:49:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000635c1799864f5b332cb100"/37], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 397.198411][ T2954] RAX: ffffffffffffffda RBX: 00007f56a7e16030 RCX: 00007f56a7d02e99 [ 397.198430][ T2954] RDX: 0000000000000080 RSI: 0000000020000200 RDI: 0000000000000005 [ 397.198447][ T2954] RBP: 00007f56a66571d0 R08: 0000000000000000 R09: 0000000000000000 [ 397.198464][ T2954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 397.198482][ T2954] R13: 00007ffccd37371f R14: 00007f56a6657300 R15: 0000000000022000 [ 397.198517][ T2954] 01:49:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async, rerun: 32) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000080)={r1, 0x7, 0x6, 0x19d}) perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x3, 0x5, 0x1, 0x5, 0x0, 0x1f, 0x1010c, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x402, 0x10000, 0x8562, 0x8, 0x5, 0x7f, 0x3, 0x0, 0x9, 0x0, 0xa34}, 0xffffffffffffffff, 0x3, r4, 0xa) (async) write(r3, &(0x7f0000004200)='t', 0xfff4) (async) write$UHID_INPUT2(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="0c0000008500ad963e575e58ec85891ce2b6d6c08c272ecc6c3b945a99187dbe99b7490a60b21c9496bd6c857079296624e1c75b4dd571069c8b9a014e64f8fc1f60d6eb2de0249952b1ccaa4467660a105b6b3e4c3e9933d76aa50a7501248762031db505edaa4865ce3ecd24e96d0e843f757773dedd13eca150bad6e61ff1f7531d73e603e97899da3a6f00c2226a1b6c76a6b5b8a8186c574391264c3877a5d6dc0e525312e6eee8155cfd00"/189], 0x8b) (async) preadv(r1, &(0x7f0000000040), 0x0, 0x10000, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 397.469575][ T5] usb 20-1: SetAddress Request (4) to port 0 [ 397.475642][ T5] usb 20-1: new SuperSpeed USB device number 4 using vhci_hcd [ 397.623255][ T3117] FAULT_INJECTION: forcing a failure. [ 397.623255][ T3117] name failslab, interval 1, probability 0, space 0, times 0 [ 397.762408][ T3117] CPU: 0 PID: 3117 Comm: syz-executor.4 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 [ 397.772350][ T3117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.782421][ T3117] Call Trace: [ 397.785712][ T3117] [ 397.788644][ T3117] dump_stack_lvl+0xcd/0x134 [ 397.793259][ T3117] should_fail.cold+0x5/0xa [ 397.797778][ T3117] ? bpf_prog_alloc_no_stats+0xd5/0x350 [ 397.803347][ T3117] should_failslab+0x5/0x10 [ 397.807875][ T3117] kmem_cache_alloc_trace+0x55/0x2c0 [ 397.813212][ T3117] bpf_prog_alloc_no_stats+0xd5/0x350 [ 397.818629][ T3117] bpf_prog_alloc+0x28/0x1a0 [ 397.823254][ T3117] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 397.829186][ T3117] bpf_prog_load+0x749/0x21f0 [ 397.833904][ T3117] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 397.839817][ T3117] ? find_held_lock+0x2d/0x110 [ 397.844631][ T3117] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 397.850910][ T3117] __sys_bpf+0x68a/0x5970 [ 397.855264][ T3117] ? bpf_link_get_from_fd+0x110/0x110 [ 397.860659][ T3117] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 397.866755][ T3117] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 397.872777][ T3117] ? find_held_lock+0x2d/0x110 [ 397.877587][ T3117] ? trace_hardirqs_on+0x38/0x1c0 [ 397.882628][ T3117] __x64_sys_bpf+0x75/0xb0 [ 397.887060][ T3117] ? syscall_enter_from_user_mode+0x21/0x70 [ 397.893061][ T3117] do_syscall_64+0x35/0xb0 [ 397.897485][ T3117] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 397.903415][ T3117] RIP: 0033:0x7f56a7d02e99 [ 397.907837][ T3117] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 397.927458][ T3117] RSP: 002b:00007f56a6678168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 397.935883][ T3117] RAX: ffffffffffffffda RBX: 00007f56a7e15f60 RCX: 00007f56a7d02e99 [ 397.943865][ T3117] RDX: 0000000000000080 RSI: 0000000020000200 RDI: 0000000000000005 [ 397.951843][ T3117] RBP: 00007f56a66781d0 R08: 0000000000000000 R09: 0000000000000000 [ 397.959826][ T3117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 397.967810][ T3117] R13: 00007ffccd37371f R14: 00007f56a6678300 R15: 0000000000022000 [ 397.975800][ T3117] [ 397.987833][ T2977] vhci_hcd: connection reset by peer [ 398.002523][ T4640] vhci_hcd: stop threads [ 398.008079][ T4640] vhci_hcd: release socket 01:49:12 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64cac4e, 0x0, @perf_bp={0x0, 0x14}, 0x40280, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) syz_usbip_server_init(0x5) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000d80), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @alu={0x7, 0x0, 0x8, 0xa, 0x2, 0xfffffffffffffffc, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x0, 0xb, 0xa, 0x100, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000040)='GPL\x00', 0xb11, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0xe, 0x20, 0x3}, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffd}, 0x80) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64cac4e, 0x0, @perf_bp={0x0, 0x14}, 0x40280, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) (async) syz_usbip_server_init(0x5) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r3, &(0x7f0000004200)='t', 0xfff4) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000d80), 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @alu={0x7, 0x0, 0x8, 0xa, 0x2, 0xfffffffffffffffc, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x0, 0xb, 0xa, 0x100, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000040)='GPL\x00', 0xb11, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0xe, 0x20, 0x3}, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffd}, 0x80) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r5, &(0x7f0000004200)='t', 0xfff4) (async) [ 398.015637][ T4640] vhci_hcd: disconnect device 01:49:12 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r2, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newqdisc={0x44, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}, {0x1}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0x14, 0x2, [@TCA_DSMARK_DEFAULT_INDEX={0x6}, @TCA_DSMARK_INDICES={0x6, 0x1, 0x8}]}}]}, 0x44}}, 0x0) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/dvb_usb_pctv452e', 0x400002, 0x121) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000500)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x8, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)='syzkaller\x00', 0x5bd, 0xad, &(0x7f0000000300)=""/173, 0x60880, 0xc, '\x00', r2, 0x1, r1, 0x8, &(0x7f00000003c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0x3, 0x3ff, 0xb5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000540)=[r1, r3, r1, r5, r1, r6, 0xffffffffffffffff, r1, r7]}, 0x80) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r9}, 0x10) (async) write$cgroup_type(r8, &(0x7f0000000000), 0x248800) r10 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40086602, &(0x7f0000000040)) write$cgroup_int(r10, &(0x7f0000000440), 0x12) [ 398.050060][ T3976] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:49:12 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) r2 = clone3(&(0x7f0000000400)={0x88000, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), {0x41}, &(0x7f00000002c0)=""/94, 0x5e, &(0x7f0000000340)=""/87, &(0x7f00000003c0)=[r1, r1, r0, r0, r0, r1, r0, r0, 0x0], 0x9}, 0x58) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x3f, 0x2, 0x6, 0x0, 0x0, 0x37f, 0x2014, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000140), 0x8}, 0x2820, 0xfffffffffffffff9, 0x401, 0x0, 0xe4c0, 0x1, 0x4d9f, 0x0, 0xffff}, r2, 0x4, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x40, 0x80, 0x7f, 0x3, 0x0, 0x9, 0x200, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x8d3}, 0x5404, 0x8001, 0x9, 0x2, 0x0, 0x89, 0x20a, 0x0, 0x81, 0x0, 0x6}, r1, 0x2, 0xffffffffffffffff, 0x8) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) 01:49:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000080)={r1, 0x7, 0x6, 0x19d}) perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x3, 0x5, 0x1, 0x5, 0x0, 0x1f, 0x1010c, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x402, 0x10000, 0x8562, 0x8, 0x5, 0x7f, 0x3, 0x0, 0x9, 0x0, 0xa34}, 0xffffffffffffffff, 0x3, r4, 0xa) write(r3, &(0x7f0000004200)='t', 0xfff4) write$UHID_INPUT2(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="0c0000008500ad963e575e58ec85891ce2b6d6c08c272ecc6c3b945a99187dbe99b7490a60b21c9496bd6c857079296624e1c75b4dd571069c8b9a014e64f8fc1f60d6eb2de0249952b1ccaa4467660a105b6b3e4c3e9933d76aa50a7501248762031db505edaa4865ce3ecd24e96d0e843f757773dedd13eca150bad6e61ff1f7531d73e603e97899da3a6f00c2226a1b6c76a6b5b8a8186c574391264c3877a5d6dc0e525312e6eee8155cfd00"/189], 0x8b) preadv(r1, &(0x7f0000000040), 0x0, 0x10000, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000080)={r1, 0x7, 0x6, 0x19d}) (async) perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x3, 0x5, 0x1, 0x5, 0x0, 0x1f, 0x1010c, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x402, 0x10000, 0x8562, 0x8, 0x5, 0x7f, 0x3, 0x0, 0x9, 0x0, 0xa34}, 0xffffffffffffffff, 0x3, r4, 0xa) (async) write(r3, &(0x7f0000004200)='t', 0xfff4) (async) write$UHID_INPUT2(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="0c0000008500ad963e575e58ec85891ce2b6d6c08c272ecc6c3b945a99187dbe99b7490a60b21c9496bd6c857079296624e1c75b4dd571069c8b9a014e64f8fc1f60d6eb2de0249952b1ccaa4467660a105b6b3e4c3e9933d76aa50a7501248762031db505edaa4865ce3ecd24e96d0e843f757773dedd13eca150bad6e61ff1f7531d73e603e97899da3a6f00c2226a1b6c76a6b5b8a8186c574391264c3877a5d6dc0e525312e6eee8155cfd00"/189], 0x8b) (async) preadv(r1, &(0x7f0000000040), 0x0, 0x10000, 0x1) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 01:49:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000635c1799864f5b332cb100"/37], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000635c1799864f5b332cb100"/37], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async) [ 398.299124][ T3237] loop5: detected capacity change from 0 to 16 [ 398.394255][ T3229] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(6) [ 398.400813][ T3229] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 398.402321][ T3225] warn_alloc: 4 callbacks suppressed [ 398.402337][ T3225] syz-executor.0: vmalloc error: size 16384, page order 0, failed to allocate pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 398.426968][ T3237] FAT-fs (loop5): Unrecognized mount option "€" or missing value [ 398.472023][ T3225] ,cpuset=syz0,mems_allowed=0-1 [ 398.512748][ T3225] CPU: 0 PID: 3225 Comm: syz-executor.0 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 [ 398.522688][ T3225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 398.532754][ T3225] Call Trace: [ 398.536048][ T3225] [ 398.538988][ T3225] dump_stack_lvl+0xcd/0x134 [ 398.543604][ T3225] warn_alloc.cold+0x87/0x17a [ 398.548309][ T3225] ? zone_watermark_ok_safe+0x290/0x290 [ 398.553884][ T3225] ? find_held_lock+0x2d/0x110 [ 398.558679][ T3225] ? lock_downgrade+0x6e0/0x6e0 [ 398.563560][ T3225] ? __vmalloc_node_range+0x6b0/0xf80 [ 398.568946][ T3225] __vmalloc_node_range+0xd01/0xf80 [ 398.572540][ T3229] vhci_hcd vhci_hcd.0: Device attached [ 398.574167][ T3225] ? vfree_atomic+0xe0/0xe0 [ 398.574198][ T3225] ? rcu_read_lock_sched_held+0x3a/0x70 [ 398.589649][ T3225] ? kernel_clone+0xe7/0xab0 [ 398.594255][ T3225] copy_process+0x926/0x7490 [ 398.598858][ T3225] ? kernel_clone+0xe7/0xab0 [ 398.603722][ T3225] ? lock_chain_count+0x20/0x20 01:49:13 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x14a80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r3}, 0x10) r4 = memfd_secret(0x80000) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='task_newtask\x00', r4}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000040)) write$cgroup_int(r6, &(0x7f0000000440), 0x12) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE(r2, 0xc01064c2, &(0x7f0000000300)={0x0, 0x0, r2}) r8 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000340), 0x1, 0x0) syz_io_uring_setup(0x3773, &(0x7f00000005c0)={0x0, 0x0, 0x2, 0x0, 0xa7, 0x0, r1}, &(0x7f0000002000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000400)) syz_io_uring_setup(0x187, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3}, &(0x7f00006d5000/0x2000)=nil, &(0x7f000021f000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000100)=0x0) r11 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r9, r10, &(0x7f0000000080)=@IORING_OP_POLL_ADD={0x6, 0x3, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, {0xa304}, 0x0, {0x0, r11}}, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f00000003c0)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000380)=[0xffffffffffffffff, r4, r5, r1, r7, r0, 0xffffffffffffffff, r8, r1], 0x9, 0x0, 0x1, {0x0, r11}}, 0xffffff06) 01:49:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 398.608595][ T3225] ? lock_chain_count+0x20/0x20 [ 398.613477][ T3225] ? __cleanup_sighand+0xb0/0xb0 [ 398.618429][ T3225] ? lock_downgrade+0x6e0/0x6e0 [ 398.623326][ T3225] ? __lock_acquire+0x1655/0x5470 01:49:13 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() (async) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) r2 = clone3(&(0x7f0000000400)={0x88000, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), {0x41}, &(0x7f00000002c0)=""/94, 0x5e, &(0x7f0000000340)=""/87, &(0x7f00000003c0)=[r1, r1, r0, r0, r0, r1, r0, r0, 0x0], 0x9}, 0x58) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x3f, 0x2, 0x6, 0x0, 0x0, 0x37f, 0x2014, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000140), 0x8}, 0x2820, 0xfffffffffffffff9, 0x401, 0x0, 0xe4c0, 0x1, 0x4d9f, 0x0, 0xffff}, r2, 0x4, 0xffffffffffffffff, 0x9) (async) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x40, 0x80, 0x7f, 0x3, 0x0, 0x9, 0x200, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x8d3}, 0x5404, 0x8001, 0x9, 0x2, 0x0, 0x89, 0x20a, 0x0, 0x81, 0x0, 0x6}, r1, 0x2, 0xffffffffffffffff, 0x8) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) [ 398.623370][ T3225] ? kernel_clone+0x314/0xab0 01:49:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(r0, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r1, &(0x7f0000004200)='t', 0xfff4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map, r1, 0x11}, 0x10) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0', [{0x20, 'threaded\x00'}, {0x20, 'memory.events\x00'}], 0xa, "df206a7b3756918f2439f08ea21b22c10b55d797d961ccc00b6397d516c0a833b9195bea47e380a2b477653fdc72c027826db746302e778b94ed3f3386b77193b42cecd9fdf91dfbf066956e00a77bb6cfb06e2148404d0d8940775689ff75f4e7809c4eb775f123a323b273d524257425bb5a7165a4b38415"}, 0x9d) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 398.623399][ T3225] kernel_clone+0xe7/0xab0 01:49:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 398.623428][ T3225] ? copy_init_mm+0x20/0x20 [ 398.623451][ T3225] ? lockdep_hardirqs_on_prepare+0x400/0x400 01:49:13 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x14a80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r3}, 0x10) r4 = memfd_secret(0x80000) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='task_newtask\x00', r4}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000040)) write$cgroup_int(r6, &(0x7f0000000440), 0x12) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE(r2, 0xc01064c2, &(0x7f0000000300)={0x0, 0x0, r2}) r8 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000340), 0x1, 0x0) syz_io_uring_setup(0x3773, &(0x7f00000005c0)={0x0, 0x0, 0x2, 0x0, 0xa7, 0x0, r1}, &(0x7f0000002000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000400)) syz_io_uring_setup(0x187, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3}, &(0x7f00006d5000/0x2000)=nil, &(0x7f000021f000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000100)=0x0) r11 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r9, r10, &(0x7f0000000080)=@IORING_OP_POLL_ADD={0x6, 0x3, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, {0xa304}, 0x0, {0x0, r11}}, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f00000003c0)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000380)=[0xffffffffffffffff, r4, r5, r1, r7, r0, 0xffffffffffffffff, r8, r1], 0x9, 0x0, 0x1, {0x0, r11}}, 0xffffff06) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x14a80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r3}, 0x10) (async) memfd_secret(0x80000) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='task_newtask\x00', r4}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000040)) (async) write$cgroup_int(r6, &(0x7f0000000440), 0x12) (async) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE(r2, 0xc01064c2, &(0x7f0000000300)={0x0, 0x0, r2}) (async) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000340), 0x1, 0x0) (async) syz_io_uring_setup(0x3773, &(0x7f00000005c0)={0x0, 0x0, 0x2, 0x0, 0xa7, 0x0, r1}, &(0x7f0000002000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000400)) (async) syz_io_uring_setup(0x187, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3}, &(0x7f00006d5000/0x2000)=nil, &(0x7f000021f000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000100)) (async) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) (async) syz_io_uring_submit(r9, r10, &(0x7f0000000080)=@IORING_OP_POLL_ADD={0x6, 0x3, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, {0xa304}, 0x0, {0x0, r11}}, 0x4) (async) syz_io_uring_submit(0x0, 0x0, &(0x7f00000003c0)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000380)=[0xffffffffffffffff, r4, r5, r1, r7, r0, 0xffffffffffffffff, r8, r1], 0x9, 0x0, 0x1, {0x0, r11}}, 0xffffff06) (async) [ 398.623486][ T3225] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 398.623533][ T3225] ? find_held_lock+0x2d/0x110 [ 398.623568][ T3225] __do_sys_clone+0xc1/0x100 [ 398.623595][ T3225] ? kernel_clone+0xab0/0xab0 01:49:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(r0, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r1, &(0x7f0000004200)='t', 0xfff4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map, r1, 0x11}, 0x10) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0', [{0x20, 'threaded\x00'}, {0x20, 'memory.events\x00'}], 0xa, "df206a7b3756918f2439f08ea21b22c10b55d797d961ccc00b6397d516c0a833b9195bea47e380a2b477653fdc72c027826db746302e778b94ed3f3386b77193b42cecd9fdf91dfbf066956e00a77bb6cfb06e2148404d0d8940775689ff75f4e7809c4eb775f123a323b273d524257425bb5a7165a4b38415"}, 0x9d) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r0, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r1, &(0x7f0000004200)='t', 0xfff4) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map, r1, 0x11}, 0x10) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0', [{0x20, 'threaded\x00'}, {0x20, 'memory.events\x00'}], 0xa, "df206a7b3756918f2439f08ea21b22c10b55d797d961ccc00b6397d516c0a833b9195bea47e380a2b477653fdc72c027826db746302e778b94ed3f3386b77193b42cecd9fdf91dfbf066956e00a77bb6cfb06e2148404d0d8940775689ff75f4e7809c4eb775f123a323b273d524257425bb5a7165a4b38415"}, 0x9d) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) [ 398.623619][ T3225] ? lock_downgrade+0x6e0/0x6e0 [ 398.623667][ T3225] ? syscall_enter_from_user_mode+0x21/0x70 [ 398.623708][ T3225] do_syscall_64+0x35/0xb0 [ 398.623733][ T3225] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 398.623770][ T3225] RIP: 0033:0x7fb10b2da2c1 [ 398.623791][ T3225] Code: 48 85 ff 74 3d 48 85 f6 74 38 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 7c 13 74 01 c3 31 ed 58 5f ff d0 48 89 c7 b8 3c 00 00 00 [ 398.623815][ T3225] RSP: 002b:00007ffc5d68b0c8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 398.623848][ T3225] RAX: ffffffffffffffda RBX: 00007fb109a80700 RCX: 00007fb10b2da2c1 [ 398.623865][ T3225] RDX: 00007fb109a809d0 RSI: 00007fb109a802f0 RDI: 00000000003d0f00 [ 398.623882][ T3225] RBP: 00007ffc5d68b310 R08: 00007fb109a80700 R09: 00007fb109a80700 [ 398.623899][ T3225] R10: 00007fb109a809d0 R11: 0000000000000206 R12: 00007ffc5d68b17e [ 398.623917][ T3225] R13: 00007ffc5d68b17f R14: 00007fb109a80300 R15: 0000000000022000 [ 398.623949][ T3225] [ 398.636247][ T3225] Mem-Info: [ 398.636260][ T3225] active_anon:534 inactive_anon:241443 isolated_anon:0 [ 398.636260][ T3225] active_file:4915 inactive_file:9291 isolated_file:0 [ 398.636260][ T3225] unevictable:768 dirty:32 writeback:0 [ 398.636260][ T3225] slab_reclaimable:16044 slab_unreclaimable:97143 [ 398.636260][ T3225] mapped:33729 shmem:8004 pagetables:1850 bounce:0 [ 398.636260][ T3225] kernel_misc_reclaimable:0 [ 398.636260][ T3225] free:1230252 free_pcp:11206 free_cma:0 [ 398.636599][ T3225] Node 0 active_anon:2128kB inactive_anon:964840kB active_file:19584kB inactive_file:37164kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:134916kB dirty:124kB writeback:0kB shmem:29540kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 798720kB writeback_tmp:0kB kernel_stack:13232kB pagetables:7396kB all_unreclaimable? no [ 398.636656][ T3225] Node 1 active_anon:8kB inactive_anon:932kB active_file:76kB inactive_file:0kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:2476kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:4kB all_unreclaimable? no [ 398.637076][ T3225] Node 0 DMA free:15360kB boost:0kB min:200kB low:248kB high:296kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 398.639110][ T3225] lowmem_reserve[]: 0 2645 2645 2645 2645 [ 398.639164][ T3225] Node 0 DMA32 free:954000kB boost:0kB min:35676kB low:44592kB high:53508kB reserved_highatomic:0KB active_anon:2128kB inactive_anon:964840kB active_file:19584kB inactive_file:37164kB unevictable:1536kB writepending:124kB present:3129332kB managed:2716620kB mlocked:0kB bounce:0kB free_pcp:44144kB local_pcp:22080kB free_cma:0kB [ 398.646063][ T3225] lowmem_reserve[]: 0 0 0 0 0 [ 398.646116][ T3225] Node 0 Normal free:0kB boost:0kB min:4kB low:4kB high:4kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:400kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 398.646184][ T3225] lowmem_reserve[]: 0 0 0 0 0 [ 398.646231][ T3225] Node 1 Normal free:3951424kB boost:0kB min:54224kB low:67780kB high:81336kB reserved_highatomic:0KB active_anon:8kB inactive_anon:932kB active_file:76kB inactive_file:0kB unevictable:1536kB writepending:4kB present:4194304kB managed:4117620kB mlocked:0kB bounce:0kB free_pcp:572kB local_pcp:572kB free_cma:0kB [ 398.646302][ T3225] lowmem_reserve[]: 0 0 0 0 0 [ 398.646347][ T3225] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 398.646503][ T3225] Node 0 DMA32: 4142*4kB (UME) 2078*8kB (UME) 1799*16kB (UME) 436*32kB (UME) 395*64kB (UME) 136*128kB (UME) 18*256kB (UME) 9*512kB (UME) 3*1024kB (M) 5*2048kB (ME) 199*4096kB (UM) = 956248kB [ 398.646719][ T3225] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 398.646856][ T3225] Node 1 Normal: 124*4kB (UME) 24*8kB (UME) 23*16kB (UME) 159*32kB (UME) 69*64kB (UME) 24*128kB (UE) 8*256kB (U) 7*512kB (UE) 2*1024kB (UE) 3*2048kB (UM) 958*4096kB (M) = 3951424kB [ 398.658873][ T3225] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 398.658896][ T3225] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 398.658917][ T3225] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 398.658937][ T3225] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 398.658958][ T3225] 20632 total pagecache pages [ 398.658967][ T3225] 0 pages in swap cache [ 398.658975][ T3225] Swap cache stats: add 0, delete 0, find 0/0 [ 398.658991][ T3225] Free swap = 0kB [ 398.658999][ T3225] Total swap = 0kB [ 398.659008][ T3225] 2097051 pages RAM [ 398.659016][ T3225] 0 pages HighMem/MovableOnly [ 398.659024][ T3225] 384551 pages reserved [ 398.659032][ T3225] 0 pages cma reserved [ 398.754382][ T3467] FAULT_INJECTION: forcing a failure. [ 398.754382][ T3467] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 398.754420][ T3467] CPU: 1 PID: 3467 Comm: syz-executor.4 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 [ 398.754450][ T3467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 398.754466][ T3467] Call Trace: [ 398.754474][ T3467] [ 398.754484][ T3467] dump_stack_lvl+0xcd/0x134 [ 398.754521][ T3467] should_fail.cold+0x5/0xa [ 398.754552][ T3467] _copy_from_user+0x2c/0x180 [ 398.754583][ T3467] bpf_prog_load+0x1384/0x21f0 [ 398.754623][ T3467] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 398.754654][ T3467] ? find_held_lock+0x2d/0x110 [ 398.754715][ T3467] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 398.754769][ T3467] __sys_bpf+0x68a/0x5970 [ 398.754805][ T3467] ? bpf_link_get_from_fd+0x110/0x110 [ 398.754843][ T3467] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 398.754881][ T3467] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 398.754930][ T3467] ? find_held_lock+0x2d/0x110 [ 398.754987][ T3467] ? trace_hardirqs_on+0x38/0x1c0 [ 398.755018][ T3467] __x64_sys_bpf+0x75/0xb0 [ 398.755048][ T3467] ? syscall_enter_from_user_mode+0x21/0x70 [ 398.755086][ T3467] do_syscall_64+0x35/0xb0 [ 398.755112][ T3467] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 398.755152][ T3467] RIP: 0033:0x7f56a7d02e99 [ 398.755173][ T3467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 398.755199][ T3467] RSP: 002b:00007f56a6678168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 398.755226][ T3467] RAX: ffffffffffffffda RBX: 00007f56a7e15f60 RCX: 00007f56a7d02e99 [ 398.755245][ T3467] RDX: 0000000000000080 RSI: 0000000020000200 RDI: 0000000000000005 [ 398.755263][ T3467] RBP: 00007f56a66781d0 R08: 0000000000000000 R09: 0000000000000000 [ 398.755280][ T3467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 398.755297][ T3467] R13: 00007ffccd37371f R14: 00007f56a6678300 R15: 0000000000022000 [ 398.755339][ T3467] [ 399.020923][ T3546] FAULT_INJECTION: forcing a failure. [ 399.020923][ T3546] name failslab, interval 1, probability 0, space 0, times 0 [ 399.021311][ T3546] CPU: 1 PID: 3546 Comm: syz-executor.4 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 [ 399.021351][ T3546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.021368][ T3546] Call Trace: [ 399.021376][ T3546] [ 399.021386][ T3546] dump_stack_lvl+0xcd/0x134 [ 399.021423][ T3546] should_fail.cold+0x5/0xa [ 399.021454][ T3546] ? bpf_check+0x137/0xbac0 [ 399.021492][ T3546] should_failslab+0x5/0x10 [ 399.021531][ T3546] kmem_cache_alloc_trace+0x55/0x2c0 [ 399.021581][ T3546] bpf_check+0x137/0xbac0 [ 399.021631][ T3546] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 399.021671][ T3546] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 399.021719][ T3546] ? bpf_get_btf_vmlinux+0x10/0x10 [ 399.021765][ T3546] ? lock_downgrade+0x6e0/0x6e0 [ 399.021799][ T3546] ? __might_fault+0xd1/0x170 [ 399.021842][ T3546] ? ktime_get_with_offset+0x3f2/0x500 [ 399.021957][ T3546] ? memset+0x20/0x40 [ 399.021989][ T3546] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 399.022033][ T3546] ? bpf_obj_name_cpy+0x144/0x1a0 [ 399.022063][ T3546] ? bpf_prog_load+0xf14/0x21f0 [ 399.022094][ T3546] bpf_prog_load+0xf55/0x21f0 [ 399.022131][ T3546] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 399.022162][ T3546] ? find_held_lock+0x2d/0x110 [ 399.022219][ T3546] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 399.022265][ T3546] __sys_bpf+0x68a/0x5970 [ 399.022300][ T3546] ? bpf_link_get_from_fd+0x110/0x110 [ 399.022347][ T3546] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 399.022390][ T3546] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 399.022439][ T3546] ? find_held_lock+0x2d/0x110 [ 399.022497][ T3546] ? trace_hardirqs_on+0x38/0x1c0 [ 399.022529][ T3546] __x64_sys_bpf+0x75/0xb0 [ 399.022559][ T3546] ? syscall_enter_from_user_mode+0x21/0x70 [ 399.022595][ T3546] do_syscall_64+0x35/0xb0 [ 399.022622][ T3546] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 399.022663][ T3546] RIP: 0033:0x7f56a7d02e99 [ 399.022685][ T3546] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 399.022712][ T3546] RSP: 002b:00007f56a6678168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 399.022742][ T3546] RAX: ffffffffffffffda RBX: 00007f56a7e15f60 RCX: 00007f56a7d02e99 [ 399.022761][ T3546] RDX: 0000000000000080 RSI: 0000000020000200 RDI: 0000000000000005 [ 399.022779][ T3546] RBP: 00007f56a66781d0 R08: 0000000000000000 R09: 0000000000000000 [ 399.022797][ T3546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 399.022814][ T3546] R13: 00007ffccd37371f R14: 00007f56a6678300 R15: 0000000000022000 [ 399.022849][ T3546] 01:49:15 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x3, 0xfe2a, "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", 0x7, 0x81, 0x81, 0x0, 0x7, 0xfb, 0x40}}}, 0x120) 01:49:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 01:49:15 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) r2 = clone3(&(0x7f0000000400)={0x88000, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), {0x41}, &(0x7f00000002c0)=""/94, 0x5e, &(0x7f0000000340)=""/87, &(0x7f00000003c0)=[r1, r1, r0, r0, r0, r1, r0, r0, 0x0], 0x9}, 0x58) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x3f, 0x2, 0x6, 0x0, 0x0, 0x37f, 0x2014, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000140), 0x8}, 0x2820, 0xfffffffffffffff9, 0x401, 0x0, 0xe4c0, 0x1, 0x4d9f, 0x0, 0xffff}, r2, 0x4, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x40, 0x80, 0x7f, 0x3, 0x0, 0x9, 0x200, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x8d3}, 0x5404, 0x8001, 0x9, 0x2, 0x0, 0x89, 0x20a, 0x0, 0x81, 0x0, 0x6}, r1, 0x2, 0xffffffffffffffff, 0x8) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) (async) clone3(&(0x7f0000000400)={0x88000, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), {0x41}, &(0x7f00000002c0)=""/94, 0x5e, &(0x7f0000000340)=""/87, &(0x7f00000003c0)=[r1, r1, r0, r0, r0, r1, r0, r0, 0x0], 0x9}, 0x58) (async) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x3f, 0x2, 0x6, 0x0, 0x0, 0x37f, 0x2014, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000140), 0x8}, 0x2820, 0xfffffffffffffff9, 0x401, 0x0, 0xe4c0, 0x1, 0x4d9f, 0x0, 0xffff}, r2, 0x4, 0xffffffffffffffff, 0x9) (async) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x40, 0x80, 0x7f, 0x3, 0x0, 0x9, 0x200, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x8d3}, 0x5404, 0x8001, 0x9, 0x2, 0x0, 0x89, 0x20a, 0x0, 0x81, 0x0, 0x6}, r1, 0x2, 0xffffffffffffffff, 0x8) (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) (async) 01:49:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000635c1799864f5b332cb100"/37], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000635c1799864f5b332cb100"/37], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async) 01:49:15 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x14a80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r3}, 0x10) (async) r4 = memfd_secret(0x80000) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='task_newtask\x00', r4}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000040)) (async) write$cgroup_int(r6, &(0x7f0000000440), 0x12) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE(r2, 0xc01064c2, &(0x7f0000000300)={0x0, 0x0, r2}) (async) r8 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000340), 0x1, 0x0) (async) syz_io_uring_setup(0x3773, &(0x7f00000005c0)={0x0, 0x0, 0x2, 0x0, 0xa7, 0x0, r1}, &(0x7f0000002000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000400)) (async) syz_io_uring_setup(0x187, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3}, &(0x7f00006d5000/0x2000)=nil, &(0x7f000021f000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000100)=0x0) (async) r11 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r9, r10, &(0x7f0000000080)=@IORING_OP_POLL_ADD={0x6, 0x3, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, {0xa304}, 0x0, {0x0, r11}}, 0x4) (async) syz_io_uring_submit(0x0, 0x0, &(0x7f00000003c0)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000380)=[0xffffffffffffffff, r4, r5, r1, r7, r0, 0xffffffffffffffff, r8, r1], 0x9, 0x0, 0x1, {0x0, r11}}, 0xffffff06) 01:49:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(r0, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r1, &(0x7f0000004200)='t', 0xfff4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map, r1, 0x11}, 0x10) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0', [{0x20, 'threaded\x00'}, {0x20, 'memory.events\x00'}], 0xa, "df206a7b3756918f2439f08ea21b22c10b55d797d961ccc00b6397d516c0a833b9195bea47e380a2b477653fdc72c027826db746302e778b94ed3f3386b77193b42cecd9fdf91dfbf066956e00a77bb6cfb06e2148404d0d8940775689ff75f4e7809c4eb775f123a323b273d524257425bb5a7165a4b38415"}, 0x9d) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r0, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r1, &(0x7f0000004200)='t', 0xfff4) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map, r1, 0x11}, 0x10) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0', [{0x20, 'threaded\x00'}, {0x20, 'memory.events\x00'}], 0xa, "df206a7b3756918f2439f08ea21b22c10b55d797d961ccc00b6397d516c0a833b9195bea47e380a2b477653fdc72c027826db746302e778b94ed3f3386b77193b42cecd9fdf91dfbf066956e00a77bb6cfb06e2148404d0d8940775689ff75f4e7809c4eb775f123a323b273d524257425bb5a7165a4b38415"}, 0x9d) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) [ 400.505917][ T3234] vhci_hcd: connection closed [ 400.509535][ T44] vhci_hcd: stop threads [ 400.541318][ T44] vhci_hcd: release socket [ 400.550464][ T44] vhci_hcd: disconnect device [ 400.564936][ T3695] FAULT_INJECTION: forcing a failure. [ 400.564936][ T3695] name failslab, interval 1, probability 0, space 0, times 0 [ 400.747965][ T3695] CPU: 1 PID: 3695 Comm: syz-executor.4 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 [ 400.757909][ T3695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.767987][ T3695] Call Trace: [ 400.771286][ T3695] [ 400.774232][ T3695] dump_stack_lvl+0xcd/0x134 [ 400.778861][ T3695] should_fail.cold+0x5/0xa [ 400.783392][ T3695] ? bpf_check+0x137/0xbac0 [ 400.787930][ T3695] should_failslab+0x5/0x10 [ 400.792466][ T3695] kmem_cache_alloc_trace+0x55/0x2c0 [ 400.797806][ T3695] bpf_check+0x137/0xbac0 [ 400.802183][ T3695] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 400.808196][ T3695] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 400.814218][ T3695] ? bpf_get_btf_vmlinux+0x10/0x10 [ 400.819375][ T3695] ? lock_downgrade+0x6e0/0x6e0 [ 400.824255][ T3695] ? __might_fault+0xd1/0x170 [ 400.828975][ T3695] ? ktime_get_with_offset+0x3f2/0x500 [ 400.834467][ T3695] ? memset+0x20/0x40 [ 400.838470][ T3695] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 400.844748][ T3695] ? bpf_obj_name_cpy+0x144/0x1a0 [ 400.849796][ T3695] ? bpf_prog_load+0xf14/0x21f0 [ 400.854671][ T3695] bpf_prog_load+0xf55/0x21f0 [ 400.859380][ T3695] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 400.865295][ T3695] ? find_held_lock+0x2d/0x110 [ 400.870110][ T3695] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 400.876395][ T3695] __sys_bpf+0x68a/0x5970 [ 400.880751][ T3695] ? bpf_link_get_from_fd+0x110/0x110 [ 400.886157][ T3695] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 400.892168][ T3695] ? lockdep_hardirqs_on_prepare+0x400/0x400 01:49:15 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000002500)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x40402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000200000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000040)) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) ioctl$LOOP_SET_FD(r5, 0x4c00, r0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0xf00, 0x8, 0x1, 0x10, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x3, 0xe}, 0x48) write$cgroup_int(r3, &(0x7f0000000440), 0x12) r6 = gettid() r7 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r8 = openat(r7, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r8, &(0x7f0000004200)='t', 0xfff4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000480)={0x1, 0x80, 0x5, 0x4, 0x1, 0xa9, 0x0, 0xe596, 0x4a0b6, 0xd, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x8, 0x8}, 0x4f0, 0x81, 0x4, 0x7, 0x8, 0x6, 0x8, 0x0, 0xe0, 0x0, 0x1000}) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x1, 0xd0, 0x81, 0x2, 0x0, 0x9, 0x80, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x4, @perf_config_ext={0x20, 0xff}, 0x8080, 0x59, 0x5, 0x0, 0x4000000000000006, 0x200, 0x5, 0x0, 0x6, 0x0, 0x1}, r6, 0xffffffffffffffff, r8, 0x3) 01:49:15 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x408241, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) tkill(r0, 0x36) [ 400.898191][ T3695] ? find_held_lock+0x2d/0x110 [ 400.903008][ T3695] ? trace_hardirqs_on+0x38/0x1c0 [ 400.908051][ T3695] __x64_sys_bpf+0x75/0xb0 [ 400.912495][ T3695] ? syscall_enter_from_user_mode+0x21/0x70 [ 400.918418][ T3695] do_syscall_64+0x35/0xb0 [ 400.922855][ T3695] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 400.928777][ T3695] RIP: 0033:0x7f56a7d02e99 [ 400.933207][ T3695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 400.952839][ T3695] RSP: 002b:00007f56a6678168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 400.961274][ T3695] RAX: ffffffffffffffda RBX: 00007f56a7e15f60 RCX: 00007f56a7d02e99 [ 400.969270][ T3695] RDX: 0000000000000080 RSI: 0000000020000200 RDI: 0000000000000005 [ 400.977264][ T3695] RBP: 00007f56a66781d0 R08: 0000000000000000 R09: 0000000000000000 [ 400.985246][ T3695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 400.993236][ T3695] R13: 00007ffccd37371f R14: 00007f56a6678300 R15: 0000000000022000 [ 401.001247][ T3695] 01:49:15 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x3, 0xfe2a, "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", 0x7, 0x81, 0x81, 0x0, 0x7, 0xfb, 0x40}}}, 0x120) 01:49:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc, 0x30000, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) fcntl$setsig(r3, 0xa, 0x11) ioctl$NS_GET_USERNS(r2, 0xb701, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x100000001, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000240)={0x3, 0xc, 0x4, 0x3}, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x4}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000440), 0x161000, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r4, &(0x7f0000000600)={0xc, 0x8, 0xfa00, {&(0x7f0000000480)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 11) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 01:49:15 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) r0 = perf_event_open(&(0x7f0000002500)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x40402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000200000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000040)) (async) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) ioctl$LOOP_SET_FD(r5, 0x4c00, r0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0xf00, 0x8, 0x1, 0x10, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x3, 0xe}, 0x48) write$cgroup_int(r3, &(0x7f0000000440), 0x12) (async) r6 = gettid() (async) r7 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r8 = openat(r7, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r8, &(0x7f0000004200)='t', 0xfff4) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000480)={0x1, 0x80, 0x5, 0x4, 0x1, 0xa9, 0x0, 0xe596, 0x4a0b6, 0xd, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x8, 0x8}, 0x4f0, 0x81, 0x4, 0x7, 0x8, 0x6, 0x8, 0x0, 0xe0, 0x0, 0x1000}) (async) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x1, 0xd0, 0x81, 0x2, 0x0, 0x9, 0x80, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x4, @perf_config_ext={0x20, 0xff}, 0x8080, 0x59, 0x5, 0x0, 0x4000000000000006, 0x200, 0x5, 0x0, 0x6, 0x0, 0x1}, r6, 0xffffffffffffffff, r8, 0x3) 01:49:15 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x408241, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) tkill(r0, 0x36) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x408241, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) (async) tkill(r0, 0x36) (async) [ 401.392482][ T4041] FAULT_INJECTION: forcing a failure. [ 401.392482][ T4041] name failslab, interval 1, probability 0, space 0, times 0 [ 401.437662][ T4041] CPU: 1 PID: 4041 Comm: syz-executor.4 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 [ 401.447581][ T4041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.457651][ T4041] Call Trace: [ 401.460941][ T4041] [ 401.463878][ T4041] dump_stack_lvl+0xcd/0x134 [ 401.468581][ T4041] should_fail.cold+0x5/0xa [ 401.473099][ T4041] should_failslab+0x5/0x10 [ 401.477625][ T4041] kmem_cache_alloc_node+0x65/0x3e0 [ 401.482841][ T4041] ? alloc_vmap_area+0x164/0x1dc0 [ 401.487887][ T4041] alloc_vmap_area+0x164/0x1dc0 [ 401.492755][ T4041] ? kmem_cache_alloc_node_trace+0x46/0x300 [ 401.498678][ T4041] ? free_vmap_area+0x1ac0/0x1ac0 [ 401.503716][ T4041] ? rcu_read_lock_sched_held+0x3a/0x70 [ 401.509275][ T4041] ? trace_kmalloc_node+0x32/0x100 [ 401.514407][ T4041] __get_vm_area_node.constprop.0+0x128/0x380 [ 401.520501][ T4041] __vmalloc_node_range+0x154/0xf80 [ 401.525706][ T4041] ? bpf_check+0x1e1/0xbac0 [ 401.530227][ T4041] ? bpf_check+0x1e1/0xbac0 [ 401.534746][ T4041] ? kmem_cache_alloc_trace+0x42/0x2c0 [ 401.540228][ T4041] ? vfree_atomic+0xe0/0xe0 [ 401.544736][ T4041] ? bpf_check+0x1e1/0xbac0 [ 401.549339][ T4041] vzalloc+0x67/0x80 [ 401.553244][ T4041] ? bpf_check+0x1e1/0xbac0 [ 401.557759][ T4041] bpf_check+0x1e1/0xbac0 [ 401.562126][ T4041] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 401.568125][ T4041] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 401.574140][ T4041] ? bpf_get_btf_vmlinux+0x10/0x10 [ 401.579270][ T4041] ? lock_downgrade+0x6e0/0x6e0 [ 401.584130][ T4041] ? __might_fault+0xd1/0x170 [ 401.588910][ T4041] ? ktime_get_with_offset+0x3f2/0x500 [ 401.594385][ T4041] ? memset+0x20/0x40 [ 401.598375][ T4041] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 401.604636][ T4041] ? bpf_obj_name_cpy+0x144/0x1a0 [ 401.609667][ T4041] ? bpf_prog_load+0xf14/0x21f0 [ 401.614524][ T4041] bpf_prog_load+0xf55/0x21f0 [ 401.619216][ T4041] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 401.625128][ T4041] ? find_held_lock+0x2d/0x110 [ 401.629930][ T4041] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 401.636204][ T4041] __sys_bpf+0x68a/0x5970 [ 401.640563][ T4041] ? bpf_link_get_from_fd+0x110/0x110 [ 401.646212][ T4041] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 401.652212][ T4041] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 401.658219][ T4041] ? find_held_lock+0x2d/0x110 [ 401.663137][ T4041] ? trace_hardirqs_on+0x38/0x1c0 [ 401.668191][ T4041] __x64_sys_bpf+0x75/0xb0 [ 401.672624][ T4041] ? syscall_enter_from_user_mode+0x21/0x70 [ 401.678535][ T4041] do_syscall_64+0x35/0xb0 [ 401.682959][ T4041] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 401.688871][ T4041] RIP: 0033:0x7f56a7d02e99 [ 401.693293][ T4041] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 401.712909][ T4041] RSP: 002b:00007f56a6678168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 401.721329][ T4041] RAX: ffffffffffffffda RBX: 00007f56a7e15f60 RCX: 00007f56a7d02e99 [ 401.729301][ T4041] RDX: 0000000000000080 RSI: 0000000020000200 RDI: 0000000000000005 01:49:16 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x3, 0xfe2a, "26b902301559f3ff33381466ccb442fc2264cc27561854579e184831bef48a4027fe1228c161410f6624f05a56de058481beef5e0467fe662494c5a29b3ee4b476da32d3e78dff8b5a458203794725a043e3600b3d4f91221566fb13a5e306c19b4d68f217eeccfb14a0caf0131b2244be3d0bb324c0ea8d9fcb12e17059889d817cf87e28790379203e7ad0526dc2756ee3fe421ef5912505046bc88cbf3d67ab61b18182892a39fe30b66802a5b01ffbeb0b54c760d8e7d27fdf8a85d211b3f137620d96c17c7806c99df2c58151ffc817b8326ef82dbaf6e658a51f07e823e4d1f9465cc4fe7d4d72ee45dd15c81c02d78c8b2ac93848de725b60e2b1f83c", 0x7, 0x81, 0x81, 0x0, 0x7, 0xfb, 0x40}}}, 0x120) 01:49:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc, 0x30000, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) fcntl$setsig(r3, 0xa, 0x11) ioctl$NS_GET_USERNS(r2, 0xb701, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x100000001, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000240)={0x3, 0xc, 0x4, 0x3}, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x4}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000440), 0x161000, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r4, &(0x7f0000000600)={0xc, 0x8, 0xfa00, {&(0x7f0000000480)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc, 0x30000, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') (async) openat$urandom(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) (async) fcntl$setsig(r3, 0xa, 0x11) (async) ioctl$NS_GET_USERNS(r2, 0xb701, 0x0) (async) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x100000001, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000240)={0x3, 0xc, 0x4, 0x3}, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x4}}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000440), 0x161000, 0x0) (async) write$RDMA_USER_CM_CMD_GET_EVENT(r4, &(0x7f0000000600)={0xc, 0x8, 0xfa00, {&(0x7f0000000480)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) [ 401.737276][ T4041] RBP: 00007f56a66781d0 R08: 0000000000000000 R09: 0000000000000000 [ 401.745249][ T4041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 401.753219][ T4041] R13: 00007ffccd37371f R14: 00007f56a6678300 R15: 0000000000022000 [ 401.761208][ T4041] 01:49:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000d10000635cb1bd8255ae3c82321891e8d0a09e2ecdb3305e5de62ba526bf54bb7bb088954c64deb58c44b1c5a791bb15c93ea809c4d12906042137c846fbb0c8cc669532f47b7c4cccdfb962be51bd7afeb0ac45e3f73fcfccc27939"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:49:16 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000002500)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x40402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000200000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000040)) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) ioctl$LOOP_SET_FD(r5, 0x4c00, r0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0xf00, 0x8, 0x1, 0x10, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x3, 0xe}, 0x48) write$cgroup_int(r3, &(0x7f0000000440), 0x12) r6 = gettid() r7 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r8 = openat(r7, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r8, &(0x7f0000004200)='t', 0xfff4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000480)={0x1, 0x80, 0x5, 0x4, 0x1, 0xa9, 0x0, 0xe596, 0x4a0b6, 0xd, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x8, 0x8}, 0x4f0, 0x81, 0x4, 0x7, 0x8, 0x6, 0x8, 0x0, 0xe0, 0x0, 0x1000}) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x1, 0xd0, 0x81, 0x2, 0x0, 0x9, 0x80, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x4, @perf_config_ext={0x20, 0xff}, 0x8080, 0x59, 0x5, 0x0, 0x4000000000000006, 0x200, 0x5, 0x0, 0x6, 0x0, 0x1}, r6, 0xffffffffffffffff, r8, 0x3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x40402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000200000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000040)) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r4, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) ioctl$LOOP_SET_FD(r5, 0x4c00, r0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0xf00, 0x8, 0x1, 0x10, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x3, 0xe}, 0x48) (async) write$cgroup_int(r3, &(0x7f0000000440), 0x12) (async) gettid() (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r7, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r8, &(0x7f0000004200)='t', 0xfff4) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000480)={0x1, 0x80, 0x5, 0x4, 0x1, 0xa9, 0x0, 0xe596, 0x4a0b6, 0xd, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x8, 0x8}, 0x4f0, 0x81, 0x4, 0x7, 0x8, 0x6, 0x8, 0x0, 0xe0, 0x0, 0x1000}) (async) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x1, 0xd0, 0x81, 0x2, 0x0, 0x9, 0x80, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x4, @perf_config_ext={0x20, 0xff}, 0x8080, 0x59, 0x5, 0x0, 0x4000000000000006, 0x200, 0x5, 0x0, 0x6, 0x0, 0x1}, r6, 0xffffffffffffffff, r8, 0x3) (async) 01:49:16 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x408241, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) tkill(r0, 0x36) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x408241, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) (async) tkill(r0, 0x36) (async) 01:49:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 01:49:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async, rerun: 64) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc, 0x30000, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') (async) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) fcntl$setsig(r3, 0xa, 0x11) (async, rerun: 32) ioctl$NS_GET_USERNS(r2, 0xb701, 0x0) (async, rerun: 32) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x100000001, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000240)={0x3, 0xc, 0x4, 0x3}, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x4}}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000440), 0x161000, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r4, &(0x7f0000000600)={0xc, 0x8, 0xfa00, {&(0x7f0000000480)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 402.210871][ T4192] FAULT_INJECTION: forcing a failure. [ 402.210871][ T4192] name failslab, interval 1, probability 0, space 0, times 0 01:49:16 executing program 5: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x1000, 0xbd, &(0x7f0000000480)="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", &(0x7f00000001c0)=""/189, 0x7, 0x0, 0x94, 0x27, &(0x7f0000000280)="688376ccbe0907678321377e393142755b318eed12926a8e7b7d7f5633a59afed4a1a16a8a1bee06816494c4f2efb68ddd19c3cd70439d6d34c7064c7e490c9be1dd10bc90c088becec5622c87ffa9e48525ce4cbd91592fb16e4bdad53e1d2b9f89662bbbcc5917d5064c84dc5650bc897ab4e2639838ee98324a38b4e9057b1611fefebb6d40ac7e9216291a13eb753efad45d", &(0x7f0000000040)="4a3799b3bab863f7a630ee7bd50fb7a65069576bf6aea1d90ba5a9ceb4ebde318f110cee11ca33", 0x0, 0x1cd04949}, 0x48) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) r3 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r4 = openat(r3, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r4, &(0x7f0000004200)='t', 0xfff4) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) write$cgroup_int(r5, &(0x7f0000000440)=0x6, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:16 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000005000000010000000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x100, 0x0) ioctl$SNDCTL_DSP_GETTRIGGER(0xffffffffffffffff, 0x80045010, &(0x7f0000000700)) r4 = syz_io_uring_complete(0x0) r5 = syz_open_dev$vcsu(&(0x7f0000000480), 0x2, 0x20000) r6 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r7 = syz_open_dev$video(&(0x7f0000000580), 0x3ab, 0x1c380) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000005c0)) write(0xffffffffffffffff, &(0x7f0000004200)='t', 0xfff4) pread64(r6, &(0x7f0000000600)=""/180, 0xb4, 0x400) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x8, 0x4, &(0x7f00000001c0)=@raw=[@map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x70}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x9}], &(0x7f00000002c0)='syzkaller\x00', 0x8, 0x80, &(0x7f0000000300)=""/128, 0x1f00, 0x0, '\x00', 0x0, 0xe, r3, 0x8, &(0x7f00000003c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0x9, 0x4ebe4af6, 0x8}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f00000004c0)=[r2, r0, r0, r5, r2, r0, 0xffffffffffffffff, r2]}, 0x80) write$cgroup_int(r2, &(0x7f0000000440), 0x12) [ 402.337629][ T4192] CPU: 0 PID: 4192 Comm: syz-executor.4 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 [ 402.347577][ T4192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.357661][ T4192] Call Trace: [ 402.360953][ T4192] [ 402.363904][ T4192] dump_stack_lvl+0xcd/0x134 [ 402.368539][ T4192] should_fail.cold+0x5/0xa [ 402.373078][ T4192] should_failslab+0x5/0x10 [ 402.377619][ T4192] kmem_cache_alloc_node+0x65/0x3e0 [ 402.382875][ T4192] ? alloc_vmap_area+0x164/0x1dc0 [ 402.387952][ T4192] alloc_vmap_area+0x164/0x1dc0 [ 402.392846][ T4192] ? kmem_cache_alloc_node_trace+0x46/0x300 [ 402.398803][ T4192] ? free_vmap_area+0x1ac0/0x1ac0 [ 402.403862][ T4192] ? rcu_read_lock_sched_held+0x3a/0x70 [ 402.409438][ T4192] ? trace_kmalloc_node+0x32/0x100 [ 402.414604][ T4192] __get_vm_area_node.constprop.0+0x128/0x380 [ 402.420723][ T4192] __vmalloc_node_range+0x154/0xf80 [ 402.425943][ T4192] ? bpf_check+0x1e1/0xbac0 [ 402.430483][ T4192] ? bpf_check+0x1e1/0xbac0 [ 402.435030][ T4192] ? vfree_atomic+0xe0/0xe0 [ 402.439565][ T4192] ? bpf_check+0x1e1/0xbac0 [ 402.444109][ T4192] vzalloc+0x67/0x80 [ 402.448025][ T4192] ? bpf_check+0x1e1/0xbac0 [ 402.452568][ T4192] bpf_check+0x1e1/0xbac0 [ 402.456944][ T4192] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 402.462961][ T4192] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 402.468985][ T4192] ? bpf_get_btf_vmlinux+0x10/0x10 [ 402.474234][ T4192] ? lock_downgrade+0x6e0/0x6e0 [ 402.479114][ T4192] ? __might_fault+0xd1/0x170 01:49:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000d10000635cb1bd8255ae3c82321891e8d0a09e2ecdb3305e5de62ba526bf54bb7bb088954c64deb58c44b1c5a791bb15c93ea809c4d12906042137c846fbb0c8cc669532f47b7c4cccdfb962be51bd7afeb0ac45e3f73fcfccc27939"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 402.483832][ T4192] ? ktime_get_with_offset+0x3f2/0x500 [ 402.489328][ T4192] ? memset+0x20/0x40 [ 402.493333][ T4192] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 402.499608][ T4192] ? bpf_obj_name_cpy+0x144/0x1a0 [ 402.504674][ T4192] ? bpf_prog_load+0xf14/0x21f0 [ 402.504712][ T4192] bpf_prog_load+0xf55/0x21f0 [ 402.504745][ T4192] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 402.504775][ T4192] ? find_held_lock+0x2d/0x110 [ 402.504832][ T4192] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 402.504880][ T4192] __sys_bpf+0x68a/0x5970 [ 402.504912][ T4192] ? bpf_link_get_from_fd+0x110/0x110 01:49:17 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x200c0080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$cont(0xe, r0, 0x8, 0x9) tkill(r0, 0x2) ptrace$setopts(0x4206, r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) r1 = gettid() tkill(r1, 0xb) ptrace$setregs(0xd, r1, 0xffffffffffffff01, &(0x7f0000000080)="15787487a86624285b439abc0720ecd7edb08da24be6990ad1edc20a6d38911d4dbd9494f8096caf990ebcd7eaa9341f954640a6d342c3a0a36e7d3a49cb5a7d51fba60eb4a1788dab3cae3cab19a68595467c2fe524a10a5cbba61ea2a9bdbf481c1dea46348aa140aa7b6a9de6deb9daaa17bb56f5d2bee02c759e") [ 402.504948][ T4192] ? lockdep_hardirqs_on_prepare+0x400/0x400 01:49:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000d10000635cb1bd8255ae3c82321891e8d0a09e2ecdb3305e5de62ba526bf54bb7bb088954c64deb58c44b1c5a791bb15c93ea809c4d12906042137c846fbb0c8cc669532f47b7c4cccdfb962be51bd7afeb0ac45e3f73fcfccc27939"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async, rerun: 64) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (rerun: 64) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 402.504985][ T4192] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 402.505031][ T4192] ? find_held_lock+0x2d/0x110 [ 402.505092][ T4192] ? trace_hardirqs_on+0x38/0x1c0 [ 402.505124][ T4192] __x64_sys_bpf+0x75/0xb0 01:49:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4800b, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bind$x25(r0, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x12) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x141000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000240)=0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) ioctl$INCFS_IOC_FILL_BLOCKS(r1, 0x80106720, &(0x7f0000000680)={0x4, &(0x7f0000000600)=[{0x8, 0x9a, &(0x7f0000000280)="03adf4b933ea8c5a6af951b2c9e0a556e551f386c9c77cf2966f21dc2c46512fdea96f02dc065fa5dc99efa635afc1c6b22ab2853c858208ffae0c1717a7c38f977e83101c499a7d4a22d7148543a2949efc8f83ebbbfd63a615dde99f83fae1f532c7b5b2c2703b7a373758887965295dec9a94f8599936a291b7f3e6320d0b36fec53d1da378447debc849640f41427333bc0d299cf707b3ba", 0x0, 0x1}, {0xfffffc00, 0xc2, &(0x7f0000000340)="a7880322c28d4c1da9dcdefcc85b9d653092736d1f4103e259fe49375ca40940c09c17a56f3e5d63cd18f504d8ea2651a26cabeffb89f5036a9fad7bd2f2265810f95569579b9457e60420371860f0b46785a52e04211e5b9440953c34ff4aa22345f32623a4543dd67f29fe18f653557f886131c522534837e4b252722b23856373bbbd4e36979a8fd6fa6cf5a38b232ffa8b7133837cec863b1f7dbf466909d307c9e50a990fcb33052ca05af701bbc39a3fa1b14bb0f896992302a5e27bf33786", 0x1}, {0x0, 0x9f, &(0x7f0000000440)="1aa8bd27414fdc8cd40167eef3b3d6e64b258c34fc3978b333bfef5ba2e9c2af624dd1f373c0efe676f28110cff226f70aae7148c254f1e5fb620f2b6fc55657c15e0bf2e79c803105f58b43b5e82bc8e0962cb31b75fc34f2672f9c90009fbd0a617afbdb94b35f2dbebac07933c0db0a894e27d10d910fe178fbd77e7ef09ff0ab066ffcbac52c3ebb8a6909d42578af984b3fee6e83298d2f781ac985f6", 0x1}, {0x2, 0xd9, &(0x7f0000000500)="f0a43e1ec791fe0b74962991eca23b7bb1e1ffff817d218f884c3eb2bf334d6d3d5f9bc93d76f3d41ec8051f89b5493da2cc92ff5342b5bf60969aaca9ca9c68f124f3a5d179bf138cb972c6bea83a89b6a4b46af25a02be9c51a016207c0560e15be7d9c78b610fdc0116fb0bca7da9dabd0ab80d55c24db10a1133b76e0651f6ebce83f6acabe3d99897eeb991a9f2eba3a4107807b35537dd4762c84ecfbdeabbf88c7b95d9cb3c971cfba9ce5dd5ebcd2b785993a0ac36e51a65d964affe4dd4aeb8e9be5057347175df8f4e0cd942f33cc5f26e0f0eed", 0x1, 0x3}]}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:17 executing program 5: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x1000, 0xbd, &(0x7f0000000480)="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", &(0x7f00000001c0)=""/189, 0x7, 0x0, 0x94, 0x27, &(0x7f0000000280)="688376ccbe0907678321377e393142755b318eed12926a8e7b7d7f5633a59afed4a1a16a8a1bee06816494c4f2efb68ddd19c3cd70439d6d34c7064c7e490c9be1dd10bc90c088becec5622c87ffa9e48525ce4cbd91592fb16e4bdad53e1d2b9f89662bbbcc5917d5064c84dc5650bc897ab4e2639838ee98324a38b4e9057b1611fefebb6d40ac7e9216291a13eb753efad45d", &(0x7f0000000040)="4a3799b3bab863f7a630ee7bd50fb7a65069576bf6aea1d90ba5a9ceb4ebde318f110cee11ca33", 0x0, 0x1cd04949}, 0x48) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) r3 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r4 = openat(r3, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r4, &(0x7f0000004200)='t', 0xfff4) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) write$cgroup_int(r5, &(0x7f0000000440)=0x6, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x1000, 0xbd, &(0x7f0000000480)="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", &(0x7f00000001c0)=""/189, 0x7, 0x0, 0x94, 0x27, &(0x7f0000000280)="688376ccbe0907678321377e393142755b318eed12926a8e7b7d7f5633a59afed4a1a16a8a1bee06816494c4f2efb68ddd19c3cd70439d6d34c7064c7e490c9be1dd10bc90c088becec5622c87ffa9e48525ce4cbd91592fb16e4bdad53e1d2b9f89662bbbcc5917d5064c84dc5650bc897ab4e2639838ee98324a38b4e9057b1611fefebb6d40ac7e9216291a13eb753efad45d", &(0x7f0000000040)="4a3799b3bab863f7a630ee7bd50fb7a65069576bf6aea1d90ba5a9ceb4ebde318f110cee11ca33", 0x0, 0x1cd04949}, 0x48) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r3, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r4, &(0x7f0000004200)='t', 0xfff4) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) (async) write$cgroup_int(r5, &(0x7f0000000440)=0x6, 0x12) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 01:49:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 13) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 402.505153][ T4192] ? syscall_enter_from_user_mode+0x21/0x70 [ 402.505193][ T4192] do_syscall_64+0x35/0xb0 [ 402.505218][ T4192] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 402.505259][ T4192] RIP: 0033:0x7f56a7d02e99 [ 402.505281][ T4192] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:49:17 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x200c0080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$cont(0xe, r0, 0x8, 0x9) (async) tkill(r0, 0x2) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) (async) r1 = gettid() tkill(r1, 0xb) (async) ptrace$setregs(0xd, r1, 0xffffffffffffff01, &(0x7f0000000080)="15787487a86624285b439abc0720ecd7edb08da24be6990ad1edc20a6d38911d4dbd9494f8096caf990ebcd7eaa9341f954640a6d342c3a0a36e7d3a49cb5a7d51fba60eb4a1788dab3cae3cab19a68595467c2fe524a10a5cbba61ea2a9bdbf481c1dea46348aa140aa7b6a9de6deb9daaa17bb56f5d2bee02c759e") [ 402.505307][ T4192] RSP: 002b:00007f56a6678168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 402.505334][ T4192] RAX: ffffffffffffffda RBX: 00007f56a7e15f60 RCX: 00007f56a7d02e99 [ 402.505353][ T4192] RDX: 0000000000000080 RSI: 0000000020000200 RDI: 0000000000000005 [ 402.505371][ T4192] RBP: 00007f56a66781d0 R08: 0000000000000000 R09: 0000000000000000 [ 402.505389][ T4192] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 402.505406][ T4192] R13: 00007ffccd37371f R14: 00007f56a6678300 R15: 0000000000022000 [ 402.505440][ T4192] [ 402.627863][ T5] usb 20-1: device descriptor read/8, error -110 [ 402.648025][ T4335] loop5: detected capacity change from 0 to 16 [ 402.649950][ T4335] FAT-fs (loop5): Unrecognized mount option "€" or missing value [ 402.775820][ T3976] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 402.931671][ T4346] FAULT_INJECTION: forcing a failure. [ 402.931671][ T4346] name failslab, interval 1, probability 0, space 0, times 0 [ 402.931709][ T4346] CPU: 1 PID: 4346 Comm: syz-executor.4 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 01:49:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 01:49:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4800b, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bind$x25(r0, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x12) (async, rerun: 64) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x141000, 0x0) (rerun: 64) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000240)=0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) (async) ioctl$INCFS_IOC_FILL_BLOCKS(r1, 0x80106720, &(0x7f0000000680)={0x4, &(0x7f0000000600)=[{0x8, 0x9a, &(0x7f0000000280)="03adf4b933ea8c5a6af951b2c9e0a556e551f386c9c77cf2966f21dc2c46512fdea96f02dc065fa5dc99efa635afc1c6b22ab2853c858208ffae0c1717a7c38f977e83101c499a7d4a22d7148543a2949efc8f83ebbbfd63a615dde99f83fae1f532c7b5b2c2703b7a373758887965295dec9a94f8599936a291b7f3e6320d0b36fec53d1da378447debc849640f41427333bc0d299cf707b3ba", 0x0, 0x1}, {0xfffffc00, 0xc2, &(0x7f0000000340)="a7880322c28d4c1da9dcdefcc85b9d653092736d1f4103e259fe49375ca40940c09c17a56f3e5d63cd18f504d8ea2651a26cabeffb89f5036a9fad7bd2f2265810f95569579b9457e60420371860f0b46785a52e04211e5b9440953c34ff4aa22345f32623a4543dd67f29fe18f653557f886131c522534837e4b252722b23856373bbbd4e36979a8fd6fa6cf5a38b232ffa8b7133837cec863b1f7dbf466909d307c9e50a990fcb33052ca05af701bbc39a3fa1b14bb0f896992302a5e27bf33786", 0x1}, {0x0, 0x9f, &(0x7f0000000440)="1aa8bd27414fdc8cd40167eef3b3d6e64b258c34fc3978b333bfef5ba2e9c2af624dd1f373c0efe676f28110cff226f70aae7148c254f1e5fb620f2b6fc55657c15e0bf2e79c803105f58b43b5e82bc8e0962cb31b75fc34f2672f9c90009fbd0a617afbdb94b35f2dbebac07933c0db0a894e27d10d910fe178fbd77e7ef09ff0ab066ffcbac52c3ebb8a6909d42578af984b3fee6e83298d2f781ac985f6", 0x1}, {0x2, 0xd9, &(0x7f0000000500)="f0a43e1ec791fe0b74962991eca23b7bb1e1ffff817d218f884c3eb2bf334d6d3d5f9bc93d76f3d41ec8051f89b5493da2cc92ff5342b5bf60969aaca9ca9c68f124f3a5d179bf138cb972c6bea83a89b6a4b46af25a02be9c51a016207c0560e15be7d9c78b610fdc0116fb0bca7da9dabd0ab80d55c24db10a1133b76e0651f6ebce83f6acabe3d99897eeb991a9f2eba3a4107807b35537dd4762c84ecfbdeabbf88c7b95d9cb3c971cfba9ce5dd5ebcd2b785993a0ac36e51a65d964affe4dd4aeb8e9be5057347175df8f4e0cd942f33cc5f26e0f0eed", 0x1, 0x3}]}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:17 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000005000000010000000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) (async) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x100, 0x0) ioctl$SNDCTL_DSP_GETTRIGGER(0xffffffffffffffff, 0x80045010, &(0x7f0000000700)) (async) r4 = syz_io_uring_complete(0x0) (async) r5 = syz_open_dev$vcsu(&(0x7f0000000480), 0x2, 0x20000) r6 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) r7 = syz_open_dev$video(&(0x7f0000000580), 0x3ab, 0x1c380) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000005c0)) (async) write(0xffffffffffffffff, &(0x7f0000004200)='t', 0xfff4) (async) pread64(r6, &(0x7f0000000600)=""/180, 0xb4, 0x400) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x8, 0x4, &(0x7f00000001c0)=@raw=[@map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x70}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x9}], &(0x7f00000002c0)='syzkaller\x00', 0x8, 0x80, &(0x7f0000000300)=""/128, 0x1f00, 0x0, '\x00', 0x0, 0xe, r3, 0x8, &(0x7f00000003c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0x9, 0x4ebe4af6, 0x8}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f00000004c0)=[r2, r0, r0, r5, r2, r0, 0xffffffffffffffff, r2]}, 0x80) (async) write$cgroup_int(r2, &(0x7f0000000440), 0x12) [ 402.931739][ T4346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.931755][ T4346] Call Trace: [ 402.931763][ T4346] [ 402.931774][ T4346] dump_stack_lvl+0xcd/0x134 [ 402.931809][ T4346] should_fail.cold+0x5/0xa [ 402.931840][ T4346] ? __get_vm_area_node.constprop.0+0xd3/0x380 [ 402.931884][ T4346] should_failslab+0x5/0x10 [ 402.931927][ T4346] kmem_cache_alloc_node_trace+0x59/0x300 [ 402.931970][ T4346] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 402.932014][ T4346] __get_vm_area_node.constprop.0+0xd3/0x380 [ 402.932061][ T4346] __vmalloc_node_range+0x154/0xf80 [ 402.932087][ T4346] ? bpf_check+0x1e1/0xbac0 [ 402.932124][ T4346] ? bpf_check+0x1e1/0xbac0 [ 402.932168][ T4346] ? vfree_atomic+0xe0/0xe0 [ 402.932197][ T4346] ? bpf_check+0x1e1/0xbac0 [ 402.932236][ T4346] vzalloc+0x67/0x80 [ 402.932260][ T4346] ? bpf_check+0x1e1/0xbac0 [ 402.932296][ T4346] bpf_check+0x1e1/0xbac0 [ 402.932340][ T4346] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 402.932380][ T4346] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 402.932428][ T4346] ? bpf_get_btf_vmlinux+0x10/0x10 [ 402.932475][ T4346] ? lock_downgrade+0x6e0/0x6e0 [ 402.932508][ T4346] ? __might_fault+0xd1/0x170 [ 402.932560][ T4346] ? ktime_get_with_offset+0x3f2/0x500 [ 402.932604][ T4346] ? memset+0x20/0x40 [ 402.932636][ T4346] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 402.932683][ T4346] ? bpf_obj_name_cpy+0x144/0x1a0 [ 402.932714][ T4346] ? bpf_prog_load+0xf14/0x21f0 [ 402.932746][ T4346] bpf_prog_load+0xf55/0x21f0 [ 402.932784][ T4346] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 402.932815][ T4346] ? find_held_lock+0x2d/0x110 [ 402.932872][ T4346] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 402.932920][ T4346] __sys_bpf+0x68a/0x5970 [ 402.932954][ T4346] ? bpf_link_get_from_fd+0x110/0x110 [ 402.932993][ T4346] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 402.933032][ T4346] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 402.933079][ T4346] ? find_held_lock+0x2d/0x110 [ 402.933135][ T4346] ? trace_hardirqs_on+0x38/0x1c0 [ 402.933166][ T4346] __x64_sys_bpf+0x75/0xb0 [ 402.933196][ T4346] ? syscall_enter_from_user_mode+0x21/0x70 [ 402.933233][ T4346] do_syscall_64+0x35/0xb0 [ 402.933259][ T4346] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 402.933299][ T4346] RIP: 0033:0x7f56a7d02e99 [ 402.933320][ T4346] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 402.933346][ T4346] RSP: 002b:00007f56a6678168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 402.933375][ T4346] RAX: ffffffffffffffda RBX: 00007f56a7e15f60 RCX: 00007f56a7d02e99 [ 402.933394][ T4346] RDX: 0000000000000080 RSI: 0000000020000200 RDI: 0000000000000005 [ 402.933411][ T4346] RBP: 00007f56a66781d0 R08: 0000000000000000 R09: 0000000000000000 [ 402.933428][ T4346] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 402.933444][ T4346] R13: 00007ffccd37371f R14: 00007f56a6678300 R15: 0000000000022000 [ 402.933478][ T4346] [ 403.048494][ T5] usb usb20-port1: Cannot enable. Maybe the USB cable is bad? [ 403.048689][ T5] usb usb20-port1: unable to enumerate USB device [ 403.105224][ T4399] loop5: detected capacity change from 0 to 16 [ 403.176906][ T4399] FAT-fs (loop5): Unrecognized mount option "€" or missing value 01:49:18 executing program 5: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x1000, 0xbd, &(0x7f0000000480)="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", &(0x7f00000001c0)=""/189, 0x7, 0x0, 0x94, 0x27, &(0x7f0000000280)="688376ccbe0907678321377e393142755b318eed12926a8e7b7d7f5633a59afed4a1a16a8a1bee06816494c4f2efb68ddd19c3cd70439d6d34c7064c7e490c9be1dd10bc90c088becec5622c87ffa9e48525ce4cbd91592fb16e4bdad53e1d2b9f89662bbbcc5917d5064c84dc5650bc897ab4e2639838ee98324a38b4e9057b1611fefebb6d40ac7e9216291a13eb753efad45d", &(0x7f0000000040)="4a3799b3bab863f7a630ee7bd50fb7a65069576bf6aea1d90ba5a9ceb4ebde318f110cee11ca33", 0x0, 0x1cd04949}, 0x48) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) r3 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r4 = openat(r3, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r4, &(0x7f0000004200)='t', 0xfff4) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) write$cgroup_int(r5, &(0x7f0000000440)=0x6, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x1000, 0xbd, &(0x7f0000000480)="255604d427822ffb090366bc8031a9d7be5fe5240022e5361c4250d08870959ce593f01416a5b3faf3d365ae598883deb95e5e7dcf9aaf17a29806d0cc604f194dac41f0c8166cffaf9a5fdebe419012a748a8ac3fb45b5dd76a48ceabb617bef6967e245ddabf46477abccf9ea44aa7c3af8c15abd7520f62c5af4da4f57ace8b50e3f6e0abaaa99b1c2c01c3d16a1674d775862018ac89fd8c522e2f90f39bc224b52228f5501a9b7de1efedbd0539d35a531c48665641ec597236008a6d024af1f012ef9a0a1c5f5fbf314395719802dfa256fc72510af01f2d2cc78c720c7856b7fe6408e230aa4d4b465c313509fae8fe5b7ea53f3935476d19573d310afa893d2ca561112bb97c81328e8df51cf068532639f4a986145e5a04d5c86267cb489f0d22134aa6975d51b6f579cbeb7aea1772d30504b762f23a8a421e2a1f1c9d12d557016d97a4a22461164e63c961724d85d42922aa4f41bc7445ba5436f5ad0943faa7a7724ca4665c6e76a62bd919da3d61698de40631075c9bb185bb014b4c0d92a3567a89663fcf8b1ec5cd3b4ec651dadfedc99e2c4131062e99f7d5b23f20e8d2992e1228c5505ee5f8f5407343b10e344a177a7364b46fcd478b0ce50d4453aa74ed0369d178009d7c33849cf1b82aa7cc78158c19b5179c3b919fea028727f6b8aecfef9d7a9eb5d14f214173b9d6f0930dfae3952ab9b79218baf3256ad01c788f0e8aa668d1691a50e2c6a646dee0b10ee7b2318239714bdb9c83779303a8848065f93cfe0e05886259d3da2c478421838da4fc750fd3d9612dc80d80deac558027252f98979fea62eb228871b66d61f619a3f89def668a89206546750703252cadb6fd3da6ef921395dbd10a66dfdec3b59c75eecd04128bbeca2df1e2146481b86ce060e41e8f3e195fc91ca741bbf8138f360b2fdb3812797d3f8f6847df9d63fe0b00739640403f7d5e7ed4432f71995af6710776a3ef8cbf97a18bce7a919237430358ba740a3a98fab81ca5bad6b2b2b6766d7a6c08846793d263d4516795428edd8682b2af681571239fd47fb53a211ecd0b91509473d7639bae260a2f8adcd382e7bef166730e0f6dd0265e64e881c1a6f23f6b6542d2d995e0e9fc106da6e37518aa0a4dba3fd9740555b275a09326048b801101b810d23f352ab5ccd0d9eb58a745dcd4492b248c261ee68bc8953f86d6c8a9e4eb294f2ed2c8981b729bd6872ae5827bf1738c7f69b18a398b08bbd20509575e5c34e8f41db186762006536a6798f08c75d63c01f7e6cbc673f2f6227f0f3eabdb2b34211e14d95f9b38f04c5a93a49985c70213b88af12ede207251bbc7cc36ee49c158257bb57b15ffb765e7ada17d0967fcf80a19b381c39993deb4dd75755687a68c5c7220433cf28242943347a8564bb96db1519df093d674940c207a8861a73559f5390292de00727cb204879107b78872d0f83d85a2ee90424f2e4afd4b80536318441362cebaf9c1446f72f001338b033dad61129d875bfb11533caa38bdc6016abd0381643d0dc4b95dd033422bc9a82fc937b0af6503a410395e97c76e96f4a99eadf5156efe10f0f0198cab916f2e0e84d67fcda41e0ff976c01ffe69068f28ed31f033c707c9d78e6bb032366130793e34141b1c7c633d41f91d5583571bad4d67f3eba38b8dc26a712ace649cea8e800bf30394d5e0b2e51cc4fecc3c0917deb69fe4db5d19404dda6111c0532738043e6a188aee8569fa3960483658df0c6e9a6beda3fa78fd431b8ed41fa44dce176b34d373fdb21dcd45c12595da21b590ee01ee9fd7e72b4c61ba05c026099c25ab9cecd57179f356f313509e5813414a89cfbce5f1e8fdc439849645396f09d21bc6148430673bb177f7579406eed88e14f7542c64e27ec403a5bfa9e166d5ea733ea3830b18560af1440aa6c777ce3af8c18c82e8ea6201a0d1a6d7dc661a08039576d615f04f5c555b5f842750170b954425b11a36ba03c47b5ed8de0ce5da63d18359cc924ae98f24c00475965a2f0a04ed067523a91a1543497a0f7e3994d82f892a2961566b4e5d531e926fb2269b7d8fda1b00c535600e378a4ca5baa21742a79fae622297ac3696fab570d8bf7a5f716cf4561e5987ae36853850c6d8350e5ee3c67a873beff7ba0841c262a877076cc3bf5845c266ca8827a993aca7bfcc2161f093aef7834f03c6194c8552a1c19ca43a592695d4fc7a4d97632cf4cb4c694fc3a6c672398f0c3cd296e22a1658b897c6c59a8259ce421002b83f757ea8cdc8c07003f94c644cf403d79fd87c523e15ffbd1cdd9cf9fb931997700cbf9bb01cc53819acffeb52f93af4ab2e6ad14f70975a60c24c578fea8864fe791d32cc81ad2b8af6adfc3824da49c9e95cc80f901e86ef1a1cd2508aada56091dfba6af0aa865d07b2ddb2df6eb81de689ee9e873b195270f8f9eec34ca1f389a66922ade9147785545f783e1a7493ec924a09ae6885f18d47de6df82a2eaf0dd4957ceecf32981877dc328ea1e59d2ecc20b1e97188e4f965be5b57f2cf436d9b7b9b42a4723d62876597c430c1716346a3a87e7a30e08959951057ee5150c4bdb94b8b2aa4535ff51d33d32ca4d1c760b9f064c8c0e9e2010dafb08aa0ae4e5eeacbb649e492e0437e641c32b7492e766d47a5afecbd64b3522473fe9ffc4b756927af8ef31410f1ec9753a65ae2f9dc7c81a105c2fc523195318b6944c7c7f57e5680d7d30bd7b9a3eb95d960f31270725f31642cf08d9b6da61a8baf333d27ff4b1aa97490e15e267818027be058536c3d53db0d87fdd958b48e4689c0207cffc4b3788a75a8cb577e161463ad88cdcb1b3ce4a4183b00b338564a004ff7be15a3d641b36e80b208e2e38e845eb912c19bf111794dae5bc056410cda79755e554bdb4ac7f43356b8dceec6a5f6deeb2b55b74269a89e71beefe36aeb6388a5ee4356e19cc78dc0f08fc5c7c711cb232f2640e148fdda0e2ca26b23f37d06d6be9cb6df50fcd9d9bc16f173ec482555cbad8b0e8fa6f8abcca60db0df5f08fb98ce37385ee341b4b7183ebf84f29d0c110d6109b588e90d6c3a2fb6d34fae4646cc4547cb3535e23dd203214c6ede1fad161c45725664a5fbb4ee4d19d672ba3e3a1fa167253df2e862a9f12b88af8f65154bd8c6522cda5ab991b07288a0f40389028bf4b987e92b52ee82f1b72af2cc6f5c0ed84cc2ff5b41067a12dccbbb9a4dc8686e9ac53839d8129f14e9abbfcda6c25c30cd8b5302928f88ef163d747cb246786f80008b0d9fc5fa29c10363fcdc86f59d37ec2d457c2890b92e9c480ed83fcbbaeffdfde9fd0a57fed7f5d3af9cacdcd22a0f6b2ee8b9f477d4e560a01df6737a6075b740ba4351c021492787a70d3ec4496197351309c0b65ae4a1f10d52fd4bf22d5e4290d7ce2142a5aca316486719e83dd6c40e068f0f48af57589c38055c157d06403f67d3889baf6736aa940631ad374392ee5ca4cf9acdc8ea636000d85299e30917e7a596474ddf02e3ea0b5fccd88f175b6149ee76fd18b615a33eedd6441972ad60ec926c641c75a58ec58746eb1c1ab7bb334ab8aca9484c472f19af0565eaf01a666e254c3d1acbb1f558fc3633de5363c1d35111ab0ae85036ed112cb1cb1b940b694769a9b1cf8d53006c59593f9be54ebb4a3d0228b055106b450343ab5b908b3e42fc68634abde3e3f5efb03540470aa6f5950b7785de5f4b53dc174d11773d5231e6a7fc922e6fc128bc350e82c71ecb367f9f7262f2d533f79f1a7323daaeb795460ff6a950bba6e963ec4d25fbc231aae893f0faf8e52fa6a82d658ad6cda1da6cde7e987e80033723aaa9ac635a508f716d04ed89e4020a87f459836149edf5f098767672f0a6d1fd658a17c7c6049f42e5ad391c48efa08090a7551be53b8c820f25181e58c6d7e3b054a163343b41b3aae8baed5afbbd2829ef1dd807a128d85ac06592b9867e55001ad83e343ce0df8a773a6d191a95ee1f9588448e4a82e076c056c116891aeb866b5dcb0694093b6c32b35b810d875585ab2e1ed706e63c097285be2d5d2d445e85b2d5a26809fd96b62cb32b7ea92d298948e05bf452b463b239e20e2dd6a6dfaadd9a66538fa56359420a9defc1b3c9d5d37df0dfce9a7b7bf9588f0d2025e5969bb494dc53dd54e836750aaba3e74de9577cf999277d97309cd7ca0f3f11d6151e7e4da2873b0cfb740cf8e178ee6465edfe247c99b6f815112b4e2d64a1bc07634417a4d197e1a6c874bde2d42f3ff661e5e909aa4be6fbf6a135312c76459eaee52a2eeae4daab5d1d7b6e44de24efbc74eccfeba8e9557cc01e073301bb174bc1a8a26ff1c3be20656a0c1f625f18027ed57b8ac0e26e6146cde5f325057bf6d13305479a978c6494afedcd345e34cc4a5e72f825b111c179e3c7f8a4703c66616990b3908555b9b5d8dd63932e4fa01844c7b446176268220c28b5dd0c7cec0ab3ad05febf4c0270cf20598872fa3ee803adbc395633e6950a0a491af365bb22383b1cd1c22cd109c3d41163d0402727f2d6d9bc419fa61958009a531d8e316223ee2f32f41d0efc221eeb575fe88c5cd17e882e379e2ae3cd219daefde72c0cca5afb38295b07e75f45cd7f14e0e211fbaceae18d8bf7841aa746c07d65f1231793f13d3be1f3dbd1dcd959dcd0747c86059ac862732ade21b292ee88d15316c57b4059acd6df61c2298f275b3e7894ae9e9208673930100c3c0a85ec76e0c88374be6f6e1b8aaa356d6683cc5b96dc0cbf8756c0afaabd5b86d17e88ff9800859f25a30d6bfe1b75a0f021938d156e0391680e50eae8733b563363ad078ed45524a73fbe51cf813ca116d47294c17b54368d7cbe150d19fae90ce0f3cfc5457c0ce9296c0a8e67a29160cec5218492291f78264348eafe67f0186fe98216ca8ffbd46f726e52d298022ec3dc656f8d5675a392e42dff1d29f9c4cb013c82f2af6023ec877aa9c7d38fd46683d1651deb99f577b422b496f57f6ab316b09476ee4f893fcac300022fbd8f94aad5e1ebbd3e11886ed8b8beea10edb06ffa4fc21f0e40a7c4d68023bf9aa1f65375d077935f32396ebe022d8f27ca4b2fbe838f38803574af30adeef3e16b4a7c4d5bcad12dc0a46b64bdbfdb62e4ac217b40c00af7a362021ecd262ba065f66e447484cf71480ff88a2c1d23a8a1ab39de4fbe1072832ccc715052805bb9927caf86634fdfe58aad20979c672fc71c4f6965f4819cd0250823aabd07c71e6a14c01924b875329b3a2d83712f9b35d00a2c82ed23dcaffd7cfdfdc3dcca8347bf899b5a914442ebd1da905efa4de03a40c96f233b5c7362dee79ecf3d838137c5402586a06c9a7a206e0fb3d21daac8cc3ff39d58086bb8a3862c776b06e33bf33dd7874dc70bcbde70dd5802ca11ac23dc3705daed7105a67cd5dbdcd6684d98fb562040a73c7846eeb94e445c499ede80819ad28e985c9575a662735da6df2c11cf7e3b2362c3ffa6b4c79639a2e8af6e71735dc36bfc865f408e9bb5bcc07d96f8c7c6a5c005d62dfceed9bd8eedc7c15b39ff10caf5e6d8ebef46b2cffdeab173fe5ca27aea65fd825d8e8ae1a5085d7809d80e4f53a537cacd0aceb39477e54572b408f390d4b3e00544d846a669acc09fc3de1940063949f81220bdc85e1f9b857f8ceb00e86471381a0f2e314f4d5df17f3983013da15ccc00102152ce0245c459c9d83278ec0198b9496475068b86a2938a960684afd6b24433eb70e950", &(0x7f00000001c0)=""/189, 0x7, 0x0, 0x94, 0x27, &(0x7f0000000280)="688376ccbe0907678321377e393142755b318eed12926a8e7b7d7f5633a59afed4a1a16a8a1bee06816494c4f2efb68ddd19c3cd70439d6d34c7064c7e490c9be1dd10bc90c088becec5622c87ffa9e48525ce4cbd91592fb16e4bdad53e1d2b9f89662bbbcc5917d5064c84dc5650bc897ab4e2639838ee98324a38b4e9057b1611fefebb6d40ac7e9216291a13eb753efad45d", &(0x7f0000000040)="4a3799b3bab863f7a630ee7bd50fb7a65069576bf6aea1d90ba5a9ceb4ebde318f110cee11ca33", 0x0, 0x1cd04949}, 0x48) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r3, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r4, &(0x7f0000004200)='t', 0xfff4) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) (async) write$cgroup_int(r5, &(0x7f0000000440)=0x6, 0x12) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 01:49:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000500)={0x80, &(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000300)=0x0, {0x3a}, &(0x7f0000000340)=""/208, 0xd0, &(0x7f0000000440)=""/91, &(0x7f00000004c0)=[0xffffffffffffffff], 0x1}, 0x58) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2062}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 403.750864][ T4531] FAULT_INJECTION: forcing a failure. [ 403.750864][ T4531] name failslab, interval 1, probability 0, space 0, times 0 [ 403.783392][ T4531] CPU: 0 PID: 4531 Comm: syz-executor.4 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 01:49:18 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000005000000010000000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) (async) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x100, 0x0) ioctl$SNDCTL_DSP_GETTRIGGER(0xffffffffffffffff, 0x80045010, &(0x7f0000000700)) (async) r4 = syz_io_uring_complete(0x0) (async) r5 = syz_open_dev$vcsu(&(0x7f0000000480), 0x2, 0x20000) (async) r6 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r7 = syz_open_dev$video(&(0x7f0000000580), 0x3ab, 0x1c380) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000005c0)) write(0xffffffffffffffff, &(0x7f0000004200)='t', 0xfff4) pread64(r6, &(0x7f0000000600)=""/180, 0xb4, 0x400) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x8, 0x4, &(0x7f00000001c0)=@raw=[@map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x70}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x9}], &(0x7f00000002c0)='syzkaller\x00', 0x8, 0x80, &(0x7f0000000300)=""/128, 0x1f00, 0x0, '\x00', 0x0, 0xe, r3, 0x8, &(0x7f00000003c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0x9, 0x4ebe4af6, 0x8}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f00000004c0)=[r2, r0, r0, r5, r2, r0, 0xffffffffffffffff, r2]}, 0x80) (async) write$cgroup_int(r2, &(0x7f0000000440), 0x12) 01:49:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4800b, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bind$x25(r0, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x12) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x141000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000240)=0x4) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) (async) ioctl$INCFS_IOC_FILL_BLOCKS(r1, 0x80106720, &(0x7f0000000680)={0x4, &(0x7f0000000600)=[{0x8, 0x9a, &(0x7f0000000280)="03adf4b933ea8c5a6af951b2c9e0a556e551f386c9c77cf2966f21dc2c46512fdea96f02dc065fa5dc99efa635afc1c6b22ab2853c858208ffae0c1717a7c38f977e83101c499a7d4a22d7148543a2949efc8f83ebbbfd63a615dde99f83fae1f532c7b5b2c2703b7a373758887965295dec9a94f8599936a291b7f3e6320d0b36fec53d1da378447debc849640f41427333bc0d299cf707b3ba", 0x0, 0x1}, {0xfffffc00, 0xc2, &(0x7f0000000340)="a7880322c28d4c1da9dcdefcc85b9d653092736d1f4103e259fe49375ca40940c09c17a56f3e5d63cd18f504d8ea2651a26cabeffb89f5036a9fad7bd2f2265810f95569579b9457e60420371860f0b46785a52e04211e5b9440953c34ff4aa22345f32623a4543dd67f29fe18f653557f886131c522534837e4b252722b23856373bbbd4e36979a8fd6fa6cf5a38b232ffa8b7133837cec863b1f7dbf466909d307c9e50a990fcb33052ca05af701bbc39a3fa1b14bb0f896992302a5e27bf33786", 0x1}, {0x0, 0x9f, &(0x7f0000000440)="1aa8bd27414fdc8cd40167eef3b3d6e64b258c34fc3978b333bfef5ba2e9c2af624dd1f373c0efe676f28110cff226f70aae7148c254f1e5fb620f2b6fc55657c15e0bf2e79c803105f58b43b5e82bc8e0962cb31b75fc34f2672f9c90009fbd0a617afbdb94b35f2dbebac07933c0db0a894e27d10d910fe178fbd77e7ef09ff0ab066ffcbac52c3ebb8a6909d42578af984b3fee6e83298d2f781ac985f6", 0x1}, {0x2, 0xd9, &(0x7f0000000500)="f0a43e1ec791fe0b74962991eca23b7bb1e1ffff817d218f884c3eb2bf334d6d3d5f9bc93d76f3d41ec8051f89b5493da2cc92ff5342b5bf60969aaca9ca9c68f124f3a5d179bf138cb972c6bea83a89b6a4b46af25a02be9c51a016207c0560e15be7d9c78b610fdc0116fb0bca7da9dabd0ab80d55c24db10a1133b76e0651f6ebce83f6acabe3d99897eeb991a9f2eba3a4107807b35537dd4762c84ecfbdeabbf88c7b95d9cb3c971cfba9ce5dd5ebcd2b785993a0ac36e51a65d964affe4dd4aeb8e9be5057347175df8f4e0cd942f33cc5f26e0f0eed", 0x1, 0x3}]}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 403.793331][ T4531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 403.803402][ T4531] Call Trace: [ 403.806690][ T4531] [ 403.809634][ T4531] dump_stack_lvl+0xcd/0x134 [ 403.814258][ T4531] should_fail.cold+0x5/0xa [ 403.818787][ T4531] ? __vmalloc_node_range+0x447/0xf80 [ 403.824194][ T4531] should_failslab+0x5/0x10 [ 403.828739][ T4531] __kmalloc_node+0x75/0x380 [ 403.833383][ T4531] __vmalloc_node_range+0x447/0xf80 [ 403.838620][ T4531] ? vfree_atomic+0xe0/0xe0 [ 403.843147][ T4531] ? bpf_check+0x1e1/0xbac0 [ 403.847688][ T4531] vzalloc+0x67/0x80 [ 403.851604][ T4531] ? bpf_check+0x1e1/0xbac0 [ 403.856136][ T4531] bpf_check+0x1e1/0xbac0 [ 403.860510][ T4531] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 403.866525][ T4531] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 403.872554][ T4531] ? bpf_get_btf_vmlinux+0x10/0x10 [ 403.877708][ T4531] ? lock_downgrade+0x6e0/0x6e0 [ 403.882620][ T4531] ? __might_fault+0xd1/0x170 [ 403.887352][ T4531] ? ktime_get_with_offset+0x3f2/0x500 01:49:18 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x200c0080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$cont(0xe, r0, 0x8, 0x9) tkill(r0, 0x2) ptrace$setopts(0x4206, r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) r1 = gettid() tkill(r1, 0xb) ptrace$setregs(0xd, r1, 0xffffffffffffff01, &(0x7f0000000080)="15787487a86624285b439abc0720ecd7edb08da24be6990ad1edc20a6d38911d4dbd9494f8096caf990ebcd7eaa9341f954640a6d342c3a0a36e7d3a49cb5a7d51fba60eb4a1788dab3cae3cab19a68595467c2fe524a10a5cbba61ea2a9bdbf481c1dea46348aa140aa7b6a9de6deb9daaa17bb56f5d2bee02c759e") rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x200c0080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$cont(0xe, r0, 0x8, 0x9) (async) tkill(r0, 0x2) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) (async) gettid() (async) tkill(r1, 0xb) (async) ptrace$setregs(0xd, r1, 0xffffffffffffff01, &(0x7f0000000080)="15787487a86624285b439abc0720ecd7edb08da24be6990ad1edc20a6d38911d4dbd9494f8096caf990ebcd7eaa9341f954640a6d342c3a0a36e7d3a49cb5a7d51fba60eb4a1788dab3cae3cab19a68595467c2fe524a10a5cbba61ea2a9bdbf481c1dea46348aa140aa7b6a9de6deb9daaa17bb56f5d2bee02c759e") (async) 01:49:18 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r2, &(0x7f0000004200)='t', 0xfff4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x800) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 403.887401][ T4531] ? memset+0x20/0x40 [ 403.887436][ T4531] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 403.887488][ T4531] ? bpf_obj_name_cpy+0x144/0x1a0 [ 403.887521][ T4531] ? bpf_prog_load+0xf14/0x21f0 [ 403.887553][ T4531] bpf_prog_load+0xf55/0x21f0 [ 403.887591][ T4531] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 403.887621][ T4531] ? find_held_lock+0x2d/0x110 [ 403.887679][ T4531] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 403.887725][ T4531] __sys_bpf+0x68a/0x5970 [ 403.887760][ T4531] ? bpf_link_get_from_fd+0x110/0x110 [ 403.887798][ T4531] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 403.887837][ T4531] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 403.887885][ T4531] ? find_held_lock+0x2d/0x110 [ 403.887940][ T4531] ? trace_hardirqs_on+0x38/0x1c0 01:49:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 15) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 403.887971][ T4531] __x64_sys_bpf+0x75/0xb0 [ 403.888000][ T4531] ? syscall_enter_from_user_mode+0x21/0x70 [ 403.888037][ T4531] do_syscall_64+0x35/0xb0 [ 403.888065][ T4531] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 403.888105][ T4531] RIP: 0033:0x7f56a7d02e99 [ 403.888128][ T4531] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:49:19 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) signalfd(0xffffffffffffffff, &(0x7f0000000080)={[0x8]}, 0x8) r0 = gettid() rt_sigpending(&(0x7f00000000c0), 0x8) clone(0x1a00, &(0x7f0000000100)="a1fcdb9d1fcb4d8e87b2e3b930e46130694e217b33a77619f9056974fa6ab31fe331a73c909e5432e08e5e671ffe69885ca6c4487a0ffbcea41ef78c402446dc93ffbabd8e356478676d15ab0bd66685a139a9049eb4d613f17bbea9473164463c28cb73e8a6f889", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="24410828542a79c5b4e992ac31e7a5e86bc6d4e243d7d6b2d5296ceaebcce5212ac91feb704cd3314b85bc332f60a793e271fa6b1555ca1df6b2f8edb29f609e8f23c13eb476b1f4518ca7bf7496d973e099eb0c6bfd6f77f8c89cf64d12fbfb54439587249c67d2304a9c833906a6e2544b7d264a2e27bdbee2746b3a752c48db16e00ab924f436002fb91e81f49178a553c07ad47c58e8951fe6382c8b8a24c6500099d1a798a3") rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) [ 403.888155][ T4531] RSP: 002b:00007f56a6678168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 403.888183][ T4531] RAX: ffffffffffffffda RBX: 00007f56a7e15f60 RCX: 00007f56a7d02e99 [ 403.888202][ T4531] RDX: 0000000000000080 RSI: 0000000020000200 RDI: 0000000000000005 [ 403.888218][ T4531] RBP: 00007f56a66781d0 R08: 0000000000000000 R09: 0000000000000000 [ 403.888235][ T4531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 403.888252][ T4531] R13: 00007ffccd37371f R14: 00007f56a6678300 R15: 0000000000022000 [ 403.888286][ T4531] [ 404.264232][ T4605] loop5: detected capacity change from 0 to 16 [ 404.315046][ T4605] FAT-fs (loop5): Unrecognized mount option "€" or missing value 01:49:19 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000400)={&(0x7f00000000c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xb4, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x7}, @ETHTOOL_A_CHANNELS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x1000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3ff}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x2}, @ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}]}, @ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4044}, 0x51348ecb716b10f5) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000280)=""/83) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000040)) write$cgroup_int(r3, &(0x7f0000000440), 0x12) [ 404.631451][ T4752] FAULT_INJECTION: forcing a failure. [ 404.631451][ T4752] name failslab, interval 1, probability 0, space 0, times 0 01:49:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000500)={0x80, &(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000300)=0x0, {0x3a}, &(0x7f0000000340)=""/208, 0xd0, &(0x7f0000000440)=""/91, &(0x7f00000004c0)=[0xffffffffffffffff], 0x1}, 0x58) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2062}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) clone3(&(0x7f0000000500)={0x80, &(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000300), {0x3a}, &(0x7f0000000340)=""/208, 0xd0, &(0x7f0000000440)=""/91, &(0x7f00000004c0)=[0xffffffffffffffff], 0x1}, 0x58) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2062}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async) 01:49:19 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r2, &(0x7f0000004200)='t', 0xfff4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x800) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r2, &(0x7f0000004200)='t', 0xfff4) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x800) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_type(r3, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 01:49:19 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) signalfd(0xffffffffffffffff, &(0x7f0000000080)={[0x8]}, 0x8) (async) r0 = gettid() rt_sigpending(&(0x7f00000000c0), 0x8) (async) clone(0x1a00, &(0x7f0000000100)="a1fcdb9d1fcb4d8e87b2e3b930e46130694e217b33a77619f9056974fa6ab31fe331a73c909e5432e08e5e671ffe69885ca6c4487a0ffbcea41ef78c402446dc93ffbabd8e356478676d15ab0bd66685a139a9049eb4d613f17bbea9473164463c28cb73e8a6f889", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="24410828542a79c5b4e992ac31e7a5e86bc6d4e243d7d6b2d5296ceaebcce5212ac91feb704cd3314b85bc332f60a793e271fa6b1555ca1df6b2f8edb29f609e8f23c13eb476b1f4518ca7bf7496d973e099eb0c6bfd6f77f8c89cf64d12fbfb54439587249c67d2304a9c833906a6e2544b7d264a2e27bdbee2746b3a752c48db16e00ab924f436002fb91e81f49178a553c07ad47c58e8951fe6382c8b8a24c6500099d1a798a3") (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) [ 405.075068][ T4752] CPU: 0 PID: 4752 Comm: syz-executor.4 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 [ 405.085014][ T4752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.095087][ T4752] Call Trace: [ 405.098370][ T4752] [ 405.101321][ T4752] dump_stack_lvl+0xcd/0x134 [ 405.106066][ T4752] should_fail.cold+0x5/0xa [ 405.110596][ T4752] ? __get_vm_area_node.constprop.0+0xd3/0x380 [ 405.116782][ T4752] should_failslab+0x5/0x10 [ 405.121312][ T4752] kmem_cache_alloc_node_trace+0x59/0x300 [ 405.127070][ T4752] __get_vm_area_node.constprop.0+0xd3/0x380 [ 405.133082][ T4752] __vmalloc_node_range+0x154/0xf80 [ 405.138295][ T4752] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 405.143339][ T4752] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 405.148392][ T4752] ? kvmalloc_node+0x3e/0x100 [ 405.153149][ T4752] ? bpf_check+0xc09/0xbac0 [ 405.157668][ T4752] ? bpf_prog_load+0xf55/0x21f0 [ 405.162959][ T4752] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 405.169221][ T4752] ? sort_r+0x41/0x350 [ 405.173294][ T4752] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 405.179378][ T4752] ? __reg64_deduce_bounds+0x160/0x160 [ 405.184843][ T4752] ? vfree_atomic+0xe0/0xe0 [ 405.189349][ T4752] ? add_subprog+0x273/0x380 [ 405.193952][ T4752] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 405.198994][ T4752] vmalloc+0x67/0x80 [ 405.202894][ T4752] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 405.207939][ T4752] bpf_prog_calc_tag+0xc9/0x6c0 [ 405.212810][ T4752] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 405.219075][ T4752] ? __bpf_prog_free+0x190/0x190 [ 405.224038][ T4752] ? check_kfunc_call+0xbf0/0xbf0 [ 405.229081][ T4752] ? rcu_read_lock_sched_held+0x3a/0x70 [ 405.234648][ T4752] ? trace_kmalloc_node+0x32/0x100 [ 405.239777][ T4752] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 405.246036][ T4752] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 405.251856][ T4752] ? check_subprogs+0x511/0x5f0 [ 405.256727][ T4752] bpf_check+0x1c86/0xbac0 [ 405.261180][ T4752] ? bpf_get_btf_vmlinux+0x10/0x10 [ 405.266313][ T4752] ? lock_downgrade+0x6e0/0x6e0 [ 405.271181][ T4752] ? __might_fault+0xd1/0x170 [ 405.275888][ T4752] ? memset+0x20/0x40 [ 405.279880][ T4752] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 405.286134][ T4752] ? bpf_obj_name_cpy+0x144/0x1a0 [ 405.291279][ T4752] ? bpf_prog_load+0xf14/0x21f0 [ 405.296158][ T4752] bpf_prog_load+0xf55/0x21f0 [ 405.300862][ T4752] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 405.306778][ T4752] ? find_held_lock+0x2d/0x110 [ 405.311589][ T4752] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 405.317856][ T4752] __sys_bpf+0x68a/0x5970 [ 405.322201][ T4752] ? bpf_link_get_from_fd+0x110/0x110 [ 405.327592][ T4752] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 405.333588][ T4752] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 405.339591][ T4752] ? find_held_lock+0x2d/0x110 [ 405.344393][ T4752] ? trace_hardirqs_on+0x38/0x1c0 [ 405.349425][ T4752] __x64_sys_bpf+0x75/0xb0 [ 405.353859][ T4752] ? syscall_enter_from_user_mode+0x21/0x70 [ 405.359770][ T4752] do_syscall_64+0x35/0xb0 [ 405.364191][ T4752] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 405.370099][ T4752] RIP: 0033:0x7f56a7d02e99 [ 405.374516][ T4752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 405.394227][ T4752] RSP: 002b:00007f56a6678168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 405.402667][ T4752] RAX: ffffffffffffffda RBX: 00007f56a7e15f60 RCX: 00007f56a7d02e99 [ 405.410651][ T4752] RDX: 0000000000000080 RSI: 0000000020000200 RDI: 0000000000000005 [ 405.418634][ T4752] RBP: 00007f56a66781d0 R08: 0000000000000000 R09: 0000000000000000 [ 405.426627][ T4752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 405.434628][ T4752] R13: 00007ffccd37371f R14: 00007f56a6678300 R15: 0000000000022000 [ 405.442620][ T4752] 01:49:20 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) dup2(r1, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r3}, 0x10) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001480)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x2, 0x1, 0xff, 0x3, 0x0, 0x6, 0x8000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x20, 0x2, @perf_bp={&(0x7f0000000380), 0x1}, 0x40680, 0x80000001, 0x4, 0x9, 0xfc03, 0x0, 0x8, 0x0, 0x10}, 0x0, 0x8, r4, 0x2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write(0xffffffffffffffff, &(0x7f0000004200)='t', 0xfff4) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x9) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000040)="4afe2dd47e6f9fc2a958fecb4408f3d94d4d395f370a", 0x16}, {&(0x7f00000001c0)="5d4eb9951f644da6d078dea9e04e7b47bb97db14157da8279618c9eb37027b9b137fa476b566b147af60913b8e0159d08cc42950175533b18f250b8fdf48aa829fd8c0aef51afdc1356e869a6f09622487deb12af50586885cfa46a3a95bdb0e2ee6fc0d2ec81772bb0803cca2cc833ecf999c056ac7ef3cdb7df3adea297f367fe24038781dd3bc2bb38e8e2139920c4dcec737b36d007e38f4039f714803d3cd7a5622835960da6bb2a4d8204f091951ad2c301530a15d", 0xb8}, {&(0x7f0000000280)="e1e2a33178052e2d038218b93deb716044c3deae43913a9af62dee845362a3a382e2c6f12b8cd56b4c1807926f5a2a9df3437bfd1955dea720e224c1b0707b23a18b32e66ecf29ea54394579afca3d91c39f5ca8b81f834e901573492c1a662600d2da164a43ae2a5e4ffb8f9f278cb63f70f66a1f9c60f14dc90cc5eb6d5f3d693ef05e23c4543a8ee15484d19b64311737a9818162f36df97d055a6d5c86e46fdcf445329f6e864d0f15cb3934c521322586faa3e1b9b3c0cb9098232b5fb719ecf101436aac82f5160c8d0c01320965caf7268ab366d9cf17", 0xda}, {&(0x7f0000000480)="965c1ebad637b45fb954e7745bde785910d2def08a193f2117e2d5698a0ed0f5c715dce6df03e2c7f16584833c3604c251d3db0ddc034e4c4b820a256595642523d7bf0f537cf3ae3e303aefa7805a9aba42340a2c286ac8e3e5f8ada23b9392b0723ba130a13ab9e2871d974bcd19b5d472e1763e4bc2e586d4d3c84d8fbda91b4fb8955067d734305a9f022140a727544481980beb939204356eee97ec81b34800bed93172ca650d6b4ee45cdf57c31942ddac080199b72190984382bba2d20bfb9b3c9cf862ded01c898c5dcaab2be63b30c5bd573b00ca7a839ccbb83c6252feb15934a0220d23862f69277cd84884bc9b451a46c28d0894fd994b49bd1c320dc2e8ad7479c5627414ceea15a894b21cf68dc4385b3b3e6b7edd79e267d5535676884b66276e0814ef0331a1818cfecae27fb36242b1618d6bee4b2c73df3f4480c5365c3acd2f8bba8243385190d9b266e049e688407c0667ee5da8fe928ebee1a65330fc37423a087b070216ff44544a5cf139ba8c670eb832c8ed2baf71af54c41970c3c814b4d756e006cca81a7c947b74feaa686eca51ccf1a69309caf8c6645ffd1620676f8286f62a5bdcdde5f402542e8c2043b58c30081d90c73e3ce369deef7068e00be4d289fb6a6c0f9dbf3a9944b182621fac9e00a7f7c6910c3b039fd3a27faef4d9d2975a5864ee093e21509fc0be6e14d4f975ec6745a7c126da36796987e24323dfeecf1b59806424fa922ff6dcb9cf6e92d34582041b978bd2820a6bfba9c5b88ef2451c9c9a75889b0e460a0927bcd4bb94cac5acebb5e3ce71b4a6ad5de38281fbd839751248a94bbc5de6ee33085ad269a17ce7ecf86d3d18fd454295647ac3ccd5010e656dae6cc09251141a18a39289d8f7dd15213b2a60d300abf2eb92f569ccaf7c824cbc30c768bd0e4a1ed93ceb452bf07fd98be8f767ade999a9baf84d4b404d4bff02f38cc9c5fa065f1d24c289bd0c4e198724a38fe86ea7604dd7fe22d3643920b321b4a1d5f63db3d3316246a586bcc7330fa27079e1dc0121cddfa7ce4b0a13a447ee3365a6b51de370be190da065ade26f931a04ce29bcf830d8ccaf8187856e2fdbcf308a177b87a59a90a226551ba0c1f3f50dc6f8425ccc5c7e70683f4b5d492abe0b35752d6183472fa76f9a4bcebd3b30532d8f5725fc376c124a6987fbfe143341af425b7dcecab9f56b82d43157bf3622496248d745e711352f04e3863175733884ad1441f4a534ab5465dbf5fad3e8005a280a1bd5340a64f5a7f7a1ee8da28562385ddadd21ddaceec00312f38c0236ec9a05a11c753dd505a3e6bad5ce80a82aef019717a04bdecf0b2da65623890107340eda2426d88901609975795e5d1b4f7c609315c429d144148de4cd927769eaaa140ab4372eeec0025043a70e4dd9e8ac2dce127372b19943d07703450453cd1537a4d99a1af5eb8559af379d1f3b4784b6ed014d6894eebd6aee4c1f4c371096fc4d10a105fdb1c414563905a47770e6a4e15c73544501747b4efc1dcc3dba2a4ffff9de9f939678d96d1f5cfcefc24263509be89fb1ba0c8f6131787ebb24f3653a6b9ee51276cfa7cec486b612db19d1daaa8a6a1650c790b6083be16fe24965a23339c2d045c9ee760440ddf12816fdc5af9ffab750ab8bc612a2344fe345bbded6b65a52be37694ece5073f06af5f5d80bbef124c2fd1023d2d214c23d8e6ac463eda259433cba9a66e8759d1b20d8a164fd1eb69e239cc3d54d5f080d3b0f55fce274a55490d1beac354f86b4088451f5f9631f6e9a8e393a0ebb36729166261b5eb4c0fd9946c303cd0afe5a2c335c6663572744040d7e52c6858ee2a8d18deb2320cdce0f708ca2eef44375c46a2daf57468bb979f724f9aa7f8554720872c004429f4f1419c33c308373f2d70ebfbe12ec3ff8435a48013961ca187e3b9328689820393f7abf3d00a808d29f7a0ad4fc400c68926f68c1b9947d0a1e759d3729fad2569b24dae0c64617e410aae9e963e0316b9198abb235940b817f3cf9fc1bb14421d7a689da46e4e4913ec289a98facc5d59369c10e0573bd53b2cd3abf1cf32129a5834199460b996f51cf5e6a9898f6bf1f32b56d4ee9d0c5253badd56e61145e95c58a5177d2c1416b15ed76da8e626657a3c44bae6c3c21baaaa1c732cf69c254546308bbb6e52673297ec7673c83cc2a3f9ce78dce1233680657833fed5988dd7a86dcb0e2d50a433ce75215f465e25bf33d1e1a58deed8ace1e65de46078d0abc9e324683673182411ae633b5dce3208b1d08418450892a7be75ad908d7c552f392e62074a84fcf6c3ce191fc87dea42ec7de8938b99fcfed8bacd9f9f1d07ce9a86e66310463afffd2108b6ffb47d2ea20f7ad0400423310a3c789f676a944feb708af24564ee4cfd7e29ccd6c51b138d802590108d7f6782e288fa222947c622d47c4174ed7248c77c4293344e8ba5b8c7d7bb5eee2d5f403972c68dec0ad9537f64b4011e6c2eaeb4dd026b1bfe95cd72d85c7b606fd49eba3d02c4c9ad0a57115bf9fd6321692b55fb8579166d27827361c7df47390388d6b69c17fc087c5a5855d2ae9320b0a6a55a1f58b7d24a150d33bb9f0101a9839c9c7bb48f6b31aa0736ea10ce772dbc418c9feb4a11c43f6aced7df5f997a95d789af4b27529e48fea123fde7cbc87e24bb2004ddcd3d146586cae5751215d585f025fca964f30d1b5d2ccad7e09fc9ce2f365b26ac7a0e252edeb85776b22c0d6532bbe10619626517b21f7d750f3ceb6b4c9efba048dfff1697a3dd58978f8407bbd06accb7075d8ab62d4a851014d2a689b0ab503e524e6dc41226d4cc1c3a1bffc8adf0c943c52c3929afe8dbede66775dd46f5959486c8b56c29122bce706fe1448896673371e126958f4c987f37a509601e00391b477887cf388ff5052d253da8137ea14116d42b5ed4642eea2250460809ef33d33f46f2df00e6db9dfd9b6b6532142aef2c8a6fdfa5b25070f13572921a09978654fdfaac3c79113a3f7e832c009f57f4bb163d2a369221570c4b41ec0dcb4c6cb1cb825734783140a21380c882b5759adf63a41b99b8d08b06d54674226898c4fec0eb1ba374c28627b28faf3bc2766d228d6551c08b88608f48b2f0ede9b7e9e68d5cbaa2253384ea8bf8b8f42ad9673206612c90c41c65a8a3d029babda934eff116401a395ddad27235a6b879eac548a18e1a5d26d1fd24f11ba445cca2d8cea57c4d5ce0e3186675dee07186e1061f791e2a5a760fa9f83d46b66f9c13e75901f1b404f6df7af821d732a7e4230d9788fd753171577157c0697c23b9276918d233098c23a4686ce8ee2202d342a347e358114b3f95806af0068753d7d1adc788f5c03f8a411abe03fa4c4f1460b8d25eeb6dcd95947735c4e799992811db6682f584534a1af81da8534df48a25a4c2947a1577e51ee69ac17c489accca82de9af2a51d433c6d277299d5df5412a00bd8e1a982d1311412c79dd9b0f001d13c0a5cb4fb4b115ffa3e83da538c32b68b1a7b34866a9368300a80c686213f4efe0cfbe63ea6a9a265cea0799eadbac4821ccbfe20ba032c0a18cd5c4332780ff41759d5811f42ef6267acfcaa5f3f17e070b4e9b26c2dde73a304da80ba56e01ca71cfb72e1f593a1a41db17316a371720f2f4c39250bb21171d27282e646617b6bab144a0d9d919d4789077ced0cfc95420be2f258118adfe2c625279867d97bfd5f712366fe05f05c448f1dbb0b438eee1e851cc80978cfb764185c783fa8215a1e23edc2aab19c636d0b183a6938af81e1c9e882343d5853a06d3d385d54fbb5637b0c53731c81f626be5cc5bbf70d3e6aa8577db43d92aa14a3df76da679df6851e12a40b608295e3ae7918e4ccf7692493572ca22dab4c2a91a59fe8e4720d71bfacc7ab458bc0c3137bfbcc1ea29228959f1f31a087ac32c2e23772a9856d386f72f3303ade99b7f92eb99faa9d59792a61197fc22815588ae6623915953d3b570ef5e1085a7c6bf9056a2198f68dd3adcf9f579e3771ddc86f1c5b9372985f397586ffee2447189aec6dbb8f12f976083b1c0ac282a8fbded41fb5cb92018f58d3e5608800aec337ac18ae87429a17a9e73310e6434702a42b31a254558092237bec42f1aa96fa1bfc7f75c7311edf5fa54533f28205df80c44fa3820ae29b6dfd8cfa91263685b3407feb954843c6aeaa91e3ee0c988d8a863e738370030eaa32a89872419cf653c8302facb6895452a3b72b41257a3f7cc69ae45b4ffced87dd6214bfc60e8a2f2bdb44ab88ec22e994bbbe3616f8096de0467e9aa9a54745e8db8c691311821216f4d77e826716cb30b40742f27c6378e9309acba4ea1e746572697a00bbffbc071918b4300061c1c1a25e2112eb32f22a34a91fa5f26412546941bd6ce7fb6c7629d0eda03e867fe388b309f6f1a36bcd647dafa66cdf07177e0b6d2a2f95962e0327a64c56fb41b4f1b3e43b058953f20308cb3e6f859a9becc6b29a50f875caceb3146374ccdb5877ae54737d197cf232e0f132dc33196d32e6c13a1b0d4c6dc13c38c406c58db60f17ca73fc5bbd5bb849679297b4ea15a8a7d43a51279b45918202619e881b723c215839a5a542cc07e85106d4ad42154e78c7a4927547b73fd393dd21b6c61a01af6d13766bb75779203060ec572f4d17c8303c3db66633ac4d8bd9145daec3ad092f0327c56188f16c65651785397f4c2499e8e61aec81ddfd9234d98d7591079014b62b5da54bf00d9ac1a1c01e897ce7d9e1e60ebefde6535bb1ce97f3218609c969afaaed93e8d3664ad8ae097323b38193beeac2256d0f0b091f9730209740238282ba8c085728bcd377bdfa47960a1e50970e8ece13ac0f49021d4539e37b0e3468296792165225acb2be42525865c29b9c07f5eabdb1f3eaa8e47e356805696a25e9d15c239cce4a536f9963268718793723f7c60a3f9bf1aa41ac2d269efb2b3d0542dce7f5d79303c20407b53dcbff23c1a1c241df196fd63452974940facd841339875ab1de86688fb45304a2d5939929bc37431e6874279b01c120f5d4d8b9c84c94b72fcd8ee7be90575c1f4abc097b8d91b89e22fec96a28f09a8d5a041852e17776293d9f22516ad7a5c76613304a798080ab8676e49b54da47b2fed1eb53ef057c810d01091470ceadff1cdaebb1b1e26b5765dd61a3debd8a76a60e0727d3f2c028b3f52783fca29a0140ef823ec195111b58cd45497f9ca5c71d09939938c377334201ad1461ae7b90e7e63fd49f8172f40254333291cb05526cc44f07d55a586d5860b9bffbfc30d52f98ffcc07e483c9d9253595149b271ab21df29b260adec57dfb8744dd88e3e9295c23b2d011800c594c5fdf1a8ba609a1490890c3e4b33301f5a2ff91957e0a7b15cac0810ab39385e55be645b36adf16c1ff56856480aaa1003911b0aa79052035f0550dde16b9915c16f320cc88a448f0515c47958a09a507ac1b8f77795231ec89501a214b0a065f55f87b7c8712dadc7ef7a1f2a0b10c72de13d87c9277ff3c9841879b42f86a116ea7d81dc7ccf244904d4aa34ed0cc7d52ab132ad2145f8c18e3b9a1f0626d8d729d150442aeb77c3d378ab192abdd0a8d53d2fc848fa8f31852871f16d2e51099a045f7b8350a87911d688864e94eeaf23cb5c58e96e61baf012d3269636677f7f9d0934c6457b2537bc46f0d30ad50d33fecba95456b592c715949a6de1e7008dc7ec103f22d91758b44f67", 0x1000}], 0x4) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f00000014c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="ad000900000000002e2f00696c653000"]) write$cgroup_type(r5, &(0x7f0000001500), 0x9) 01:49:20 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) signalfd(0xffffffffffffffff, &(0x7f0000000080)={[0x8]}, 0x8) r0 = gettid() rt_sigpending(&(0x7f00000000c0), 0x8) clone(0x1a00, &(0x7f0000000100)="a1fcdb9d1fcb4d8e87b2e3b930e46130694e217b33a77619f9056974fa6ab31fe331a73c909e5432e08e5e671ffe69885ca6c4487a0ffbcea41ef78c402446dc93ffbabd8e356478676d15ab0bd66685a139a9049eb4d613f17bbea9473164463c28cb73e8a6f889", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="24410828542a79c5b4e992ac31e7a5e86bc6d4e243d7d6b2d5296ceaebcce5212ac91feb704cd3314b85bc332f60a793e271fa6b1555ca1df6b2f8edb29f609e8f23c13eb476b1f4518ca7bf7496d973e099eb0c6bfd6f77f8c89cf64d12fbfb54439587249c67d2304a9c833906a6e2544b7d264a2e27bdbee2746b3a752c48db16e00ab924f436002fb91e81f49178a553c07ad47c58e8951fe6382c8b8a24c6500099d1a798a3") rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) signalfd(0xffffffffffffffff, &(0x7f0000000080)={[0x8]}, 0x8) (async) gettid() (async) rt_sigpending(&(0x7f00000000c0), 0x8) (async) clone(0x1a00, &(0x7f0000000100)="a1fcdb9d1fcb4d8e87b2e3b930e46130694e217b33a77619f9056974fa6ab31fe331a73c909e5432e08e5e671ffe69885ca6c4487a0ffbcea41ef78c402446dc93ffbabd8e356478676d15ab0bd66685a139a9049eb4d613f17bbea9473164463c28cb73e8a6f889", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="24410828542a79c5b4e992ac31e7a5e86bc6d4e243d7d6b2d5296ceaebcce5212ac91feb704cd3314b85bc332f60a793e271fa6b1555ca1df6b2f8edb29f609e8f23c13eb476b1f4518ca7bf7496d973e099eb0c6bfd6f77f8c89cf64d12fbfb54439587249c67d2304a9c833906a6e2544b7d264a2e27bdbee2746b3a752c48db16e00ab924f436002fb91e81f49178a553c07ad47c58e8951fe6382c8b8a24c6500099d1a798a3") (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) (async) 01:49:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) clone3(&(0x7f0000000500)={0x80, &(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000300)=0x0, {0x3a}, &(0x7f0000000340)=""/208, 0xd0, &(0x7f0000000440)=""/91, &(0x7f00000004c0)=[0xffffffffffffffff], 0x1}, 0x58) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2062}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:49:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 16) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 01:49:20 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r2, &(0x7f0000004200)='t', 0xfff4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x800) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:20 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) (async) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000400)={&(0x7f00000000c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xb4, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x7}, @ETHTOOL_A_CHANNELS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x1000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3ff}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x2}, @ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}]}, @ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4044}, 0x51348ecb716b10f5) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000280)=""/83) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000040)) (async) write$cgroup_int(r3, &(0x7f0000000440), 0x12) [ 405.801613][ T5090] FAULT_INJECTION: forcing a failure. [ 405.801613][ T5090] name failslab, interval 1, probability 0, space 0, times 0 01:49:20 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000063c743751c867af5079b32b05bee46783c7cd64d984b95ab9a6d2a87a8f89125f6058701590645a282be388b21b3a6153336dc74bc3898d92dce4a896a1e95fe209f1f16b37e6745070f527085434e351ae384084d9dd8abd0400a937c5ca998e6c871f7f7c00787f10f0aeaef7e818a80a3a4f9254745d786a704d02abcf30a33f85fad39c009c92318aec54543dc6aaf07c12ee8200be9dd400fc07d516c3f44bfbf41d9b1695e89a4b08a1447b915e04b8cb2abc16282b7d8f7d0a09c3b760e8d74b7557f15709e42f64e0a2aac43072614149894c49bc9738a737ad0f7cbc1997d2855655d9ece22e0b0d08d0435f4529dc87379750bb839ca98411e71721d36de7abb66222a2535ee0a12bda77d7c3773348751272304c771308af56c173aacd395dde2d9"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000400)={&(0x7f00000000c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xb4, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x7}, @ETHTOOL_A_CHANNELS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x1000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3ff}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x2}, @ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}]}, @ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4044}, 0x51348ecb716b10f5) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000280)=""/83) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000040)) write$cgroup_int(r3, &(0x7f0000000440), 0x12) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) (async) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000400)={&(0x7f00000000c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xb4, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x7}, @ETHTOOL_A_CHANNELS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x1000}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3ff}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x2}, @ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}]}, @ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4044}, 0x51348ecb716b10f5) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000280)=""/83) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000040)) (async) write$cgroup_int(r3, &(0x7f0000000440), 0x12) (async) [ 405.876990][ T5090] CPU: 0 PID: 5090 Comm: syz-executor.4 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 [ 405.886932][ T5090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.897005][ T5090] Call Trace: [ 405.900300][ T5090] [ 405.903246][ T5090] dump_stack_lvl+0xcd/0x134 [ 405.907869][ T5090] should_fail.cold+0x5/0xa [ 405.912415][ T5090] ? kvmalloc_node+0x3e/0x100 [ 405.917123][ T5090] should_failslab+0x5/0x10 [ 405.921659][ T5090] __kmalloc_node+0x75/0x380 [ 405.926286][ T5090] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 405.932569][ T5090] kvmalloc_node+0x3e/0x100 [ 405.937101][ T5090] bpf_check+0xc09/0xbac0 [ 405.941470][ T5090] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 405.947483][ T5090] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 405.953504][ T5090] ? bpf_get_btf_vmlinux+0x10/0x10 [ 405.958653][ T5090] ? lock_downgrade+0x6e0/0x6e0 [ 405.963536][ T5090] ? __might_fault+0xd1/0x170 [ 405.968253][ T5090] ? ktime_get_with_offset+0x3f2/0x500 [ 405.973745][ T5090] ? memset+0x20/0x40 [ 405.977755][ T5090] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 405.984138][ T5090] ? bpf_obj_name_cpy+0x144/0x1a0 [ 405.989180][ T5090] ? bpf_prog_load+0xf14/0x21f0 [ 405.994059][ T5090] bpf_prog_load+0xf55/0x21f0 [ 405.998935][ T5090] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 406.004819][ T5090] ? find_held_lock+0x2d/0x110 [ 406.009607][ T5090] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 406.015886][ T5090] __sys_bpf+0x68a/0x5970 [ 406.020242][ T5090] ? bpf_link_get_from_fd+0x110/0x110 [ 406.025640][ T5090] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 406.031650][ T5090] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 406.037667][ T5090] ? find_held_lock+0x2d/0x110 [ 406.042475][ T5090] ? trace_hardirqs_on+0x38/0x1c0 [ 406.047517][ T5090] __x64_sys_bpf+0x75/0xb0 [ 406.051950][ T5090] ? syscall_enter_from_user_mode+0x21/0x70 [ 406.057862][ T5090] do_syscall_64+0x35/0xb0 [ 406.062297][ T5090] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 406.068215][ T5090] RIP: 0033:0x7f56a7d02e99 [ 406.072639][ T5090] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 406.092254][ T5090] RSP: 002b:00007f56a6678168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 406.100689][ T5090] RAX: ffffffffffffffda RBX: 00007f56a7e15f60 RCX: 00007f56a7d02e99 [ 406.108666][ T5090] RDX: 0000000000000080 RSI: 0000000020000200 RDI: 0000000000000005 [ 406.116660][ T5090] RBP: 00007f56a66781d0 R08: 0000000000000000 R09: 0000000000000000 01:49:20 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x4, 0xff, 0x5, 0x3f, 0x0, 0x8, 0x242, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x40000, 0x0, 0x8001, 0x4, 0xe3, 0xe0000000, 0x9, 0x0, 0xcf, 0x0, 0x3}, 0xffffffffffffffff, 0x7, r0, 0xb) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:20 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) dup2(r1, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r3}, 0x10) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001480)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x2, 0x1, 0xff, 0x3, 0x0, 0x6, 0x8000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x20, 0x2, @perf_bp={&(0x7f0000000380), 0x1}, 0x40680, 0x80000001, 0x4, 0x9, 0xfc03, 0x0, 0x8, 0x0, 0x10}, 0x0, 0x8, r4, 0x2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write(0xffffffffffffffff, &(0x7f0000004200)='t', 0xfff4) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x9) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000040)="4afe2dd47e6f9fc2a958fecb4408f3d94d4d395f370a", 0x16}, {&(0x7f00000001c0)="5d4eb9951f644da6d078dea9e04e7b47bb97db14157da8279618c9eb37027b9b137fa476b566b147af60913b8e0159d08cc42950175533b18f250b8fdf48aa829fd8c0aef51afdc1356e869a6f09622487deb12af50586885cfa46a3a95bdb0e2ee6fc0d2ec81772bb0803cca2cc833ecf999c056ac7ef3cdb7df3adea297f367fe24038781dd3bc2bb38e8e2139920c4dcec737b36d007e38f4039f714803d3cd7a5622835960da6bb2a4d8204f091951ad2c301530a15d", 0xb8}, {&(0x7f0000000280)="e1e2a33178052e2d038218b93deb716044c3deae43913a9af62dee845362a3a382e2c6f12b8cd56b4c1807926f5a2a9df3437bfd1955dea720e224c1b0707b23a18b32e66ecf29ea54394579afca3d91c39f5ca8b81f834e901573492c1a662600d2da164a43ae2a5e4ffb8f9f278cb63f70f66a1f9c60f14dc90cc5eb6d5f3d693ef05e23c4543a8ee15484d19b64311737a9818162f36df97d055a6d5c86e46fdcf445329f6e864d0f15cb3934c521322586faa3e1b9b3c0cb9098232b5fb719ecf101436aac82f5160c8d0c01320965caf7268ab366d9cf17", 0xda}, {&(0x7f0000000480)="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", 0x1000}], 0x4) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f00000014c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="ad000900000000002e2f00696c653000"]) write$cgroup_type(r5, &(0x7f0000001500), 0x9) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') (async) ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) (async) dup2(r1, 0xffffffffffffffff) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r3}, 0x10) (async) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001480)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x2, 0x1, 0xff, 0x3, 0x0, 0x6, 0x8000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x20, 0x2, @perf_bp={&(0x7f0000000380), 0x1}, 0x40680, 0x80000001, 0x4, 0x9, 0xfc03, 0x0, 0x8, 0x0, 0x10}, 0x0, 0x8, r4, 0x2) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) write(0xffffffffffffffff, &(0x7f0000004200)='t', 0xfff4) (async) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x9) (async) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000040)="4afe2dd47e6f9fc2a958fecb4408f3d94d4d395f370a", 0x16}, {&(0x7f00000001c0)="5d4eb9951f644da6d078dea9e04e7b47bb97db14157da8279618c9eb37027b9b137fa476b566b147af60913b8e0159d08cc42950175533b18f250b8fdf48aa829fd8c0aef51afdc1356e869a6f09622487deb12af50586885cfa46a3a95bdb0e2ee6fc0d2ec81772bb0803cca2cc833ecf999c056ac7ef3cdb7df3adea297f367fe24038781dd3bc2bb38e8e2139920c4dcec737b36d007e38f4039f714803d3cd7a5622835960da6bb2a4d8204f091951ad2c301530a15d", 0xb8}, {&(0x7f0000000280)="e1e2a33178052e2d038218b93deb716044c3deae43913a9af62dee845362a3a382e2c6f12b8cd56b4c1807926f5a2a9df3437bfd1955dea720e224c1b0707b23a18b32e66ecf29ea54394579afca3d91c39f5ca8b81f834e901573492c1a662600d2da164a43ae2a5e4ffb8f9f278cb63f70f66a1f9c60f14dc90cc5eb6d5f3d693ef05e23c4543a8ee15484d19b64311737a9818162f36df97d055a6d5c86e46fdcf445329f6e864d0f15cb3934c521322586faa3e1b9b3c0cb9098232b5fb719ecf101436aac82f5160c8d0c01320965caf7268ab366d9cf17", 0xda}, {&(0x7f0000000480)="965c1ebad637b45fb954e7745bde785910d2def08a193f2117e2d5698a0ed0f5c715dce6df03e2c7f16584833c3604c251d3db0ddc034e4c4b820a256595642523d7bf0f537cf3ae3e303aefa7805a9aba42340a2c286ac8e3e5f8ada23b9392b0723ba130a13ab9e2871d974bcd19b5d472e1763e4bc2e586d4d3c84d8fbda91b4fb8955067d734305a9f022140a727544481980beb939204356eee97ec81b34800bed93172ca650d6b4ee45cdf57c31942ddac080199b72190984382bba2d20bfb9b3c9cf862ded01c898c5dcaab2be63b30c5bd573b00ca7a839ccbb83c6252feb15934a0220d23862f69277cd84884bc9b451a46c28d0894fd994b49bd1c320dc2e8ad7479c5627414ceea15a894b21cf68dc4385b3b3e6b7edd79e267d5535676884b66276e0814ef0331a1818cfecae27fb36242b1618d6bee4b2c73df3f4480c5365c3acd2f8bba8243385190d9b266e049e688407c0667ee5da8fe928ebee1a65330fc37423a087b070216ff44544a5cf139ba8c670eb832c8ed2baf71af54c41970c3c814b4d756e006cca81a7c947b74feaa686eca51ccf1a69309caf8c6645ffd1620676f8286f62a5bdcdde5f402542e8c2043b58c30081d90c73e3ce369deef7068e00be4d289fb6a6c0f9dbf3a9944b182621fac9e00a7f7c6910c3b039fd3a27faef4d9d2975a5864ee093e21509fc0be6e14d4f975ec6745a7c126da36796987e24323dfeecf1b59806424fa922ff6dcb9cf6e92d34582041b978bd2820a6bfba9c5b88ef2451c9c9a75889b0e460a0927bcd4bb94cac5acebb5e3ce71b4a6ad5de38281fbd839751248a94bbc5de6ee33085ad269a17ce7ecf86d3d18fd454295647ac3ccd5010e656dae6cc09251141a18a39289d8f7dd15213b2a60d300abf2eb92f569ccaf7c824cbc30c768bd0e4a1ed93ceb452bf07fd98be8f767ade999a9baf84d4b404d4bff02f38cc9c5fa065f1d24c289bd0c4e198724a38fe86ea7604dd7fe22d3643920b321b4a1d5f63db3d3316246a586bcc7330fa27079e1dc0121cddfa7ce4b0a13a447ee3365a6b51de370be190da065ade26f931a04ce29bcf830d8ccaf8187856e2fdbcf308a177b87a59a90a226551ba0c1f3f50dc6f8425ccc5c7e70683f4b5d492abe0b35752d6183472fa76f9a4bcebd3b30532d8f5725fc376c124a6987fbfe143341af425b7dcecab9f56b82d43157bf3622496248d745e711352f04e3863175733884ad1441f4a534ab5465dbf5fad3e8005a280a1bd5340a64f5a7f7a1ee8da28562385ddadd21ddaceec00312f38c0236ec9a05a11c753dd505a3e6bad5ce80a82aef019717a04bdecf0b2da65623890107340eda2426d88901609975795e5d1b4f7c609315c429d144148de4cd927769eaaa140ab4372eeec0025043a70e4dd9e8ac2dce127372b19943d07703450453cd1537a4d99a1af5eb8559af379d1f3b4784b6ed014d6894eebd6aee4c1f4c371096fc4d10a105fdb1c414563905a47770e6a4e15c73544501747b4efc1dcc3dba2a4ffff9de9f939678d96d1f5cfcefc24263509be89fb1ba0c8f6131787ebb24f3653a6b9ee51276cfa7cec486b612db19d1daaa8a6a1650c790b6083be16fe24965a23339c2d045c9ee760440ddf12816fdc5af9ffab750ab8bc612a2344fe345bbded6b65a52be37694ece5073f06af5f5d80bbef124c2fd1023d2d214c23d8e6ac463eda259433cba9a66e8759d1b20d8a164fd1eb69e239cc3d54d5f080d3b0f55fce274a55490d1beac354f86b4088451f5f9631f6e9a8e393a0ebb36729166261b5eb4c0fd9946c303cd0afe5a2c335c6663572744040d7e52c6858ee2a8d18deb2320cdce0f708ca2eef44375c46a2daf57468bb979f724f9aa7f8554720872c004429f4f1419c33c308373f2d70ebfbe12ec3ff8435a48013961ca187e3b9328689820393f7abf3d00a808d29f7a0ad4fc400c68926f68c1b9947d0a1e759d3729fad2569b24dae0c64617e410aae9e963e0316b9198abb235940b817f3cf9fc1bb14421d7a689da46e4e4913ec289a98facc5d59369c10e0573bd53b2cd3abf1cf32129a5834199460b996f51cf5e6a9898f6bf1f32b56d4ee9d0c5253badd56e61145e95c58a5177d2c1416b15ed76da8e626657a3c44bae6c3c21baaaa1c732cf69c254546308bbb6e52673297ec7673c83cc2a3f9ce78dce1233680657833fed5988dd7a86dcb0e2d50a433ce75215f465e25bf33d1e1a58deed8ace1e65de46078d0abc9e324683673182411ae633b5dce3208b1d08418450892a7be75ad908d7c552f392e62074a84fcf6c3ce191fc87dea42ec7de8938b99fcfed8bacd9f9f1d07ce9a86e66310463afffd2108b6ffb47d2ea20f7ad0400423310a3c789f676a944feb708af24564ee4cfd7e29ccd6c51b138d802590108d7f6782e288fa222947c622d47c4174ed7248c77c4293344e8ba5b8c7d7bb5eee2d5f403972c68dec0ad9537f64b4011e6c2eaeb4dd026b1bfe95cd72d85c7b606fd49eba3d02c4c9ad0a57115bf9fd6321692b55fb8579166d27827361c7df47390388d6b69c17fc087c5a5855d2ae9320b0a6a55a1f58b7d24a150d33bb9f0101a9839c9c7bb48f6b31aa0736ea10ce772dbc418c9feb4a11c43f6aced7df5f997a95d789af4b27529e48fea123fde7cbc87e24bb2004ddcd3d146586cae5751215d585f025fca964f30d1b5d2ccad7e09fc9ce2f365b26ac7a0e252edeb85776b22c0d6532bbe10619626517b21f7d750f3ceb6b4c9efba048dfff1697a3dd58978f8407bbd06accb7075d8ab62d4a851014d2a689b0ab503e524e6dc41226d4cc1c3a1bffc8adf0c943c52c3929afe8dbede66775dd46f5959486c8b56c29122bce706fe1448896673371e126958f4c987f37a509601e00391b477887cf388ff5052d253da8137ea14116d42b5ed4642eea2250460809ef33d33f46f2df00e6db9dfd9b6b6532142aef2c8a6fdfa5b25070f13572921a09978654fdfaac3c79113a3f7e832c009f57f4bb163d2a369221570c4b41ec0dcb4c6cb1cb825734783140a21380c882b5759adf63a41b99b8d08b06d54674226898c4fec0eb1ba374c28627b28faf3bc2766d228d6551c08b88608f48b2f0ede9b7e9e68d5cbaa2253384ea8bf8b8f42ad9673206612c90c41c65a8a3d029babda934eff116401a395ddad27235a6b879eac548a18e1a5d26d1fd24f11ba445cca2d8cea57c4d5ce0e3186675dee07186e1061f791e2a5a760fa9f83d46b66f9c13e75901f1b404f6df7af821d732a7e4230d9788fd753171577157c0697c23b9276918d233098c23a4686ce8ee2202d342a347e358114b3f95806af0068753d7d1adc788f5c03f8a411abe03fa4c4f1460b8d25eeb6dcd95947735c4e799992811db6682f584534a1af81da8534df48a25a4c2947a1577e51ee69ac17c489accca82de9af2a51d433c6d277299d5df5412a00bd8e1a982d1311412c79dd9b0f001d13c0a5cb4fb4b115ffa3e83da538c32b68b1a7b34866a9368300a80c686213f4efe0cfbe63ea6a9a265cea0799eadbac4821ccbfe20ba032c0a18cd5c4332780ff41759d5811f42ef6267acfcaa5f3f17e070b4e9b26c2dde73a304da80ba56e01ca71cfb72e1f593a1a41db17316a371720f2f4c39250bb21171d27282e646617b6bab144a0d9d919d4789077ced0cfc95420be2f258118adfe2c625279867d97bfd5f712366fe05f05c448f1dbb0b438eee1e851cc80978cfb764185c783fa8215a1e23edc2aab19c636d0b183a6938af81e1c9e882343d5853a06d3d385d54fbb5637b0c53731c81f626be5cc5bbf70d3e6aa8577db43d92aa14a3df76da679df6851e12a40b608295e3ae7918e4ccf7692493572ca22dab4c2a91a59fe8e4720d71bfacc7ab458bc0c3137bfbcc1ea29228959f1f31a087ac32c2e23772a9856d386f72f3303ade99b7f92eb99faa9d59792a61197fc22815588ae6623915953d3b570ef5e1085a7c6bf9056a2198f68dd3adcf9f579e3771ddc86f1c5b9372985f397586ffee2447189aec6dbb8f12f976083b1c0ac282a8fbded41fb5cb92018f58d3e5608800aec337ac18ae87429a17a9e73310e6434702a42b31a254558092237bec42f1aa96fa1bfc7f75c7311edf5fa54533f28205df80c44fa3820ae29b6dfd8cfa91263685b3407feb954843c6aeaa91e3ee0c988d8a863e738370030eaa32a89872419cf653c8302facb6895452a3b72b41257a3f7cc69ae45b4ffced87dd6214bfc60e8a2f2bdb44ab88ec22e994bbbe3616f8096de0467e9aa9a54745e8db8c691311821216f4d77e826716cb30b40742f27c6378e9309acba4ea1e746572697a00bbffbc071918b4300061c1c1a25e2112eb32f22a34a91fa5f26412546941bd6ce7fb6c7629d0eda03e867fe388b309f6f1a36bcd647dafa66cdf07177e0b6d2a2f95962e0327a64c56fb41b4f1b3e43b058953f20308cb3e6f859a9becc6b29a50f875caceb3146374ccdb5877ae54737d197cf232e0f132dc33196d32e6c13a1b0d4c6dc13c38c406c58db60f17ca73fc5bbd5bb849679297b4ea15a8a7d43a51279b45918202619e881b723c215839a5a542cc07e85106d4ad42154e78c7a4927547b73fd393dd21b6c61a01af6d13766bb75779203060ec572f4d17c8303c3db66633ac4d8bd9145daec3ad092f0327c56188f16c65651785397f4c2499e8e61aec81ddfd9234d98d7591079014b62b5da54bf00d9ac1a1c01e897ce7d9e1e60ebefde6535bb1ce97f3218609c969afaaed93e8d3664ad8ae097323b38193beeac2256d0f0b091f9730209740238282ba8c085728bcd377bdfa47960a1e50970e8ece13ac0f49021d4539e37b0e3468296792165225acb2be42525865c29b9c07f5eabdb1f3eaa8e47e356805696a25e9d15c239cce4a536f9963268718793723f7c60a3f9bf1aa41ac2d269efb2b3d0542dce7f5d79303c20407b53dcbff23c1a1c241df196fd63452974940facd841339875ab1de86688fb45304a2d5939929bc37431e6874279b01c120f5d4d8b9c84c94b72fcd8ee7be90575c1f4abc097b8d91b89e22fec96a28f09a8d5a041852e17776293d9f22516ad7a5c76613304a798080ab8676e49b54da47b2fed1eb53ef057c810d01091470ceadff1cdaebb1b1e26b5765dd61a3debd8a76a60e0727d3f2c028b3f52783fca29a0140ef823ec195111b58cd45497f9ca5c71d09939938c377334201ad1461ae7b90e7e63fd49f8172f40254333291cb05526cc44f07d55a586d5860b9bffbfc30d52f98ffcc07e483c9d9253595149b271ab21df29b260adec57dfb8744dd88e3e9295c23b2d011800c594c5fdf1a8ba609a1490890c3e4b33301f5a2ff91957e0a7b15cac0810ab39385e55be645b36adf16c1ff56856480aaa1003911b0aa79052035f0550dde16b9915c16f320cc88a448f0515c47958a09a507ac1b8f77795231ec89501a214b0a065f55f87b7c8712dadc7ef7a1f2a0b10c72de13d87c9277ff3c9841879b42f86a116ea7d81dc7ccf244904d4aa34ed0cc7d52ab132ad2145f8c18e3b9a1f0626d8d729d150442aeb77c3d378ab192abdd0a8d53d2fc848fa8f31852871f16d2e51099a045f7b8350a87911d688864e94eeaf23cb5c58e96e61baf012d3269636677f7f9d0934c6457b2537bc46f0d30ad50d33fecba95456b592c715949a6de1e7008dc7ec103f22d91758b44f67", 0x1000}], 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f00000014c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="ad000900000000002e2f00696c653000"]) (async) write$cgroup_type(r5, &(0x7f0000001500), 0x9) (async) 01:49:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xe5, 0x51, 0x61, 0x1f, 0x0, 0x101, 0x80200, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x8, 0x30}, 0x10020, 0x200, 0x20, 0x7, 0x6, 0x2, 0xfff8}, 0xffffffffffffffff, 0x9, r3, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 406.124639][ T5090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 406.132627][ T5090] R13: 00007ffccd37371f R14: 00007f56a6678300 R15: 0000000000022000 [ 406.140631][ T5090] [ 406.150751][ T39] Bluetooth: hci5: command 0x0406 tx timeout 01:49:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 17) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 01:49:21 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) clone(0x40140000, &(0x7f0000000080)="bc4cf05985505b2d71caf29c576065dc83f45f503bb884853095aeec2467593ff601eefca18f9799d5c8383777ab7631840255824b13761bc3e2410ef4119037e41c3fb6322fcda82c50b06d1482bb097e831e98328bb7ad6dec14c498bc4362fe07398a7ab522d38c9a095b9008362ff053c4a6e83ab6b4be0cb8c448573f7d536b049a06ac44c53acb5fb36031fda64d4509dd56a3c5be8c17c8b915969a725ab6952e18e59a771f296446e23dcd317b3c14b0bd9dab4150e42b5b9d5c84ca63f5d4e65e6c693168eb75dfc21a9cf9d34c225b56bcd0f3d4fe85d28577aacb2c4c1c530b4810be2e9a9e76b9a8aa5740a93d6e93c629", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="36aa10a191af11b3085eb2a2643157b52a2760d747a793f59b348fe7d0c90652b62e8c42e286b3868c6b2126810b33cdb772f5e0f1d9bb1fe102bf00e7f6446bdfeec47037ee774fedff32594d6b1ed2ad484470c543845fb59bb7294ef1982b7c1050602876105fbc78674aac27aaa2f9fc35aacf14") ptrace$setopts(0x4206, r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) rt_sigtimedwait(&(0x7f0000000280)={[0xffff]}, &(0x7f00000002c0), &(0x7f0000000340), 0x8) [ 406.472223][ T5229] FAULT_INJECTION: forcing a failure. [ 406.472223][ T5229] name failslab, interval 1, probability 0, space 0, times 0 01:49:21 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.io_queued_recursive\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="58000800000000000000000000000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) fdatasync(r3) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) write$cgroup_int(r2, &(0x7f0000000440), 0x12) [ 406.577565][ T5229] CPU: 0 PID: 5229 Comm: syz-executor.4 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 [ 406.587493][ T5229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.597554][ T5229] Call Trace: [ 406.600834][ T5229] [ 406.603882][ T5229] dump_stack_lvl+0xcd/0x134 [ 406.608491][ T5229] should_fail.cold+0x5/0xa [ 406.613002][ T5229] ? __vmalloc_node_range+0x447/0xf80 [ 406.618378][ T5229] should_failslab+0x5/0x10 [ 406.622897][ T5229] __kmalloc_node+0x75/0x380 [ 406.627512][ T5229] __vmalloc_node_range+0x447/0xf80 [ 406.632719][ T5229] ? bpf_check+0xc09/0xbac0 [ 406.637244][ T5229] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 406.643511][ T5229] ? __reg64_deduce_bounds+0x160/0x160 [ 406.648984][ T5229] ? vfree_atomic+0xe0/0xe0 [ 406.653511][ T5229] ? add_subprog+0x273/0x380 [ 406.658116][ T5229] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 406.663160][ T5229] vmalloc+0x67/0x80 [ 406.667068][ T5229] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 406.672106][ T5229] bpf_prog_calc_tag+0xc9/0x6c0 [ 406.676974][ T5229] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 406.683236][ T5229] ? __bpf_prog_free+0x190/0x190 [ 406.688199][ T5229] ? check_kfunc_call+0xbf0/0xbf0 [ 406.693238][ T5229] ? rcu_read_lock_sched_held+0x3a/0x70 [ 406.698798][ T5229] ? trace_kmalloc_node+0x32/0x100 [ 406.703925][ T5229] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 406.710185][ T5229] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 406.715922][ T5229] ? check_subprogs+0x511/0x5f0 [ 406.720793][ T5229] bpf_check+0x1c86/0xbac0 [ 406.725248][ T5229] ? bpf_get_btf_vmlinux+0x10/0x10 [ 406.730386][ T5229] ? lock_downgrade+0x6e0/0x6e0 [ 406.735254][ T5229] ? __might_fault+0xd1/0x170 [ 406.739957][ T5229] ? memset+0x20/0x40 [ 406.743947][ T5229] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 406.750207][ T5229] ? bpf_obj_name_cpy+0x144/0x1a0 [ 406.755235][ T5229] ? bpf_prog_load+0xf14/0x21f0 [ 406.760090][ T5229] bpf_prog_load+0xf55/0x21f0 [ 406.764778][ T5229] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 406.770678][ T5229] ? find_held_lock+0x2d/0x110 [ 406.775477][ T5229] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 406.781745][ T5229] __sys_bpf+0x68a/0x5970 [ 406.786084][ T5229] ? bpf_link_get_from_fd+0x110/0x110 [ 406.791468][ T5229] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 406.797465][ T5229] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 406.803469][ T5229] ? find_held_lock+0x2d/0x110 [ 406.808267][ T5229] ? trace_hardirqs_on+0x38/0x1c0 [ 406.813298][ T5229] __x64_sys_bpf+0x75/0xb0 [ 406.817722][ T5229] ? syscall_enter_from_user_mode+0x21/0x70 [ 406.823636][ T5229] do_syscall_64+0x35/0xb0 [ 406.828058][ T5229] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 406.833965][ T5229] RIP: 0033:0x7f56a7d02e99 [ 406.838383][ T5229] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 406.857991][ T5229] RSP: 002b:00007f56a6678168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 406.866409][ T5229] RAX: ffffffffffffffda RBX: 00007f56a7e15f60 RCX: 00007f56a7d02e99 01:49:21 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x4, 0xff, 0x5, 0x3f, 0x0, 0x8, 0x242, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x40000, 0x0, 0x8001, 0x4, 0xe3, 0xe0000000, 0x9, 0x0, 0xcf, 0x0, 0x3}, 0xffffffffffffffff, 0x7, r0, 0xb) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 406.874381][ T5229] RDX: 0000000000000080 RSI: 0000000020000200 RDI: 0000000000000005 [ 406.882350][ T5229] RBP: 00007f56a66781d0 R08: 0000000000000000 R09: 0000000000000000 [ 406.890327][ T5229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 406.898297][ T5229] R13: 00007ffccd37371f R14: 00007f56a6678300 R15: 0000000000022000 [ 406.906291][ T5229] 01:49:21 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) dup2(r1, 0xffffffffffffffff) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r3}, 0x10) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001480)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x2, 0x1, 0xff, 0x3, 0x0, 0x6, 0x8000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x20, 0x2, @perf_bp={&(0x7f0000000380), 0x1}, 0x40680, 0x80000001, 0x4, 0x9, 0xfc03, 0x0, 0x8, 0x0, 0x10}, 0x0, 0x8, r4, 0x2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write(0xffffffffffffffff, &(0x7f0000004200)='t', 0xfff4) (async) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x9) (async) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000040)="4afe2dd47e6f9fc2a958fecb4408f3d94d4d395f370a", 0x16}, {&(0x7f00000001c0)="5d4eb9951f644da6d078dea9e04e7b47bb97db14157da8279618c9eb37027b9b137fa476b566b147af60913b8e0159d08cc42950175533b18f250b8fdf48aa829fd8c0aef51afdc1356e869a6f09622487deb12af50586885cfa46a3a95bdb0e2ee6fc0d2ec81772bb0803cca2cc833ecf999c056ac7ef3cdb7df3adea297f367fe24038781dd3bc2bb38e8e2139920c4dcec737b36d007e38f4039f714803d3cd7a5622835960da6bb2a4d8204f091951ad2c301530a15d", 0xb8}, {&(0x7f0000000280)="e1e2a33178052e2d038218b93deb716044c3deae43913a9af62dee845362a3a382e2c6f12b8cd56b4c1807926f5a2a9df3437bfd1955dea720e224c1b0707b23a18b32e66ecf29ea54394579afca3d91c39f5ca8b81f834e901573492c1a662600d2da164a43ae2a5e4ffb8f9f278cb63f70f66a1f9c60f14dc90cc5eb6d5f3d693ef05e23c4543a8ee15484d19b64311737a9818162f36df97d055a6d5c86e46fdcf445329f6e864d0f15cb3934c521322586faa3e1b9b3c0cb9098232b5fb719ecf101436aac82f5160c8d0c01320965caf7268ab366d9cf17", 0xda}, {&(0x7f0000000480)="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", 0x1000}], 0x4) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (rerun: 64) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f00000014c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="ad000900000000002e2f00696c653000"]) (async, rerun: 32) write$cgroup_type(r5, &(0x7f0000001500), 0x9) (rerun: 32) 01:49:21 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x4, 0xff, 0x5, 0x3f, 0x0, 0x8, 0x242, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x40000, 0x0, 0x8001, 0x4, 0xe3, 0xe0000000, 0x9, 0x0, 0xcf, 0x0, 0x3}, 0xffffffffffffffff, 0x7, r0, 0xb) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 01:49:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xe5, 0x51, 0x61, 0x1f, 0x0, 0x101, 0x80200, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x8, 0x30}, 0x10020, 0x200, 0x20, 0x7, 0x6, 0x2, 0xfff8}, 0xffffffffffffffff, 0x9, r3, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r3, &(0x7f0000004200)='t', 0xfff4) (async) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xe5, 0x51, 0x61, 0x1f, 0x0, 0x101, 0x80200, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x8, 0x30}, 0x10020, 0x200, 0x20, 0x7, 0x6, 0x2, 0xfff8}, 0xffffffffffffffff, 0x9, r3, 0x2) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async) 01:49:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 01:49:21 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.io_queued_recursive\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="58000800000000000000000000000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) fdatasync(r3) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) write$cgroup_int(r2, &(0x7f0000000440), 0x12) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.io_queued_recursive\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="58000800000000000000000000000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') (async) ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) (async) fdatasync(r3) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) (async) write$cgroup_int(r2, &(0x7f0000000440), 0x12) (async) 01:49:21 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) clone(0x40140000, &(0x7f0000000080)="bc4cf05985505b2d71caf29c576065dc83f45f503bb884853095aeec2467593ff601eefca18f9799d5c8383777ab7631840255824b13761bc3e2410ef4119037e41c3fb6322fcda82c50b06d1482bb097e831e98328bb7ad6dec14c498bc4362fe07398a7ab522d38c9a095b9008362ff053c4a6e83ab6b4be0cb8c448573f7d536b049a06ac44c53acb5fb36031fda64d4509dd56a3c5be8c17c8b915969a725ab6952e18e59a771f296446e23dcd317b3c14b0bd9dab4150e42b5b9d5c84ca63f5d4e65e6c693168eb75dfc21a9cf9d34c225b56bcd0f3d4fe85d28577aacb2c4c1c530b4810be2e9a9e76b9a8aa5740a93d6e93c629", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="36aa10a191af11b3085eb2a2643157b52a2760d747a793f59b348fe7d0c90652b62e8c42e286b3868c6b2126810b33cdb772f5e0f1d9bb1fe102bf00e7f6446bdfeec47037ee774fedff32594d6b1ed2ad484470c543845fb59bb7294ef1982b7c1050602876105fbc78674aac27aaa2f9fc35aacf14") ptrace$setopts(0x4206, r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x36) rt_sigtimedwait(&(0x7f0000000280)={[0xffff]}, &(0x7f00000002c0), &(0x7f0000000340), 0x8) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) gettid() (async) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) clone(0x40140000, &(0x7f0000000080)="bc4cf05985505b2d71caf29c576065dc83f45f503bb884853095aeec2467593ff601eefca18f9799d5c8383777ab7631840255824b13761bc3e2410ef4119037e41c3fb6322fcda82c50b06d1482bb097e831e98328bb7ad6dec14c498bc4362fe07398a7ab522d38c9a095b9008362ff053c4a6e83ab6b4be0cb8c448573f7d536b049a06ac44c53acb5fb36031fda64d4509dd56a3c5be8c17c8b915969a725ab6952e18e59a771f296446e23dcd317b3c14b0bd9dab4150e42b5b9d5c84ca63f5d4e65e6c693168eb75dfc21a9cf9d34c225b56bcd0f3d4fe85d28577aacb2c4c1c530b4810be2e9a9e76b9a8aa5740a93d6e93c629", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="36aa10a191af11b3085eb2a2643157b52a2760d747a793f59b348fe7d0c90652b62e8c42e286b3868c6b2126810b33cdb772f5e0f1d9bb1fe102bf00e7f6446bdfeec47037ee774fedff32594d6b1ed2ad484470c543845fb59bb7294ef1982b7c1050602876105fbc78674aac27aaa2f9fc35aacf14") (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r0, 0x36) (async) rt_sigtimedwait(&(0x7f0000000280)={[0xffff]}, &(0x7f00000002c0), &(0x7f0000000340), 0x8) (async) 01:49:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) setsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f0000000240)="b2f4c1031b00e1257882367e82ca40e2bc11e3d552d939c11d987a9b71a1f58ed89f365160a5c9c99ebfc7a989f27357063a810fec0465226f15770a740c12c7073793a7e674c62ce39fe66df1b3287a2cc64d9c14b2d9d0b70a6238e308ce98667d7ba1c462c9fe480cb3b65a581362761d3665f21bdd193f2c120f2d10190327c12c7be44c7b14ffef142c5583cd4124d50d11ebaf07bbeb85995c253815b0b76ec72f1266c59dd5bac3c555", 0xad) r3 = gettid() tkill(r3, 0xb) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x26c183, 0x0) kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, r0, &(0x7f0000000080)={r4, r2, 0x40}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 407.404206][ T5373] FAULT_INJECTION: forcing a failure. [ 407.404206][ T5373] name failslab, interval 1, probability 0, space 0, times 0 01:49:22 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r3}, 0x10) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000001c0)="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") r5 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r6 = openat(r5, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r6, &(0x7f0000004200)='t', 0xfff4) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x5d, 0x7, 0x0, 0x0, r2, 0x10000, '\x00', 0x0, r1, 0x5, 0x3, 0x3}, 0x48) r8 = creat(&(0x7f0000000600)='./file0\x00', 0x119) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={0xffffffffffffffff, 0x3f, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1d, 0x7, &(0x7f00000002c0)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffb}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffff9}, @exit], &(0x7f0000000300)='GPL\x00', 0x62, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0xc, r2, 0x8, &(0x7f0000000500)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x5, 0xa, 0x9, 0x9}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000680)=[r2, r6, r2, r2, r7, r2, r1, r8, r9]}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r10 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x12000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r10, 0x1, r0, &(0x7f0000000100)={0xc}) [ 407.519335][ T5373] CPU: 1 PID: 5373 Comm: syz-executor.4 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 [ 407.529291][ T5373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.539450][ T5373] Call Trace: [ 407.542737][ T5373] [ 407.545673][ T5373] dump_stack_lvl+0xcd/0x134 [ 407.550302][ T5373] should_fail.cold+0x5/0xa [ 407.554827][ T5373] should_failslab+0x5/0x10 [ 407.559796][ T5373] kmem_cache_alloc_node+0x65/0x3e0 [ 407.565033][ T5373] ? alloc_vmap_area+0x164/0x1dc0 [ 407.570102][ T5373] alloc_vmap_area+0x164/0x1dc0 [ 407.574988][ T5373] ? kmem_cache_alloc_node_trace+0x46/0x300 [ 407.580936][ T5373] ? free_vmap_area+0x1ac0/0x1ac0 [ 407.585999][ T5373] ? rcu_read_lock_sched_held+0x3a/0x70 [ 407.591569][ T5373] ? trace_kmalloc_node+0x32/0x100 [ 407.596720][ T5373] __get_vm_area_node.constprop.0+0x128/0x380 [ 407.602832][ T5373] __vmalloc_node_range+0x154/0xf80 [ 407.608049][ T5373] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 407.613102][ T5373] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 407.618157][ T5373] ? kvmalloc_node+0x3e/0x100 [ 407.622866][ T5373] ? bpf_check+0xc09/0xbac0 [ 407.627395][ T5373] ? bpf_prog_load+0xf55/0x21f0 [ 407.632265][ T5373] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 407.638542][ T5373] ? sort_r+0x41/0x350 [ 407.642634][ T5373] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 407.648741][ T5373] ? __reg64_deduce_bounds+0x160/0x160 [ 407.654228][ T5373] ? vfree_atomic+0xe0/0xe0 [ 407.658750][ T5373] ? add_subprog+0x273/0x380 [ 407.663366][ T5373] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 407.668422][ T5373] vmalloc+0x67/0x80 [ 407.672338][ T5373] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 407.677391][ T5373] bpf_prog_calc_tag+0xc9/0x6c0 [ 407.682266][ T5373] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 407.688543][ T5373] ? __bpf_prog_free+0x190/0x190 [ 407.693517][ T5373] ? check_kfunc_call+0xbf0/0xbf0 [ 407.698576][ T5373] ? rcu_read_lock_sched_held+0x3a/0x70 [ 407.704149][ T5373] ? trace_kmalloc_node+0x32/0x100 [ 407.709289][ T5373] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 01:49:22 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.io_queued_recursive\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="58000800000000000000000000000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) fdatasync(r3) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) write$cgroup_int(r2, &(0x7f0000000440), 0x12) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.io_queued_recursive\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="58000800000000000000000000000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') (async) ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) (async) fdatasync(r3) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) (async) write$cgroup_int(r2, &(0x7f0000000440), 0x12) (async) [ 407.715558][ T5373] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 407.721307][ T5373] ? check_subprogs+0x511/0x5f0 [ 407.726195][ T5373] bpf_check+0x1c86/0xbac0 [ 407.730665][ T5373] ? bpf_get_btf_vmlinux+0x10/0x10 [ 407.735855][ T5373] ? lock_downgrade+0x6e0/0x6e0 [ 407.740737][ T5373] ? __might_fault+0xd1/0x170 [ 407.745454][ T5373] ? memset+0x20/0x40 [ 407.749453][ T5373] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 407.755727][ T5373] ? bpf_obj_name_cpy+0x144/0x1a0 [ 407.760770][ T5373] ? bpf_prog_load+0xf14/0x21f0 [ 407.765645][ T5373] bpf_prog_load+0xf55/0x21f0 [ 407.770356][ T5373] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 407.776288][ T5373] ? find_held_lock+0x2d/0x110 [ 407.781103][ T5373] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 407.787382][ T5373] __sys_bpf+0x68a/0x5970 [ 407.791734][ T5373] ? bpf_link_get_from_fd+0x110/0x110 [ 407.797139][ T5373] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 407.803155][ T5373] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 407.809181][ T5373] ? find_held_lock+0x2d/0x110 [ 407.813995][ T5373] ? trace_hardirqs_on+0x38/0x1c0 [ 407.819040][ T5373] __x64_sys_bpf+0x75/0xb0 [ 407.823475][ T5373] ? syscall_enter_from_user_mode+0x21/0x70 [ 407.829392][ T5373] do_syscall_64+0x35/0xb0 [ 407.833822][ T5373] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 407.839742][ T5373] RIP: 0033:0x7f56a7d02e99 [ 407.844168][ T5373] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 407.863794][ T5373] RSP: 002b:00007f56a6678168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 407.872232][ T5373] RAX: ffffffffffffffda RBX: 00007f56a7e15f60 RCX: 00007f56a7d02e99 [ 407.880225][ T5373] RDX: 0000000000000080 RSI: 0000000020000200 RDI: 0000000000000005 [ 407.888296][ T5373] RBP: 00007f56a66781d0 R08: 0000000000000000 R09: 0000000000000000 [ 407.896278][ T5373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 407.904262][ T5373] R13: 00007ffccd37371f R14: 00007f56a6678300 R15: 0000000000022000 [ 407.912264][ T5373] 01:49:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) setsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f0000000240)="b2f4c1031b00e1257882367e82ca40e2bc11e3d552d939c11d987a9b71a1f58ed89f365160a5c9c99ebfc7a989f27357063a810fec0465226f15770a740c12c7073793a7e674c62ce39fe66df1b3287a2cc64d9c14b2d9d0b70a6238e308ce98667d7ba1c462c9fe480cb3b65a581362761d3665f21bdd193f2c120f2d10190327c12c7be44c7b14ffef142c5583cd4124d50d11ebaf07bbeb85995c253815b0b76ec72f1266c59dd5bac3c555", 0xad) r3 = gettid() tkill(r3, 0xb) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x26c183, 0x0) kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, r0, &(0x7f0000000080)={r4, r2, 0x40}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) setsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f0000000240)="b2f4c1031b00e1257882367e82ca40e2bc11e3d552d939c11d987a9b71a1f58ed89f365160a5c9c99ebfc7a989f27357063a810fec0465226f15770a740c12c7073793a7e674c62ce39fe66df1b3287a2cc64d9c14b2d9d0b70a6238e308ce98667d7ba1c462c9fe480cb3b65a581362761d3665f21bdd193f2c120f2d10190327c12c7be44c7b14ffef142c5583cd4124d50d11ebaf07bbeb85995c253815b0b76ec72f1266c59dd5bac3c555", 0xad) (async) gettid() (async) tkill(r3, 0xb) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x26c183, 0x0) (async) kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, r0, &(0x7f0000000080)={r4, r2, 0x40}) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 01:49:22 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r0}, 0x10) r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r2, &(0x7f0000004200)='t', 0xfff4) write$cgroup_type(r2, &(0x7f0000000000), 0x9) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000040)) write$cgroup_int(r3, &(0x7f0000000440), 0x12) 01:49:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xe5, 0x51, 0x61, 0x1f, 0x0, 0x101, 0x80200, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x8, 0x30}, 0x10020, 0x200, 0x20, 0x7, 0x6, 0x2, 0xfff8}, 0xffffffffffffffff, 0x9, r3, 0x2) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 01:49:22 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) clone(0x40140000, &(0x7f0000000080)="bc4cf05985505b2d71caf29c576065dc83f45f503bb884853095aeec2467593ff601eefca18f9799d5c8383777ab7631840255824b13761bc3e2410ef4119037e41c3fb6322fcda82c50b06d1482bb097e831e98328bb7ad6dec14c498bc4362fe07398a7ab522d38c9a095b9008362ff053c4a6e83ab6b4be0cb8c448573f7d536b049a06ac44c53acb5fb36031fda64d4509dd56a3c5be8c17c8b915969a725ab6952e18e59a771f296446e23dcd317b3c14b0bd9dab4150e42b5b9d5c84ca63f5d4e65e6c693168eb75dfc21a9cf9d34c225b56bcd0f3d4fe85d28577aacb2c4c1c530b4810be2e9a9e76b9a8aa5740a93d6e93c629", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="36aa10a191af11b3085eb2a2643157b52a2760d747a793f59b348fe7d0c90652b62e8c42e286b3868c6b2126810b33cdb772f5e0f1d9bb1fe102bf00e7f6446bdfeec47037ee774fedff32594d6b1ed2ad484470c543845fb59bb7294ef1982b7c1050602876105fbc78674aac27aaa2f9fc35aacf14") (async, rerun: 64) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async, rerun: 64) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) tkill(r0, 0x36) (async, rerun: 64) rt_sigtimedwait(&(0x7f0000000280)={[0xffff]}, &(0x7f00000002c0), &(0x7f0000000340), 0x8) [ 408.131700][ T5504] loop5: detected capacity change from 0 to 16 01:49:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 19) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 408.402139][ T5504] FAT-fs (loop5): Unrecognized mount option "€" or missing value 01:49:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) setsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f0000000240)="b2f4c1031b00e1257882367e82ca40e2bc11e3d552d939c11d987a9b71a1f58ed89f365160a5c9c99ebfc7a989f27357063a810fec0465226f15770a740c12c7073793a7e674c62ce39fe66df1b3287a2cc64d9c14b2d9d0b70a6238e308ce98667d7ba1c462c9fe480cb3b65a581362761d3665f21bdd193f2c120f2d10190327c12c7be44c7b14ffef142c5583cd4124d50d11ebaf07bbeb85995c253815b0b76ec72f1266c59dd5bac3c555", 0xad) (async) r3 = gettid() tkill(r3, 0xb) (async, rerun: 32) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x26c183, 0x0) (rerun: 32) kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, r0, &(0x7f0000000080)={r4, r2, 0x40}) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 408.519117][ T5769] FAULT_INJECTION: forcing a failure. [ 408.519117][ T5769] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 408.540491][ T5769] CPU: 1 PID: 5769 Comm: syz-executor.4 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 [ 408.550434][ T5769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.560506][ T5769] Call Trace: [ 408.563793][ T5769] [ 408.566724][ T5769] dump_stack_lvl+0xcd/0x134 [ 408.571330][ T5769] should_fail.cold+0x5/0xa [ 408.575856][ T5769] prepare_alloc_pages+0x17b/0x570 [ 408.580981][ T5769] ? arch_stack_walk+0x93/0xe0 [ 408.585797][ T5769] __alloc_pages+0x12f/0x500 [ 408.590403][ T5769] ? __alloc_pages_slowpath.constprop.0+0x2080/0x2080 [ 408.597183][ T5769] ? stack_trace_save+0x8c/0xc0 [ 408.602155][ T5769] __alloc_pages_bulk+0xa14/0x18a0 [ 408.607279][ T5769] ? bpf_check+0x1c86/0xbac0 [ 408.611887][ T5769] ? bpf_prog_load+0xf55/0x21f0 [ 408.616744][ T5769] ? __sys_bpf+0x68a/0x5970 [ 408.621253][ T5769] ? __x64_sys_bpf+0x75/0xb0 [ 408.625849][ T5769] ? do_syscall_64+0x35/0xb0 [ 408.630442][ T5769] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 408.636542][ T5769] ? __alloc_pages+0x500/0x500 [ 408.641311][ T5769] ? find_held_lock+0x2d/0x110 [ 408.646093][ T5769] ? __kmalloc_node+0x62/0x380 [ 408.650889][ T5769] alloc_pages_bulk_array_mempolicy+0x1c3/0x4d0 [ 408.657140][ T5769] ? rcu_read_lock_sched_held+0x3a/0x70 [ 408.662699][ T5769] ? trace_kmalloc_node+0x32/0x100 [ 408.667833][ T5769] __vmalloc_node_range+0x54f/0xf80 [ 408.673045][ T5769] ? __reg64_deduce_bounds+0x160/0x160 [ 408.678513][ T5769] ? vfree_atomic+0xe0/0xe0 [ 408.683022][ T5769] ? add_subprog+0x273/0x380 [ 408.687627][ T5769] ? ___slab_alloc+0xa6d/0xd60 [ 408.692408][ T5769] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 408.697449][ T5769] vmalloc+0x67/0x80 [ 408.701344][ T5769] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 408.706383][ T5769] bpf_prog_calc_tag+0xc9/0x6c0 [ 408.711252][ T5769] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 408.717517][ T5769] ? __bpf_prog_free+0x190/0x190 [ 408.722473][ T5769] ? check_kfunc_call+0xbf0/0xbf0 [ 408.727508][ T5769] ? rcu_read_lock_sched_held+0x3a/0x70 [ 408.733068][ T5769] ? trace_kmalloc_node+0x32/0x100 [ 408.738194][ T5769] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 408.744452][ T5769] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 408.750188][ T5769] ? check_subprogs+0x511/0x5f0 [ 408.755057][ T5769] bpf_check+0x1c86/0xbac0 [ 408.759517][ T5769] ? bpf_get_btf_vmlinux+0x10/0x10 [ 408.764651][ T5769] ? lock_downgrade+0x6e0/0x6e0 [ 408.769518][ T5769] ? __might_fault+0xd1/0x170 [ 408.774222][ T5769] ? memset+0x20/0x40 [ 408.778211][ T5769] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 408.784739][ T5769] ? bpf_obj_name_cpy+0x144/0x1a0 [ 408.789767][ T5769] ? bpf_prog_load+0xf14/0x21f0 [ 408.794627][ T5769] bpf_prog_load+0xf55/0x21f0 [ 408.799314][ T5769] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 408.805222][ T5769] ? find_held_lock+0x2d/0x110 [ 408.810019][ T5769] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 408.816283][ T5769] __sys_bpf+0x68a/0x5970 [ 408.820624][ T5769] ? bpf_link_get_from_fd+0x110/0x110 [ 408.826009][ T5769] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 408.832004][ T5769] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 408.838007][ T5769] ? find_held_lock+0x2d/0x110 [ 408.842802][ T5769] ? trace_hardirqs_on+0x38/0x1c0 [ 408.847832][ T5769] __x64_sys_bpf+0x75/0xb0 [ 408.852255][ T5769] ? syscall_enter_from_user_mode+0x21/0x70 [ 408.858162][ T5769] do_syscall_64+0x35/0xb0 [ 408.862580][ T5769] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 408.868496][ T5769] RIP: 0033:0x7f56a7d02e99 [ 408.872910][ T5769] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 408.892523][ T5769] RSP: 002b:00007f56a6678168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 408.900937][ T5769] RAX: ffffffffffffffda RBX: 00007f56a7e15f60 RCX: 00007f56a7d02e99 [ 408.908908][ T5769] RDX: 0000000000000080 RSI: 0000000020000200 RDI: 0000000000000005 [ 408.916884][ T5769] RBP: 00007f56a66781d0 R08: 0000000000000000 R09: 0000000000000000 [ 408.924854][ T5769] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 408.932822][ T5769] R13: 00007ffccd37371f R14: 00007f56a6678300 R15: 0000000000022000 [ 408.940824][ T5769] 01:49:23 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r3}, 0x10) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000001c0)="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") r5 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r6 = openat(r5, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r6, &(0x7f0000004200)='t', 0xfff4) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x5d, 0x7, 0x0, 0x0, r2, 0x10000, '\x00', 0x0, r1, 0x5, 0x3, 0x3}, 0x48) r8 = creat(&(0x7f0000000600)='./file0\x00', 0x119) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={0xffffffffffffffff, 0x3f, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1d, 0x7, &(0x7f00000002c0)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffb}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffff9}, @exit], &(0x7f0000000300)='GPL\x00', 0x62, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0xc, r2, 0x8, &(0x7f0000000500)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x5, 0xa, 0x9, 0x9}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000680)=[r2, r6, r2, r2, r7, r2, r1, r8, r9]}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r10 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x12000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r10, 0x1, r0, &(0x7f0000000100)={0xc}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r3}, 0x10) (async) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000001c0)="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") (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r5, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r6, &(0x7f0000004200)='t', 0xfff4) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x5d, 0x7, 0x0, 0x0, r2, 0x10000, '\x00', 0x0, r1, 0x5, 0x3, 0x3}, 0x48) (async) creat(&(0x7f0000000600)='./file0\x00', 0x119) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={0xffffffffffffffff, 0x3f, 0x10}, 0xc) (async) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1d, 0x7, &(0x7f00000002c0)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffb}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffff9}, @exit], &(0x7f0000000300)='GPL\x00', 0x62, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0xc, r2, 0x8, &(0x7f0000000500)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x5, 0xa, 0x9, 0x9}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000680)=[r2, r6, r2, r2, r7, r2, r1, r8, r9]}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x12000, 0x0) (async) epoll_ctl$EPOLL_CTL_ADD(r10, 0x1, r0, &(0x7f0000000100)={0xc}) (async) 01:49:23 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r0}, 0x10) r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r2, &(0x7f0000004200)='t', 0xfff4) write$cgroup_type(r2, &(0x7f0000000000), 0x9) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000040)) write$cgroup_int(r3, &(0x7f0000000440), 0x12) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r0}, 0x10) (async) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (async) openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) write(r2, &(0x7f0000004200)='t', 0xfff4) (async) write$cgroup_type(r2, &(0x7f0000000000), 0x9) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000040)) (async) write$cgroup_int(r3, &(0x7f0000000440), 0x12) (async) 01:49:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r1, 0x9408, 0x0) 01:49:23 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000080)={[0xff]}, &(0x7f00000000c0), &(0x7f0000000180)={r0, r1+60000000}, 0x8) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) signalfd(0xffffffffffffffff, &(0x7f0000000340)={[0x5]}, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) signalfd(r3, &(0x7f0000000300)={[0x7]}, 0x8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)=0x0) wait4(r4, &(0x7f0000000200), 0x2, &(0x7f0000000240)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r2, 0x36) 01:49:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 409.245746][ T5859] loop5: detected capacity change from 0 to 16 01:49:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async, rerun: 32) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r1, 0x9408, 0x0) [ 409.303368][ T5859] FAT-fs (loop5): Unrecognized mount option "€" or missing value [ 409.427097][ T5897] FAULT_INJECTION: forcing a failure. [ 409.427097][ T5897] name fail_page_alloc, interval 1, probability 0, space 0, times 0 01:49:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_USERNS(r4, 0xb701, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000440)={{0x1, 0x1, 0x18, r4, {r0}}, './file0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) r5 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r6 = openat(r5, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x76) write(r6, &(0x7f0000004200)='t', 0xfff4) setxattr$incfs_id(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380), &(0x7f00000003c0)={'0000000000000000000000000000000', 0x31}, 0x20, 0x0) write$cgroup_type(r6, &(0x7f0000000000), 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='xen_mc_entry_alloc\x00', r1}, 0x10) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 409.634674][ T5897] CPU: 0 PID: 5897 Comm: syz-executor.4 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 [ 409.644624][ T5897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.654692][ T5897] Call Trace: [ 409.657976][ T5897] [ 409.660915][ T5897] dump_stack_lvl+0xcd/0x134 [ 409.665535][ T5897] should_fail.cold+0x5/0xa [ 409.670058][ T5897] prepare_alloc_pages+0x17b/0x570 [ 409.675191][ T5897] ? arch_stack_walk+0x93/0xe0 [ 409.679982][ T5897] __alloc_pages+0x12f/0x500 [ 409.684597][ T5897] ? __alloc_pages_slowpath.constprop.0+0x2080/0x2080 [ 409.691386][ T5897] ? stack_trace_save+0x8c/0xc0 [ 409.696284][ T5897] __alloc_pages_bulk+0xa14/0x18a0 [ 409.701413][ T5897] ? bpf_check+0x1c86/0xbac0 [ 409.706023][ T5897] ? bpf_prog_load+0xf55/0x21f0 [ 409.710886][ T5897] ? __sys_bpf+0x68a/0x5970 [ 409.715489][ T5897] ? __x64_sys_bpf+0x75/0xb0 [ 409.720096][ T5897] ? do_syscall_64+0x35/0xb0 [ 409.724695][ T5897] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 409.730798][ T5897] ? __alloc_pages+0x500/0x500 [ 409.735578][ T5897] ? find_held_lock+0x2d/0x110 [ 409.740367][ T5897] ? __kmalloc_node+0x62/0x380 [ 409.745168][ T5897] alloc_pages_bulk_array_mempolicy+0x1c3/0x4d0 [ 409.751428][ T5897] ? rcu_read_lock_sched_held+0x3a/0x70 [ 409.756989][ T5897] ? trace_kmalloc_node+0x32/0x100 [ 409.762132][ T5897] __vmalloc_node_range+0x54f/0xf80 [ 409.767351][ T5897] ? __reg64_deduce_bounds+0x160/0x160 [ 409.772827][ T5897] ? vfree_atomic+0xe0/0xe0 [ 409.777340][ T5897] ? add_subprog+0x273/0x380 [ 409.781948][ T5897] ? ___slab_alloc+0xa6d/0xd60 [ 409.786740][ T5897] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 409.791789][ T5897] vmalloc+0x67/0x80 [ 409.795692][ T5897] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 409.800735][ T5897] bpf_prog_calc_tag+0xc9/0x6c0 [ 409.805606][ T5897] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 409.811878][ T5897] ? __bpf_prog_free+0x190/0x190 [ 409.816842][ T5897] ? check_kfunc_call+0xbf0/0xbf0 [ 409.821883][ T5897] ? rcu_read_lock_sched_held+0x3a/0x70 [ 409.827447][ T5897] ? trace_kmalloc_node+0x32/0x100 [ 409.832586][ T5897] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 409.838854][ T5897] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 409.844596][ T5897] ? check_subprogs+0x511/0x5f0 [ 409.849476][ T5897] bpf_check+0x1c86/0xbac0 [ 409.853943][ T5897] ? bpf_get_btf_vmlinux+0x10/0x10 [ 409.859082][ T5897] ? lock_downgrade+0x6e0/0x6e0 [ 409.863952][ T5897] ? __might_fault+0xd1/0x170 [ 409.868663][ T5897] ? memset+0x20/0x40 [ 409.872658][ T5897] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 409.878924][ T5897] ? bpf_obj_name_cpy+0x144/0x1a0 [ 409.883965][ T5897] ? bpf_prog_load+0xf14/0x21f0 [ 409.888828][ T5897] bpf_prog_load+0xf55/0x21f0 [ 409.893528][ T5897] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 409.899443][ T5897] ? find_held_lock+0x2d/0x110 [ 409.904248][ T5897] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 409.910525][ T5897] __sys_bpf+0x68a/0x5970 [ 409.914873][ T5897] ? bpf_link_get_from_fd+0x110/0x110 [ 409.920263][ T5897] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 409.926268][ T5897] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 409.932279][ T5897] ? find_held_lock+0x2d/0x110 [ 409.937079][ T5897] ? trace_hardirqs_on+0x38/0x1c0 [ 409.942117][ T5897] __x64_sys_bpf+0x75/0xb0 [ 409.946544][ T5897] ? syscall_enter_from_user_mode+0x21/0x70 [ 409.952456][ T5897] do_syscall_64+0x35/0xb0 [ 409.956884][ T5897] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 409.962802][ T5897] RIP: 0033:0x7f56a7d02e99 [ 409.967225][ T5897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 409.986843][ T5897] RSP: 002b:00007f56a6678168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 409.995286][ T5897] RAX: ffffffffffffffda RBX: 00007f56a7e15f60 RCX: 00007f56a7d02e99 [ 410.003261][ T5897] RDX: 0000000000000080 RSI: 0000000020000200 RDI: 0000000000000005 [ 410.011239][ T5897] RBP: 00007f56a66781d0 R08: 0000000000000000 R09: 0000000000000000 [ 410.019217][ T5897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 410.027281][ T5897] R13: 00007ffccd37371f R14: 00007f56a6678300 R15: 0000000000022000 [ 410.035273][ T5897] 01:49:24 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000080)={[0xff]}, &(0x7f00000000c0), &(0x7f0000000180)={r0, r1+60000000}, 0x8) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) signalfd(0xffffffffffffffff, &(0x7f0000000340)={[0x5]}, 0x8) (async) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) signalfd(r3, &(0x7f0000000300)={[0x7]}, 0x8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)=0x0) wait4(r4, &(0x7f0000000200), 0x2, &(0x7f0000000240)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r2, 0x36) 01:49:24 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) r0 = perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r3}, 0x10) (async) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x6, 0x12) (async) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000001c0)="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") r5 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r6 = openat(r5, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r6, &(0x7f0000004200)='t', 0xfff4) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x5d, 0x7, 0x0, 0x0, r2, 0x10000, '\x00', 0x0, r1, 0x5, 0x3, 0x3}, 0x48) (async) r8 = creat(&(0x7f0000000600)='./file0\x00', 0x119) (async) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={0xffffffffffffffff, 0x3f, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1d, 0x7, &(0x7f00000002c0)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffb}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffff9}, @exit], &(0x7f0000000300)='GPL\x00', 0x62, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0xc, r2, 0x8, &(0x7f0000000500)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x5, 0xa, 0x9, 0x9}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000680)=[r2, r6, r2, r2, r7, r2, r1, r8, r9]}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) r10 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x12000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r10, 0x1, r0, &(0x7f0000000100)={0xc}) 01:49:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r1, 0x9408, 0x0) 01:49:24 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000063"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r0}, 0x10) (async) r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r2, &(0x7f0000004200)='t', 0xfff4) write$cgroup_type(r2, &(0x7f0000000000), 0x9) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000040)) (async) write$cgroup_int(r3, &(0x7f0000000440), 0x12) [ 410.227831][ T5897] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN [ 410.239674][ T5897] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] [ 410.248104][ T5897] CPU: 1 PID: 5897 Comm: syz-executor.4 Not tainted 5.16.0-rc6-next-20211224-syzkaller #0 [ 410.258016][ T5897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.268086][ T5897] RIP: 0010:mod_memcg_page_state.part.0.constprop.0+0x28/0x5b0 [ 410.275659][ T5897] Code: 00 90 41 56 41 55 41 54 41 89 f4 55 48 89 fd 53 4c 8d 6d 08 e8 49 dd c1 ff 4c 89 ea 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 11 05 00 00 4c 8b 75 08 31 ff 4c 89 f3 83 e3 01 [ 410.295390][ T5897] RSP: 0018:ffffc9000441f5c0 EFLAGS: 00010202 [ 410.301465][ T5897] RAX: dffffc0000000000 RBX: 0000000000000001 RCX: ffffc90003eaa000 [ 410.309439][ T5897] RDX: 0000000000000001 RSI: ffffffff81b62737 RDI: 0000000000000000 [ 410.317592][ T5897] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 [ 410.325565][ T5897] R10: ffffffff81b745c0 R11: 0000000000000000 R12: 0000000000000000 [ 410.333539][ T5897] R13: 0000000000000008 R14: ffff8880188235a8 R15: ffff888018823580 [ 410.341517][ T5897] FS: 00007f56a6678700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 410.350451][ T5897] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 410.357033][ T5897] CR2: 00007fcab81aa9c8 CR3: 000000007414c000 CR4: 00000000003506e0 [ 410.365004][ T5897] Call Trace: [ 410.368274][ T5897] [ 410.371200][ T5897] __vmalloc_node_range+0x678/0xf80 [ 410.376410][ T5897] ? vfree_atomic+0xe0/0xe0 [ 410.380916][ T5897] ? add_subprog+0x273/0x380 [ 410.385513][ T5897] ? ___slab_alloc+0xa6d/0xd60 [ 410.390289][ T5897] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 410.395324][ T5897] vmalloc+0x67/0x80 [ 410.399214][ T5897] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 410.404248][ T5897] bpf_prog_calc_tag+0xc9/0x6c0 [ 410.409110][ T5897] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 410.415380][ T5897] ? __bpf_prog_free+0x190/0x190 [ 410.420352][ T5897] ? check_kfunc_call+0xbf0/0xbf0 [ 410.425404][ T5897] ? rcu_read_lock_sched_held+0x3a/0x70 [ 410.431410][ T5897] ? trace_kmalloc_node+0x32/0x100 [ 410.436541][ T5897] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 410.442800][ T5897] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 410.448536][ T5897] ? check_subprogs+0x511/0x5f0 [ 410.453405][ T5897] bpf_check+0x1c86/0xbac0 [ 410.457848][ T5897] ? bpf_get_btf_vmlinux+0x10/0x10 [ 410.462975][ T5897] ? lock_downgrade+0x6e0/0x6e0 [ 410.467836][ T5897] ? __might_fault+0xd1/0x170 [ 410.472537][ T5897] ? memset+0x20/0x40 [ 410.476525][ T5897] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 410.482780][ T5897] ? bpf_obj_name_cpy+0x144/0x1a0 [ 410.487809][ T5897] ? bpf_prog_load+0xf14/0x21f0 [ 410.492663][ T5897] bpf_prog_load+0xf55/0x21f0 [ 410.497352][ T5897] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 410.503249][ T5897] ? find_held_lock+0x2d/0x110 [ 410.508040][ T5897] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 410.514313][ T5897] __sys_bpf+0x68a/0x5970 [ 410.518658][ T5897] ? bpf_link_get_from_fd+0x110/0x110 [ 410.524048][ T5897] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 410.530044][ T5897] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 410.536145][ T5897] ? find_held_lock+0x2d/0x110 [ 410.541021][ T5897] ? trace_hardirqs_on+0x38/0x1c0 [ 410.546050][ T5897] __x64_sys_bpf+0x75/0xb0 [ 410.550474][ T5897] ? syscall_enter_from_user_mode+0x21/0x70 [ 410.556375][ T5897] do_syscall_64+0x35/0xb0 [ 410.560790][ T5897] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 410.566692][ T5897] RIP: 0033:0x7f56a7d02e99 [ 410.571107][ T5897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 410.590712][ T5897] RSP: 002b:00007f56a6678168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 410.599125][ T5897] RAX: ffffffffffffffda RBX: 00007f56a7e15f60 RCX: 00007f56a7d02e99 [ 410.607097][ T5897] RDX: 0000000000000080 RSI: 0000000020000200 RDI: 0000000000000005 [ 410.615065][ T5897] RBP: 00007f56a66781d0 R08: 0000000000000000 R09: 0000000000000000 [ 410.623041][ T5897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 410.631008][ T5897] R13: 00007ffccd37371f R14: 00007f56a6678300 R15: 0000000000022000 [ 410.638986][ T5897] [ 410.642009][ T5897] Modules linked in: [ 410.683603][ T5897] ---[ end trace 0000000000000000 ]--- [ 410.689217][ T5897] RIP: 0010:mod_memcg_page_state.part.0.constprop.0+0x28/0x5b0 [ 410.696875][ T5897] Code: 00 90 41 56 41 55 41 54 41 89 f4 55 48 89 fd 53 4c 8d 6d 08 e8 49 dd c1 ff 4c 89 ea 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 11 05 00 00 4c 8b 75 08 31 ff 4c 89 f3 83 e3 01 [ 410.717057][ T5897] RSP: 0018:ffffc9000441f5c0 EFLAGS: 00010202 [ 410.724148][ T6001] loop5: detected capacity change from 0 to 16 01:49:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x73, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async, rerun: 64) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000635cb1bd8255ae3c82321891e8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = openat(r2, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) write(r3, &(0x7f0000004200)='t', 0xfff4) (async) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_USERNS(r4, 0xb701, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000440)={{0x1, 0x1, 0x18, r4, {r0}}, './file0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) r5 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r6 = openat(r5, &(0x7f0000000280)='./file0\x00', 0x84842, 0x0) (async) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x76) write(r6, &(0x7f0000004200)='t', 0xfff4) (async, rerun: 32) setxattr$incfs_id(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380), &(0x7f00000003c0)={'0000000000000000000000000000000', 0x31}, 0x20, 0x0) (rerun: 32) write$cgroup_type(r6, &(0x7f0000000000), 0x9) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='xen_mc_entry_alloc\x00', r1}, 0x10) (async, rerun: 32) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (rerun: 32) 01:49:25 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2000000fffffff9]}, 0x0, 0x8) (async) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000080)={[0xff]}, &(0x7f00000000c0), &(0x7f0000000180)={r0, r1+60000000}, 0x8) (async) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) r2 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) (async) signalfd(0xffffffffffffffff, &(0x7f0000000340)={[0x5]}, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) (async) signalfd(r3, &(0x7f0000000300)={[0x7]}, 0x8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)=0x0) wait4(r4, &(0x7f0000000200), 0x2, &(0x7f0000000240)) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) tkill(r2, 0x36) [ 410.731130][ T5897] RAX: dffffc0000000000 RBX: 0000000000000001 RCX: ffffc90003eaa000 [ 410.751978][ T5897] RDX: 0000000000000001 RSI: ffffffff81b62737 RDI: 0000000000000000 [ 410.763485][ T6001] FAT-fs (loop5): Unrecognized mount option "€" or missing value [ 410.773437][ T5897] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 [ 410.784616][ T5897] R10: ffffffff81b745c0 R11: 0000000000000000 R12: 0000000000000000 [ 410.792751][ T5897] R13: 0000000000000008 R14: ffff8880188235a8 R15: ffff888018823580 [ 410.800866][ T5897] FS: 00007f56a6678700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 410.809936][ T5897] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 410.816688][ T5897] CR2: 00007f44b8b97000 CR3: 000000007414c000 CR4: 00000000003506e0 [ 410.825053][ T5897] Kernel panic - not syncing: Fatal exception [ 410.831376][ T5897] Kernel Offset: disabled [ 410.835691][ T5897] Rebooting in 86400 seconds..