[ 99.278456][ T8585] bash (8585) used greatest stack depth: 22448 bytes left Warning: Permanently added '[localhost]:15058' (ECDSA) to the list of known hosts. 2021/06/04 09:01:23 fuzzer started 2021/06/04 09:01:24 dialing manager at localhost:38765 2021/06/04 09:01:24 syscalls: 3662 2021/06/04 09:01:24 code coverage: enabled 2021/06/04 09:01:24 comparison tracing: enabled 2021/06/04 09:01:24 extra coverage: enabled 2021/06/04 09:01:24 setuid sandbox: enabled 2021/06/04 09:01:24 namespace sandbox: enabled 2021/06/04 09:01:24 Android sandbox: enabled 2021/06/04 09:01:24 fault injection: enabled 2021/06/04 09:01:24 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/06/04 09:01:24 net packet injection: enabled 2021/06/04 09:01:24 net device setup: enabled 2021/06/04 09:01:24 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/06/04 09:01:24 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/06/04 09:01:24 USB emulation: enabled 2021/06/04 09:01:24 hci packet injection: enabled 2021/06/04 09:01:24 wifi device emulation: enabled 2021/06/04 09:01:24 802.15.4 emulation: enabled 2021/06/04 09:01:24 fetching corpus: 0, signal 0/2000 (executing program) 2021/06/04 09:01:24 fetching corpus: 50, signal 54491/58285 (executing program) 2021/06/04 09:01:24 fetching corpus: 100, signal 73767/79331 (executing program) 2021/06/04 09:01:25 fetching corpus: 150, signal 93511/100745 (executing program) 2021/06/04 09:01:25 fetching corpus: 200, signal 106853/115769 (executing program) 2021/06/04 09:01:25 fetching corpus: 250, signal 125090/135541 (executing program) 2021/06/04 09:01:25 fetching corpus: 300, signal 140007/151994 (executing program) 2021/06/04 09:01:26 fetching corpus: 350, signal 153943/167403 (executing program) 2021/06/04 09:01:26 fetching corpus: 400, signal 170362/185196 (executing program) [ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. [ OK ] Started Getty on tty6. [ OK ] Started Getty on tty5. 2021/06/04 09:01:26 fetching corpus: 450, signal 178704/195029 (executing program) [ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty1. 2021/06/04 09:01:27 fetching corpus: 500, signal 185130/202943 (executing program) [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty2. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. 2021/06/04 09:01:27 fetching corpus: 550, signal 195917/215092 (executing program) 2021/06/04 09:01:28 fetching corpus: 600, signal 203900/224468 (executing program) 2021/06/04 09:01:28 fetching corpus: 650, signal 211987/233873 (executing program) Debian GNU/Linux 9 syzkaller ttyS0 2021/06/04 09:01:29 fetching corpus: 700, signal 219101/242356 (executing program) 2021/06/04 09:01:29 fetching corpus: 750, signal 226389/250930 (executing program) 2021/06/04 09:01:29 fetching corpus: 800, signal 233077/258945 (executing program) 2021/06/04 09:01:30 fetching corpus: 850, signal 239254/266437 (executing program) 2021/06/04 09:01:30 fetching corpus: 900, signal 245087/273542 (executing program) 2021/06/04 09:01:30 fetching corpus: 950, signal 248743/278561 (executing program) 2021/06/04 09:01:30 fetching corpus: 1000, signal 255366/286349 (executing program) 2021/06/04 09:01:31 fetching corpus: 1050, signal 263662/295759 (executing program) 2021/06/04 09:01:31 fetching corpus: 1100, signal 268812/302141 (executing program) 2021/06/04 09:01:31 fetching corpus: 1150, signal 272752/307311 (executing program) 2021/06/04 09:01:31 fetching corpus: 1200, signal 277007/312780 (executing program) 2021/06/04 09:01:32 fetching corpus: 1250, signal 280974/317961 (executing program) 2021/06/04 09:01:32 fetching corpus: 1300, signal 284067/322295 (executing program) 2021/06/04 09:01:32 fetching corpus: 1350, signal 290780/330031 (executing program) 2021/06/04 09:01:32 fetching corpus: 1400, signal 293403/333880 (executing program) 2021/06/04 09:01:33 fetching corpus: 1450, signal 297302/338970 (executing program) 2021/06/04 09:01:33 fetching corpus: 1500, signal 300764/343619 (executing program) 2021/06/04 09:01:33 fetching corpus: 1550, signal 303883/347881 (executing program) 2021/06/04 09:01:33 fetching corpus: 1600, signal 310708/355577 (executing program) 2021/06/04 09:01:34 fetching corpus: 1650, signal 315333/361238 (executing program) 2021/06/04 09:01:34 fetching corpus: 1700, signal 318127/365185 (executing program) 2021/06/04 09:01:34 fetching corpus: 1750, signal 322646/370703 (executing program) 2021/06/04 09:01:34 fetching corpus: 1800, signal 325080/374249 (executing program) 2021/06/04 09:01:35 fetching corpus: 1850, signal 329680/379827 (executing program) 2021/06/04 09:01:35 fetching corpus: 1900, signal 334013/385120 (executing program) 2021/06/04 09:01:35 fetching corpus: 1950, signal 336383/388606 (executing program) 2021/06/04 09:01:36 fetching corpus: 2000, signal 340316/393523 (executing program) 2021/06/04 09:01:36 fetching corpus: 2050, signal 345964/399993 (executing program) 2021/06/04 09:01:36 fetching corpus: 2100, signal 348814/403911 (executing program) 2021/06/04 09:01:36 fetching corpus: 2150, signal 353380/409349 (executing program) 2021/06/04 09:01:37 fetching corpus: 2200, signal 357396/414272 (executing program) 2021/06/04 09:01:37 fetching corpus: 2250, signal 359664/417610 (executing program) 2021/06/04 09:01:37 fetching corpus: 2300, signal 361789/420785 (executing program) 2021/06/04 09:01:37 fetching corpus: 2350, signal 363740/423781 (executing program) 2021/06/04 09:01:38 fetching corpus: 2400, signal 366007/427068 (executing program) 2021/06/04 09:01:38 fetching corpus: 2450, signal 368130/430180 (executing program) 2021/06/04 09:01:38 fetching corpus: 2500, signal 370985/433962 (executing program) 2021/06/04 09:01:39 fetching corpus: 2550, signal 374080/437936 (executing program) 2021/06/04 09:01:39 fetching corpus: 2600, signal 376767/441556 (executing program) 2021/06/04 09:01:39 fetching corpus: 2650, signal 379622/445256 (executing program) 2021/06/04 09:01:40 fetching corpus: 2700, signal 382002/448569 (executing program) 2021/06/04 09:01:40 fetching corpus: 2750, signal 385514/452909 (executing program) 2021/06/04 09:01:40 fetching corpus: 2800, signal 387738/456072 (executing program) 2021/06/04 09:01:40 fetching corpus: 2850, signal 390745/459862 (executing program) 2021/06/04 09:01:41 fetching corpus: 2900, signal 393734/463679 (executing program) 2021/06/04 09:01:41 fetching corpus: 2950, signal 396352/467118 (executing program) 2021/06/04 09:01:41 fetching corpus: 3000, signal 402058/473262 (executing program) 2021/06/04 09:01:42 fetching corpus: 3050, signal 404881/476908 (executing program) 2021/06/04 09:01:42 fetching corpus: 3100, signal 406556/479523 (executing program) 2021/06/04 09:01:42 fetching corpus: 3150, signal 411135/484668 (executing program) 2021/06/04 09:01:42 fetching corpus: 3200, signal 412872/487300 (executing program) 2021/06/04 09:01:43 fetching corpus: 3250, signal 415995/491104 (executing program) 2021/06/04 09:01:43 fetching corpus: 3300, signal 418196/494107 (executing program) 2021/06/04 09:01:43 fetching corpus: 3350, signal 420392/497140 (executing program) 2021/06/04 09:01:43 fetching corpus: 3400, signal 424685/501961 (executing program) 2021/06/04 09:01:44 fetching corpus: 3450, signal 426300/504494 (executing program) 2021/06/04 09:01:44 fetching corpus: 3500, signal 428598/507568 (executing program) 2021/06/04 09:01:44 fetching corpus: 3550, signal 430326/510182 (executing program) 2021/06/04 09:01:45 fetching corpus: 3600, signal 432718/513353 (executing program) 2021/06/04 09:01:45 fetching corpus: 3650, signal 434081/515613 (executing program) 2021/06/04 09:01:45 fetching corpus: 3700, signal 436085/518380 (executing program) 2021/06/04 09:01:46 fetching corpus: 3750, signal 438614/521576 (executing program) 2021/06/04 09:01:46 fetching corpus: 3800, signal 443943/527141 (executing program) 2021/06/04 09:01:46 fetching corpus: 3850, signal 445554/529516 (executing program) 2021/06/04 09:01:46 fetching corpus: 3900, signal 447640/532331 (executing program) 2021/06/04 09:01:47 fetching corpus: 3950, signal 450241/535607 (executing program) 2021/06/04 09:01:47 fetching corpus: 4000, signal 452849/538875 (executing program) 2021/06/04 09:01:48 fetching corpus: 4050, signal 454637/541444 (executing program) 2021/06/04 09:01:48 fetching corpus: 4100, signal 456419/543964 (executing program) 2021/06/04 09:01:48 fetching corpus: 4150, signal 457774/546173 (executing program) 2021/06/04 09:01:48 fetching corpus: 4200, signal 461018/549856 (executing program) 2021/06/04 09:01:49 fetching corpus: 4250, signal 462738/552283 (executing program) 2021/06/04 09:01:49 fetching corpus: 4300, signal 464068/554405 (executing program) 2021/06/04 09:01:49 fetching corpus: 4350, signal 465688/556730 (executing program) 2021/06/04 09:01:49 fetching corpus: 4400, signal 466879/558763 (executing program) 2021/06/04 09:01:49 fetching corpus: 4450, signal 469751/562137 (executing program) 2021/06/04 09:01:50 fetching corpus: 4500, signal 470692/563953 (executing program) 2021/06/04 09:01:50 fetching corpus: 4550, signal 472441/566353 (executing program) 2021/06/04 09:01:50 fetching corpus: 4600, signal 474361/568952 (executing program) 2021/06/04 09:01:50 fetching corpus: 4650, signal 476772/571908 (executing program) 2021/06/04 09:01:51 fetching corpus: 4700, signal 479069/574749 (executing program) 2021/06/04 09:01:51 fetching corpus: 4750, signal 481266/577507 (executing program) 2021/06/04 09:01:51 fetching corpus: 4800, signal 483306/580169 (executing program) 2021/06/04 09:01:51 fetching corpus: 4850, signal 485239/582735 (executing program) 2021/06/04 09:01:52 fetching corpus: 4900, signal 486558/584741 (executing program) 2021/06/04 09:01:52 fetching corpus: 4950, signal 489259/587923 (executing program) 2021/06/04 09:01:52 fetching corpus: 5000, signal 491229/590448 (executing program) 2021/06/04 09:01:53 fetching corpus: 5050, signal 494976/594377 (executing program) 2021/06/04 09:01:53 fetching corpus: 5100, signal 496069/596210 (executing program) 2021/06/04 09:01:53 fetching corpus: 5150, signal 497091/597998 (executing program) 2021/06/04 09:01:53 fetching corpus: 5200, signal 501885/602710 (executing program) 2021/06/04 09:01:54 fetching corpus: 5250, signal 503459/604911 (executing program) 2021/06/04 09:01:54 fetching corpus: 5300, signal 505633/607586 (executing program) 2021/06/04 09:01:54 fetching corpus: 5350, signal 507131/609741 (executing program) 2021/06/04 09:01:54 fetching corpus: 5400, signal 508324/611605 (executing program) 2021/06/04 09:01:54 fetching corpus: 5450, signal 509806/613670 (executing program) 2021/06/04 09:01:55 fetching corpus: 5500, signal 511367/615852 (executing program) 2021/06/04 09:01:55 fetching corpus: 5550, signal 513623/618514 (executing program) 2021/06/04 09:01:55 fetching corpus: 5600, signal 514733/620304 (executing program) 2021/06/04 09:01:55 fetching corpus: 5650, signal 516849/622812 (executing program) 2021/06/04 09:01:56 fetching corpus: 5700, signal 518340/624853 (executing program) 2021/06/04 09:01:56 fetching corpus: 5750, signal 519491/626638 (executing program) 2021/06/04 09:01:56 fetching corpus: 5800, signal 521188/628847 (executing program) 2021/06/04 09:01:56 fetching corpus: 5850, signal 522071/630433 (executing program) 2021/06/04 09:01:57 fetching corpus: 5900, signal 523018/632079 (executing program) 2021/06/04 09:01:57 fetching corpus: 5950, signal 524358/633975 (executing program) 2021/06/04 09:01:57 fetching corpus: 6000, signal 525457/635727 (executing program) 2021/06/04 09:01:58 fetching corpus: 6050, signal 528676/639037 (executing program) 2021/06/04 09:01:58 fetching corpus: 6100, signal 530215/641115 (executing program) 2021/06/04 09:01:58 fetching corpus: 6150, signal 531483/642928 (executing program) 2021/06/04 09:01:59 fetching corpus: 6200, signal 532993/644995 (executing program) 2021/06/04 09:01:59 fetching corpus: 6250, signal 533807/646477 (executing program) 2021/06/04 09:01:59 fetching corpus: 6300, signal 535367/648505 (executing program) 2021/06/04 09:02:00 fetching corpus: 6350, signal 536893/650529 (executing program) 2021/06/04 09:02:00 fetching corpus: 6400, signal 538278/652422 (executing program) 2021/06/04 09:02:00 fetching corpus: 6450, signal 539982/654608 (executing program) 2021/06/04 09:02:00 fetching corpus: 6500, signal 542272/657147 (executing program) 2021/06/04 09:02:01 fetching corpus: 6550, signal 543120/658603 (executing program) 2021/06/04 09:02:01 fetching corpus: 6600, signal 545046/660885 (executing program) 2021/06/04 09:02:01 fetching corpus: 6650, signal 546075/662529 (executing program) 2021/06/04 09:02:02 fetching corpus: 6700, signal 547052/664100 (executing program) 2021/06/04 09:02:02 fetching corpus: 6750, signal 548635/666091 (executing program) 2021/06/04 09:02:02 fetching corpus: 6800, signal 549920/667894 (executing program) 2021/06/04 09:02:03 fetching corpus: 6850, signal 551167/669651 (executing program) 2021/06/04 09:02:03 fetching corpus: 6900, signal 552324/671306 (executing program) 2021/06/04 09:02:03 fetching corpus: 6950, signal 553070/672683 (executing program) 2021/06/04 09:02:03 fetching corpus: 7000, signal 553657/673944 (executing program) 2021/06/04 09:02:04 fetching corpus: 7050, signal 554477/675368 (executing program) 2021/06/04 09:02:04 fetching corpus: 7100, signal 555771/677120 (executing program) 2021/06/04 09:02:04 fetching corpus: 7150, signal 556988/678855 (executing program) 2021/06/04 09:02:04 fetching corpus: 7200, signal 558236/680567 (executing program) 2021/06/04 09:02:05 fetching corpus: 7250, signal 559850/682561 (executing program) 2021/06/04 09:02:05 fetching corpus: 7300, signal 561072/684293 (executing program) 2021/06/04 09:02:05 fetching corpus: 7350, signal 562135/685826 (executing program) 2021/06/04 09:02:05 fetching corpus: 7400, signal 563537/687651 (executing program) 2021/06/04 09:02:06 fetching corpus: 7450, signal 564346/689038 (executing program) 2021/06/04 09:02:06 fetching corpus: 7500, signal 566127/691086 (executing program) 2021/06/04 09:02:06 fetching corpus: 7550, signal 567106/692584 (executing program) 2021/06/04 09:02:06 fetching corpus: 7600, signal 568230/694210 (executing program) 2021/06/04 09:02:06 fetching corpus: 7650, signal 569363/695772 (executing program) 2021/06/04 09:02:07 fetching corpus: 7700, signal 570601/697432 (executing program) 2021/06/04 09:02:07 fetching corpus: 7750, signal 571893/699140 (executing program) 2021/06/04 09:02:07 fetching corpus: 7800, signal 573271/700893 (executing program) 2021/06/04 09:02:08 fetching corpus: 7850, signal 574681/702671 (executing program) 2021/06/04 09:02:08 fetching corpus: 7900, signal 575419/703986 (executing program) 2021/06/04 09:02:08 fetching corpus: 7950, signal 577417/706110 (executing program) 2021/06/04 09:02:08 fetching corpus: 8000, signal 578451/707600 (executing program) 2021/06/04 09:02:08 fetching corpus: 8050, signal 579779/709302 (executing program) 2021/06/04 09:02:09 fetching corpus: 8100, signal 580864/710802 (executing program) 2021/06/04 09:02:09 fetching corpus: 8150, signal 582236/712539 (executing program) 2021/06/04 09:02:09 fetching corpus: 8200, signal 583369/714048 (executing program) 2021/06/04 09:02:09 fetching corpus: 8250, signal 584747/715768 (executing program) 2021/06/04 09:02:10 fetching corpus: 8300, signal 585740/717192 (executing program) 2021/06/04 09:02:10 fetching corpus: 8350, signal 586362/718405 (executing program) 2021/06/04 09:02:10 fetching corpus: 8400, signal 587473/719911 (executing program) 2021/06/04 09:02:10 fetching corpus: 8450, signal 590340/722520 (executing program) 2021/06/04 09:02:11 fetching corpus: 8500, signal 593610/725455 (executing program) 2021/06/04 09:02:11 fetching corpus: 8550, signal 594456/726743 (executing program) 2021/06/04 09:02:11 fetching corpus: 8600, signal 595338/728045 (executing program) 2021/06/04 09:02:11 fetching corpus: 8650, signal 596293/729456 (executing program) 2021/06/04 09:02:12 fetching corpus: 8700, signal 597203/730851 (executing program) 2021/06/04 09:02:12 fetching corpus: 8750, signal 598422/732387 (executing program) 2021/06/04 09:02:12 fetching corpus: 8800, signal 599808/734004 (executing program) 2021/06/04 09:02:12 fetching corpus: 8850, signal 601709/735930 (executing program) 2021/06/04 09:02:12 fetching corpus: 8900, signal 604384/738332 (executing program) 2021/06/04 09:02:13 fetching corpus: 8950, signal 605657/739916 (executing program) 2021/06/04 09:02:13 fetching corpus: 9000, signal 606383/741091 (executing program) 2021/06/04 09:02:14 fetching corpus: 9050, signal 607333/742434 (executing program) 2021/06/04 09:02:14 fetching corpus: 9100, signal 608408/743876 (executing program) 2021/06/04 09:02:14 fetching corpus: 9150, signal 610220/745729 (executing program) 2021/06/04 09:02:14 fetching corpus: 9200, signal 611840/747446 (executing program) 2021/06/04 09:02:15 fetching corpus: 9250, signal 613003/748895 (executing program) 2021/06/04 09:02:15 fetching corpus: 9300, signal 613722/750015 (executing program) 2021/06/04 09:02:15 fetching corpus: 9350, signal 614677/751306 (executing program) 2021/06/04 09:02:15 fetching corpus: 9400, signal 615812/752698 (executing program) 2021/06/04 09:02:15 fetching corpus: 9450, signal 616726/753981 (executing program) 2021/06/04 09:02:16 fetching corpus: 9500, signal 617549/755164 (executing program) 2021/06/04 09:02:17 fetching corpus: 9550, signal 618507/756494 (executing program) 2021/06/04 09:02:17 fetching corpus: 9600, signal 619557/757866 (executing program) 2021/06/04 09:02:17 fetching corpus: 9650, signal 621169/759551 (executing program) 2021/06/04 09:02:19 fetching corpus: 9700, signal 622242/760901 (executing program) 2021/06/04 09:02:19 fetching corpus: 9750, signal 623087/762071 (executing program) 2021/06/04 09:02:19 fetching corpus: 9800, signal 624129/763425 (executing program) 2021/06/04 09:02:20 fetching corpus: 9850, signal 625075/764681 (executing program) 2021/06/04 09:02:20 fetching corpus: 9900, signal 625563/765682 (executing program) 2021/06/04 09:02:20 fetching corpus: 9950, signal 626421/766884 (executing program) 2021/06/04 09:02:21 fetching corpus: 10000, signal 627193/768061 (executing program) 2021/06/04 09:02:21 fetching corpus: 10050, signal 628325/769444 (executing program) 2021/06/04 09:02:22 fetching corpus: 10100, signal 629509/770819 (executing program) 2021/06/04 09:02:22 fetching corpus: 10150, signal 630633/772166 (executing program) 2021/06/04 09:02:22 fetching corpus: 10200, signal 632416/773837 (executing program) 2021/06/04 09:02:23 fetching corpus: 10250, signal 633541/775249 (executing program) 2021/06/04 09:02:23 fetching corpus: 10300, signal 634280/776358 (executing program) 2021/06/04 09:02:23 fetching corpus: 10350, signal 635402/777680 (executing program) 2021/06/04 09:02:24 fetching corpus: 10400, signal 636222/778809 (executing program) 2021/06/04 09:02:24 fetching corpus: 10450, signal 636835/779756 (executing program) syzkaller login: [ 164.400625][ T3380] ieee802154 phy0 wpan0: encryption failed: -22 [ 164.429449][ T3380] ieee802154 phy1 wpan1: encryption failed: -22 2021/06/04 09:02:24 fetching corpus: 10500, signal 637800/781023 (executing program) 2021/06/04 09:02:25 fetching corpus: 10550, signal 638537/782142 (executing program) 2021/06/04 09:02:25 fetching corpus: 10600, signal 639966/783619 (executing program) 2021/06/04 09:02:26 fetching corpus: 10650, signal 640870/784869 (executing program) 2021/06/04 09:02:26 fetching corpus: 10700, signal 642023/786184 (executing program) 2021/06/04 09:02:26 fetching corpus: 10750, signal 642694/787215 (executing program) 2021/06/04 09:02:26 fetching corpus: 10800, signal 643561/788348 (executing program) 2021/06/04 09:02:27 fetching corpus: 10850, signal 644372/789474 (executing program) 2021/06/04 09:02:27 fetching corpus: 10900, signal 645103/790562 (executing program) 2021/06/04 09:02:27 fetching corpus: 10950, signal 645963/791646 (executing program) 2021/06/04 09:02:29 fetching corpus: 11000, signal 646719/792731 (executing program) 2021/06/04 09:02:29 fetching corpus: 11050, signal 647395/793726 (executing program) 2021/06/04 09:02:29 fetching corpus: 11100, signal 647897/794675 (executing program) 2021/06/04 09:02:30 fetching corpus: 11150, signal 648897/795830 (executing program) 2021/06/04 09:02:30 fetching corpus: 11200, signal 650812/797469 (executing program) 2021/06/04 09:02:30 fetching corpus: 11250, signal 651588/798524 (executing program) 2021/06/04 09:02:30 fetching corpus: 11300, signal 652180/799503 (executing program) 2021/06/04 09:02:31 fetching corpus: 11350, signal 653088/800638 (executing program) 2021/06/04 09:02:31 fetching corpus: 11400, signal 653921/801739 (executing program) 2021/06/04 09:02:31 fetching corpus: 11450, signal 655526/803239 (executing program) 2021/06/04 09:02:32 fetching corpus: 11500, signal 656530/804411 (executing program) 2021/06/04 09:02:32 fetching corpus: 11550, signal 657881/805790 (executing program) 2021/06/04 09:02:32 fetching corpus: 11600, signal 658846/806936 (executing program) 2021/06/04 09:02:33 fetching corpus: 11650, signal 659653/807958 (executing program) 2021/06/04 09:02:33 fetching corpus: 11700, signal 660318/808958 (executing program) 2021/06/04 09:02:33 fetching corpus: 11750, signal 661437/810138 (executing program) 2021/06/04 09:02:33 fetching corpus: 11800, signal 662383/811246 (executing program) 2021/06/04 09:02:34 fetching corpus: 11850, signal 663130/812206 (executing program) 2021/06/04 09:02:34 fetching corpus: 11900, signal 664165/813326 (executing program) 2021/06/04 09:02:34 fetching corpus: 11950, signal 665287/814506 (executing program) 2021/06/04 09:02:34 fetching corpus: 12000, signal 665880/815455 (executing program) 2021/06/04 09:02:35 fetching corpus: 12050, signal 666647/816479 (executing program) 2021/06/04 09:02:35 fetching corpus: 12100, signal 667490/817527 (executing program) 2021/06/04 09:02:35 fetching corpus: 12150, signal 668573/818648 (executing program) 2021/06/04 09:02:35 fetching corpus: 12200, signal 669426/819673 (executing program) 2021/06/04 09:02:36 fetching corpus: 12250, signal 670322/820690 (executing program) 2021/06/04 09:02:36 fetching corpus: 12300, signal 672077/822185 (executing program) 2021/06/04 09:02:36 fetching corpus: 12350, signal 672773/823127 (executing program) 2021/06/04 09:02:36 fetching corpus: 12400, signal 674207/824445 (executing program) 2021/06/04 09:02:37 fetching corpus: 12450, signal 674849/825391 (executing program) 2021/06/04 09:02:37 fetching corpus: 12500, signal 675967/826529 (executing program) 2021/06/04 09:02:37 fetching corpus: 12550, signal 676699/827490 (executing program) 2021/06/04 09:02:37 fetching corpus: 12600, signal 677871/828665 (executing program) 2021/06/04 09:02:38 fetching corpus: 12650, signal 678580/829594 (executing program) 2021/06/04 09:02:38 fetching corpus: 12700, signal 679180/830431 (executing program) 2021/06/04 09:02:39 fetching corpus: 12750, signal 679961/831384 (executing program) 2021/06/04 09:02:39 fetching corpus: 12800, signal 680892/832398 (executing program) 2021/06/04 09:02:39 fetching corpus: 12850, signal 681531/833264 (executing program) 2021/06/04 09:02:39 fetching corpus: 12900, signal 682129/834154 (executing program) 2021/06/04 09:02:39 fetching corpus: 12950, signal 682772/835044 (executing program) 2021/06/04 09:02:40 fetching corpus: 13000, signal 683475/835958 (executing program) 2021/06/04 09:02:40 fetching corpus: 13050, signal 684157/836873 (executing program) 2021/06/04 09:02:40 fetching corpus: 13100, signal 685035/837856 (executing program) 2021/06/04 09:02:40 fetching corpus: 13150, signal 685616/838684 (executing program) 2021/06/04 09:02:41 fetching corpus: 13200, signal 686494/839674 (executing program) 2021/06/04 09:02:41 fetching corpus: 13250, signal 687419/840637 (executing program) 2021/06/04 09:02:41 fetching corpus: 13300, signal 688070/841529 (executing program) 2021/06/04 09:02:41 fetching corpus: 13350, signal 688982/842449 (executing program) 2021/06/04 09:02:42 fetching corpus: 13400, signal 690122/843527 (executing program) 2021/06/04 09:02:42 fetching corpus: 13450, signal 690861/844393 (executing program) 2021/06/04 09:02:42 fetching corpus: 13500, signal 691549/845283 (executing program) 2021/06/04 09:02:42 fetching corpus: 13550, signal 692010/846073 (executing program) 2021/06/04 09:02:43 fetching corpus: 13600, signal 692631/846953 (executing program) 2021/06/04 09:02:43 fetching corpus: 13650, signal 693926/848060 (executing program) 2021/06/04 09:02:43 fetching corpus: 13700, signal 694813/849023 (executing program) 2021/06/04 09:02:43 fetching corpus: 13750, signal 695655/849966 (executing program) 2021/06/04 09:02:44 fetching corpus: 13800, signal 696402/850844 (executing program) 2021/06/04 09:02:44 fetching corpus: 13850, signal 696955/851642 (executing program) 2021/06/04 09:02:44 fetching corpus: 13900, signal 697435/852359 (executing program) 2021/06/04 09:02:45 fetching corpus: 13950, signal 697947/853148 (executing program) 2021/06/04 09:02:45 fetching corpus: 14000, signal 699040/854169 (executing program) 2021/06/04 09:02:46 fetching corpus: 14050, signal 699684/855035 (executing program) 2021/06/04 09:02:46 fetching corpus: 14100, signal 700014/855726 (executing program) 2021/06/04 09:02:46 fetching corpus: 14150, signal 701207/856780 (executing program) 2021/06/04 09:02:47 fetching corpus: 14200, signal 701554/857460 (executing program) 2021/06/04 09:02:47 fetching corpus: 14250, signal 702277/858289 (executing program) 2021/06/04 09:02:47 fetching corpus: 14300, signal 703294/859248 (executing program) 2021/06/04 09:02:47 fetching corpus: 14350, signal 704292/860170 (executing program) 2021/06/04 09:02:48 fetching corpus: 14400, signal 705007/861006 (executing program) 2021/06/04 09:02:48 fetching corpus: 14450, signal 705593/861734 (executing program) 2021/06/04 09:02:48 fetching corpus: 14500, signal 706325/862588 (executing program) 2021/06/04 09:02:48 fetching corpus: 14550, signal 707030/863438 (executing program) 2021/06/04 09:02:49 fetching corpus: 14600, signal 707536/864197 (executing program) 2021/06/04 09:02:49 fetching corpus: 14650, signal 708038/864916 (executing program) 2021/06/04 09:02:49 fetching corpus: 14700, signal 708466/865569 (executing program) 2021/06/04 09:02:49 fetching corpus: 14750, signal 709049/866349 (executing program) 2021/06/04 09:02:50 fetching corpus: 14800, signal 709919/867164 (executing program) 2021/06/04 09:02:50 fetching corpus: 14850, signal 710325/867851 (executing program) 2021/06/04 09:02:50 fetching corpus: 14900, signal 711159/868692 (executing program) 2021/06/04 09:02:51 fetching corpus: 14950, signal 711635/869383 (executing program) 2021/06/04 09:02:51 fetching corpus: 15000, signal 712092/870100 (executing program) 2021/06/04 09:02:52 fetching corpus: 15050, signal 712655/870853 (executing program) 2021/06/04 09:02:52 fetching corpus: 15100, signal 713525/871702 (executing program) 2021/06/04 09:02:52 fetching corpus: 15150, signal 714238/872479 (executing program) 2021/06/04 09:02:53 fetching corpus: 15200, signal 715525/873472 (executing program) 2021/06/04 09:02:53 fetching corpus: 15250, signal 716106/874236 (executing program) 2021/06/04 09:02:54 fetching corpus: 15300, signal 717445/875204 (executing program) 2021/06/04 09:02:54 fetching corpus: 15350, signal 717806/875869 (executing program) 2021/06/04 09:02:54 fetching corpus: 15400, signal 718750/876676 (executing program) 2021/06/04 09:02:55 fetching corpus: 15450, signal 719514/877473 (executing program) 2021/06/04 09:02:55 fetching corpus: 15500, signal 720647/878367 (executing program) 2021/06/04 09:02:56 fetching corpus: 15550, signal 721472/879179 (executing program) 2021/06/04 09:02:56 fetching corpus: 15600, signal 721988/879873 (executing program) 2021/06/04 09:02:56 fetching corpus: 15650, signal 722448/880522 (executing program) 2021/06/04 09:02:56 fetching corpus: 15700, signal 723058/881230 (executing program) 2021/06/04 09:02:57 fetching corpus: 15750, signal 723594/881907 (executing program) 2021/06/04 09:02:57 fetching corpus: 15800, signal 724194/882610 (executing program) 2021/06/04 09:02:57 fetching corpus: 15850, signal 724757/883336 (executing program) 2021/06/04 09:02:58 fetching corpus: 15900, signal 725230/883946 (executing program) 2021/06/04 09:02:58 fetching corpus: 15950, signal 725884/884667 (executing program) 2021/06/04 09:02:59 fetching corpus: 16000, signal 726973/885527 (executing program) 2021/06/04 09:02:59 fetching corpus: 16050, signal 727996/886328 (executing program) 2021/06/04 09:02:59 fetching corpus: 16100, signal 728578/887026 (executing program) 2021/06/04 09:03:00 fetching corpus: 16150, signal 729196/887734 (executing program) 2021/06/04 09:03:00 fetching corpus: 16200, signal 730278/888602 (executing program) 2021/06/04 09:03:00 fetching corpus: 16250, signal 731192/889394 (executing program) 2021/06/04 09:03:01 fetching corpus: 16300, signal 731792/890041 (executing program) 2021/06/04 09:03:01 fetching corpus: 16350, signal 732370/890701 (executing program) 2021/06/04 09:03:01 fetching corpus: 16400, signal 732740/891369 (executing program) 2021/06/04 09:03:02 fetching corpus: 16450, signal 733268/891982 (executing program) 2021/06/04 09:03:02 fetching corpus: 16500, signal 733932/892677 (executing program) 2021/06/04 09:03:02 fetching corpus: 16550, signal 734570/893365 (executing program) 2021/06/04 09:03:03 fetching corpus: 16600, signal 735088/894027 (executing program) 2021/06/04 09:03:03 fetching corpus: 16650, signal 735474/894635 (executing program) 2021/06/04 09:03:03 fetching corpus: 16700, signal 736134/895330 (executing program) 2021/06/04 09:03:04 fetching corpus: 16750, signal 736841/895979 (executing program) 2021/06/04 09:03:04 fetching corpus: 16800, signal 737690/896726 (executing program) 2021/06/04 09:03:04 fetching corpus: 16850, signal 738294/897382 (executing program) 2021/06/04 09:03:04 fetching corpus: 16900, signal 739176/898180 (executing program) 2021/06/04 09:03:05 fetching corpus: 16950, signal 740129/898922 (executing program) 2021/06/04 09:03:05 fetching corpus: 17000, signal 740621/899522 (executing program) 2021/06/04 09:03:05 fetching corpus: 17050, signal 741822/900377 (executing program) 2021/06/04 09:03:06 fetching corpus: 17100, signal 742360/900986 (executing program) 2021/06/04 09:03:06 fetching corpus: 17150, signal 742993/901637 (executing program) 2021/06/04 09:03:06 fetching corpus: 17200, signal 743597/902303 (executing program) 2021/06/04 09:03:06 fetching corpus: 17250, signal 744070/902923 (executing program) 2021/06/04 09:03:07 fetching corpus: 17300, signal 744592/903514 (executing program) 2021/06/04 09:03:07 fetching corpus: 17350, signal 745210/904137 (executing program) 2021/06/04 09:03:07 fetching corpus: 17400, signal 746375/904873 (executing program) 2021/06/04 09:03:07 fetching corpus: 17450, signal 747141/905561 (executing program) 2021/06/04 09:03:08 fetching corpus: 17500, signal 748390/906375 (executing program) 2021/06/04 09:03:08 fetching corpus: 17550, signal 749102/907036 (executing program) 2021/06/04 09:03:08 fetching corpus: 17600, signal 749588/907627 (executing program) 2021/06/04 09:03:08 fetching corpus: 17650, signal 750480/908300 (executing program) 2021/06/04 09:03:09 fetching corpus: 17700, signal 751021/908865 (executing program) 2021/06/04 09:03:09 fetching corpus: 17750, signal 751531/909456 (executing program) 2021/06/04 09:03:09 fetching corpus: 17800, signal 752522/910156 (executing program) 2021/06/04 09:03:09 fetching corpus: 17850, signal 753108/910801 (executing program) 2021/06/04 09:03:09 fetching corpus: 17900, signal 753575/911343 (executing program) 2021/06/04 09:03:10 fetching corpus: 17950, signal 754252/911951 (executing program) 2021/06/04 09:03:10 fetching corpus: 18000, signal 754570/912466 (executing program) 2021/06/04 09:03:10 fetching corpus: 18050, signal 755671/913211 (executing program) 2021/06/04 09:03:11 fetching corpus: 18100, signal 756399/913794 (executing program) 2021/06/04 09:03:11 fetching corpus: 18150, signal 756977/914375 (executing program) 2021/06/04 09:03:11 fetching corpus: 18200, signal 757440/914941 (executing program) 2021/06/04 09:03:11 fetching corpus: 18250, signal 758534/915620 (executing program) 2021/06/04 09:03:11 fetching corpus: 18300, signal 758987/916175 (executing program) 2021/06/04 09:03:12 fetching corpus: 18350, signal 759779/916774 (executing program) 2021/06/04 09:03:12 fetching corpus: 18400, signal 760319/917347 (executing program) 2021/06/04 09:03:12 fetching corpus: 18450, signal 761095/917937 (executing program) 2021/06/04 09:03:12 fetching corpus: 18500, signal 761795/918508 (executing program) 2021/06/04 09:03:13 fetching corpus: 18550, signal 762515/919121 (executing program) 2021/06/04 09:03:13 fetching corpus: 18600, signal 763088/919634 (executing program) 2021/06/04 09:03:13 fetching corpus: 18650, signal 763850/920253 (executing program) 2021/06/04 09:03:13 fetching corpus: 18700, signal 764805/920891 (executing program) 2021/06/04 09:03:13 fetching corpus: 18750, signal 765197/921436 (executing program) 2021/06/04 09:03:14 fetching corpus: 18800, signal 765870/922002 (executing program) 2021/06/04 09:03:14 fetching corpus: 18850, signal 766244/922472 (executing program) 2021/06/04 09:03:14 fetching corpus: 18900, signal 766888/923022 (executing program) 2021/06/04 09:03:14 fetching corpus: 18950, signal 767383/923511 (executing program) 2021/06/04 09:03:15 fetching corpus: 19000, signal 767873/924006 (executing program) 2021/06/04 09:03:15 fetching corpus: 19050, signal 769579/924746 (executing program) 2021/06/04 09:03:15 fetching corpus: 19100, signal 770221/925306 (executing program) 2021/06/04 09:03:15 fetching corpus: 19150, signal 770685/925839 (executing program) 2021/06/04 09:03:15 fetching corpus: 19200, signal 771096/926322 (executing program) 2021/06/04 09:03:16 fetching corpus: 19250, signal 771511/926801 (executing program) 2021/06/04 09:03:16 fetching corpus: 19300, signal 772004/927299 (executing program) 2021/06/04 09:03:16 fetching corpus: 19350, signal 772813/927864 (executing program) 2021/06/04 09:03:16 fetching corpus: 19400, signal 773512/928344 (executing program) 2021/06/04 09:03:16 fetching corpus: 19450, signal 774820/928957 (executing program) 2021/06/04 09:03:17 fetching corpus: 19500, signal 775357/929479 (executing program) 2021/06/04 09:03:17 fetching corpus: 19550, signal 775955/929988 (executing program) 2021/06/04 09:03:17 fetching corpus: 19600, signal 777278/930609 (executing program) 2021/06/04 09:03:17 fetching corpus: 19650, signal 777880/931076 (executing program) 2021/06/04 09:03:18 fetching corpus: 19700, signal 778601/931597 (executing program) 2021/06/04 09:03:18 fetching corpus: 19750, signal 779270/932101 (executing program) 2021/06/04 09:03:18 fetching corpus: 19800, signal 779735/932565 (executing program) 2021/06/04 09:03:18 fetching corpus: 19850, signal 780141/932993 (executing program) 2021/06/04 09:03:18 fetching corpus: 19900, signal 780643/933465 (executing program) 2021/06/04 09:03:19 fetching corpus: 19950, signal 781235/933927 (executing program) 2021/06/04 09:03:19 fetching corpus: 20000, signal 781793/934384 (executing program) 2021/06/04 09:03:19 fetching corpus: 20050, signal 782489/934893 (executing program) 2021/06/04 09:03:19 fetching corpus: 20100, signal 783515/935420 (executing program) 2021/06/04 09:03:19 fetching corpus: 20150, signal 784348/935921 (executing program) 2021/06/04 09:03:20 fetching corpus: 20200, signal 784976/936415 (executing program) 2021/06/04 09:03:20 fetching corpus: 20250, signal 785716/936872 (executing program) 2021/06/04 09:03:20 fetching corpus: 20300, signal 786274/937333 (executing program) 2021/06/04 09:03:20 fetching corpus: 20350, signal 787061/937826 (executing program) 2021/06/04 09:03:20 fetching corpus: 20400, signal 787546/938252 (executing program) 2021/06/04 09:03:21 fetching corpus: 20450, signal 788028/938673 (executing program) 2021/06/04 09:03:21 fetching corpus: 20500, signal 788663/939124 (executing program) 2021/06/04 09:03:21 fetching corpus: 20550, signal 789570/939642 (executing program) 2021/06/04 09:03:22 fetching corpus: 20600, signal 790405/940119 (executing program) 2021/06/04 09:03:22 fetching corpus: 20650, signal 791063/940575 (executing program) 2021/06/04 09:03:23 fetching corpus: 20700, signal 791827/941068 (executing program) 2021/06/04 09:03:23 fetching corpus: 20750, signal 792204/941510 (executing program) 2021/06/04 09:03:23 fetching corpus: 20800, signal 793025/941972 (executing program) 2021/06/04 09:03:23 fetching corpus: 20850, signal 793628/942404 (executing program) 2021/06/04 09:03:24 fetching corpus: 20900, signal 794238/942846 (executing program) 2021/06/04 09:03:24 fetching corpus: 20950, signal 794756/943282 (executing program) 2021/06/04 09:03:24 fetching corpus: 21000, signal 795417/943726 (executing program) 2021/06/04 09:03:24 fetching corpus: 21050, signal 796526/944216 (executing program) 2021/06/04 09:03:24 fetching corpus: 21100, signal 797005/944627 (executing program) 2021/06/04 09:03:24 fetching corpus: 21150, signal 797399/945040 (executing program) 2021/06/04 09:03:25 fetching corpus: 21200, signal 797966/945499 (executing program) 2021/06/04 09:03:25 fetching corpus: 21250, signal 798632/945925 (executing program) 2021/06/04 09:03:25 fetching corpus: 21300, signal 799310/946345 (executing program) 2021/06/04 09:03:25 fetching corpus: 21350, signal 799821/946738 (executing program) [ 225.809774][ T3380] ieee802154 phy0 wpan0: encryption failed: -22 [ 225.818218][ T3380] ieee802154 phy1 wpan1: encryption failed: -22 2021/06/04 09:03:26 fetching corpus: 21400, signal 800242/947101 (executing program) 2021/06/04 09:03:26 fetching corpus: 21450, signal 800738/947495 (executing program) 2021/06/04 09:03:26 fetching corpus: 21500, signal 801158/947876 (executing program) 2021/06/04 09:03:27 fetching corpus: 21550, signal 801549/948268 (executing program) 2021/06/04 09:03:27 fetching corpus: 21600, signal 802042/948630 (executing program) 2021/06/04 09:03:27 fetching corpus: 21650, signal 802765/949031 (executing program) 2021/06/04 09:03:27 fetching corpus: 21700, signal 803551/949469 (executing program) 2021/06/04 09:03:28 fetching corpus: 21750, signal 804021/949843 (executing program) 2021/06/04 09:03:28 fetching corpus: 21800, signal 804492/950238 (executing program) 2021/06/04 09:03:28 fetching corpus: 21850, signal 805044/950622 (executing program) 2021/06/04 09:03:28 fetching corpus: 21900, signal 805534/950984 (executing program) 2021/06/04 09:03:28 fetching corpus: 21950, signal 806060/951365 (executing program) 2021/06/04 09:03:29 fetching corpus: 22000, signal 806608/951733 (executing program) 2021/06/04 09:03:29 fetching corpus: 22050, signal 807221/952134 (executing program) 2021/06/04 09:03:29 fetching corpus: 22100, signal 808289/952550 (executing program) 2021/06/04 09:03:29 fetching corpus: 22150, signal 808819/952920 (executing program) 2021/06/04 09:03:29 fetching corpus: 22200, signal 809869/953341 (executing program) 2021/06/04 09:03:30 fetching corpus: 22250, signal 810741/953731 (executing program) 2021/06/04 09:03:30 fetching corpus: 22300, signal 811351/954097 (executing program) 2021/06/04 09:03:30 fetching corpus: 22350, signal 811747/954451 (executing program) 2021/06/04 09:03:30 fetching corpus: 22400, signal 812372/954827 (executing program) 2021/06/04 09:03:30 fetching corpus: 22450, signal 812972/955198 (executing program) 2021/06/04 09:03:31 fetching corpus: 22500, signal 813339/955575 (executing program) 2021/06/04 09:03:31 fetching corpus: 22550, signal 813712/955928 (executing program) 2021/06/04 09:03:31 fetching corpus: 22600, signal 814154/956261 (executing program) 2021/06/04 09:03:31 fetching corpus: 22650, signal 814619/956604 (executing program) 2021/06/04 09:03:32 fetching corpus: 22700, signal 814926/956954 (executing program) 2021/06/04 09:03:32 fetching corpus: 22750, signal 815652/957329 (executing program) 2021/06/04 09:03:32 fetching corpus: 22800, signal 816250/957651 (executing program) 2021/06/04 09:03:32 fetching corpus: 22850, signal 816679/957981 (executing program) 2021/06/04 09:03:33 fetching corpus: 22900, signal 817301/958330 (executing program) 2021/06/04 09:03:33 fetching corpus: 22950, signal 817828/958668 (executing program) 2021/06/04 09:03:33 fetching corpus: 23000, signal 818332/959012 (executing program) 2021/06/04 09:03:33 fetching corpus: 23050, signal 819175/959356 (executing program) 2021/06/04 09:03:34 fetching corpus: 23100, signal 819706/959678 (executing program) 2021/06/04 09:03:34 fetching corpus: 23150, signal 820113/959977 (executing program) 2021/06/04 09:03:34 fetching corpus: 23200, signal 820482/960291 (executing program) 2021/06/04 09:03:34 fetching corpus: 23250, signal 821014/960604 (executing program) 2021/06/04 09:03:34 fetching corpus: 23300, signal 821491/960927 (executing program) 2021/06/04 09:03:35 fetching corpus: 23350, signal 822748/961271 (executing program) 2021/06/04 09:03:35 fetching corpus: 23400, signal 823173/961578 (executing program) 2021/06/04 09:03:35 fetching corpus: 23450, signal 824230/961895 (executing program) 2021/06/04 09:03:35 fetching corpus: 23500, signal 824944/962189 (executing program) 2021/06/04 09:03:36 fetching corpus: 23550, signal 825553/962495 (executing program) 2021/06/04 09:03:36 fetching corpus: 23600, signal 826229/962812 (executing program) 2021/06/04 09:03:36 fetching corpus: 23650, signal 826710/963110 (executing program) 2021/06/04 09:03:36 fetching corpus: 23700, signal 827254/963426 (executing program) 2021/06/04 09:03:37 fetching corpus: 23750, signal 828060/963730 (executing program) 2021/06/04 09:03:37 fetching corpus: 23800, signal 828609/964010 (executing program) 2021/06/04 09:03:37 fetching corpus: 23850, signal 828899/964285 (executing program) 2021/06/04 09:03:37 fetching corpus: 23900, signal 829442/964574 (executing program) 2021/06/04 09:03:37 fetching corpus: 23950, signal 830153/964852 (executing program) 2021/06/04 09:03:38 fetching corpus: 24000, signal 830516/965117 (executing program) 2021/06/04 09:03:38 fetching corpus: 24050, signal 830865/965386 (executing program) 2021/06/04 09:03:38 fetching corpus: 24100, signal 831218/965626 (executing program) 2021/06/04 09:03:38 fetching corpus: 24150, signal 831647/965626 (executing program) 2021/06/04 09:03:39 fetching corpus: 24200, signal 832058/965626 (executing program) 2021/06/04 09:03:39 fetching corpus: 24250, signal 832702/965626 (executing program) 2021/06/04 09:03:39 fetching corpus: 24300, signal 833433/965626 (executing program) 2021/06/04 09:03:39 fetching corpus: 24350, signal 833791/965626 (executing program) 2021/06/04 09:03:39 fetching corpus: 24400, signal 834052/965626 (executing program) 2021/06/04 09:03:40 fetching corpus: 24450, signal 834434/965626 (executing program) 2021/06/04 09:03:40 fetching corpus: 24500, signal 835036/965626 (executing program) 2021/06/04 09:03:40 fetching corpus: 24550, signal 835432/965626 (executing program) 2021/06/04 09:03:40 fetching corpus: 24600, signal 835914/965626 (executing program) 2021/06/04 09:03:41 fetching corpus: 24650, signal 836328/965626 (executing program) 2021/06/04 09:03:41 fetching corpus: 24700, signal 836917/965626 (executing program) 2021/06/04 09:03:41 fetching corpus: 24750, signal 837279/965626 (executing program) 2021/06/04 09:03:41 fetching corpus: 24800, signal 837675/965626 (executing program) 2021/06/04 09:03:41 fetching corpus: 24850, signal 838072/965627 (executing program) 2021/06/04 09:03:41 fetching corpus: 24900, signal 838476/965627 (executing program) 2021/06/04 09:03:42 fetching corpus: 24950, signal 839068/965627 (executing program) 2021/06/04 09:03:42 fetching corpus: 25000, signal 839783/965627 (executing program) 2021/06/04 09:03:42 fetching corpus: 25050, signal 840307/965627 (executing program) 2021/06/04 09:03:42 fetching corpus: 25100, signal 840640/965627 (executing program) 2021/06/04 09:03:42 fetching corpus: 25150, signal 841052/965627 (executing program) 2021/06/04 09:03:43 fetching corpus: 25200, signal 841419/965627 (executing program) 2021/06/04 09:03:43 fetching corpus: 25250, signal 841804/965627 (executing program) 2021/06/04 09:03:43 fetching corpus: 25300, signal 842480/965627 (executing program) 2021/06/04 09:03:43 fetching corpus: 25350, signal 842990/965627 (executing program) 2021/06/04 09:03:43 fetching corpus: 25400, signal 843247/965627 (executing program) 2021/06/04 09:03:43 fetching corpus: 25450, signal 843600/965627 (executing program) 2021/06/04 09:03:44 fetching corpus: 25500, signal 843953/965627 (executing program) 2021/06/04 09:03:44 fetching corpus: 25550, signal 844815/965627 (executing program) 2021/06/04 09:03:44 fetching corpus: 25600, signal 845128/965627 (executing program) 2021/06/04 09:03:45 fetching corpus: 25650, signal 845633/965627 (executing program) 2021/06/04 09:03:45 fetching corpus: 25700, signal 846087/965627 (executing program) 2021/06/04 09:03:46 fetching corpus: 25750, signal 846654/965627 (executing program) 2021/06/04 09:03:46 fetching corpus: 25800, signal 847034/965632 (executing program) 2021/06/04 09:03:46 fetching corpus: 25850, signal 847991/965639 (executing program) 2021/06/04 09:03:46 fetching corpus: 25900, signal 848427/965639 (executing program) 2021/06/04 09:03:46 fetching corpus: 25950, signal 848916/965639 (executing program) 2021/06/04 09:03:47 fetching corpus: 26000, signal 850738/965639 (executing program) 2021/06/04 09:03:47 fetching corpus: 26050, signal 851173/965639 (executing program) 2021/06/04 09:03:47 fetching corpus: 26100, signal 851645/965639 (executing program) 2021/06/04 09:03:47 fetching corpus: 26150, signal 852077/965639 (executing program) 2021/06/04 09:03:48 fetching corpus: 26200, signal 852463/965639 (executing program) 2021/06/04 09:03:48 fetching corpus: 26250, signal 852705/965639 (executing program) 2021/06/04 09:03:48 fetching corpus: 26300, signal 853125/965639 (executing program) 2021/06/04 09:03:48 fetching corpus: 26350, signal 853748/965639 (executing program) 2021/06/04 09:03:48 fetching corpus: 26400, signal 854265/965639 (executing program) 2021/06/04 09:03:49 fetching corpus: 26450, signal 854789/965639 (executing program) 2021/06/04 09:03:49 fetching corpus: 26500, signal 855234/965639 (executing program) 2021/06/04 09:03:49 fetching corpus: 26550, signal 855697/965639 (executing program) 2021/06/04 09:03:49 fetching corpus: 26600, signal 856248/965639 (executing program) 2021/06/04 09:03:50 fetching corpus: 26650, signal 856746/965639 (executing program) 2021/06/04 09:03:50 fetching corpus: 26700, signal 857404/965639 (executing program) 2021/06/04 09:03:50 fetching corpus: 26750, signal 857778/965639 (executing program) 2021/06/04 09:03:50 fetching corpus: 26800, signal 858296/965639 (executing program) 2021/06/04 09:03:51 fetching corpus: 26850, signal 858540/965639 (executing program) 2021/06/04 09:03:51 fetching corpus: 26900, signal 859087/965639 (executing program) 2021/06/04 09:03:51 fetching corpus: 26950, signal 859782/965639 (executing program) 2021/06/04 09:03:51 fetching corpus: 27000, signal 860094/965639 (executing program) 2021/06/04 09:03:52 fetching corpus: 27050, signal 860570/965639 (executing program) 2021/06/04 09:03:52 fetching corpus: 27100, signal 860938/965639 (executing program) 2021/06/04 09:03:52 fetching corpus: 27150, signal 861261/965639 (executing program) 2021/06/04 09:03:52 fetching corpus: 27200, signal 861741/965639 (executing program) 2021/06/04 09:03:52 fetching corpus: 27250, signal 862028/965639 (executing program) 2021/06/04 09:03:52 fetching corpus: 27300, signal 862460/965639 (executing program) 2021/06/04 09:03:53 fetching corpus: 27350, signal 862859/965639 (executing program) 2021/06/04 09:03:53 fetching corpus: 27400, signal 863961/965639 (executing program) 2021/06/04 09:03:53 fetching corpus: 27450, signal 864351/965639 (executing program) 2021/06/04 09:03:54 fetching corpus: 27500, signal 864680/965639 (executing program) 2021/06/04 09:03:54 fetching corpus: 27550, signal 864979/965639 (executing program) 2021/06/04 09:03:54 fetching corpus: 27600, signal 865290/965639 (executing program) 2021/06/04 09:03:54 fetching corpus: 27650, signal 865598/965639 (executing program) 2021/06/04 09:03:55 fetching corpus: 27700, signal 865905/965639 (executing program) 2021/06/04 09:03:55 fetching corpus: 27750, signal 866621/965639 (executing program) 2021/06/04 09:03:55 fetching corpus: 27800, signal 867218/965639 (executing program) 2021/06/04 09:03:55 fetching corpus: 27850, signal 867551/965639 (executing program) 2021/06/04 09:03:56 fetching corpus: 27900, signal 867904/965639 (executing program) 2021/06/04 09:03:56 fetching corpus: 27950, signal 868138/965639 (executing program) 2021/06/04 09:03:56 fetching corpus: 28000, signal 868449/965639 (executing program) 2021/06/04 09:03:57 fetching corpus: 28050, signal 868960/965639 (executing program) 2021/06/04 09:03:57 fetching corpus: 28100, signal 869728/965639 (executing program) 2021/06/04 09:03:57 fetching corpus: 28150, signal 870043/965639 (executing program) 2021/06/04 09:03:57 fetching corpus: 28200, signal 870529/965639 (executing program) 2021/06/04 09:03:58 fetching corpus: 28250, signal 870896/965639 (executing program) 2021/06/04 09:03:58 fetching corpus: 28300, signal 871331/965639 (executing program) 2021/06/04 09:03:58 fetching corpus: 28350, signal 871727/965639 (executing program) 2021/06/04 09:03:58 fetching corpus: 28400, signal 872123/965639 (executing program) 2021/06/04 09:03:58 fetching corpus: 28450, signal 872453/965639 (executing program) 2021/06/04 09:03:59 fetching corpus: 28500, signal 872661/965639 (executing program) 2021/06/04 09:03:59 fetching corpus: 28550, signal 873098/965639 (executing program) 2021/06/04 09:03:59 fetching corpus: 28600, signal 873451/965644 (executing program) 2021/06/04 09:03:59 fetching corpus: 28650, signal 873709/965644 (executing program) 2021/06/04 09:04:00 fetching corpus: 28700, signal 873963/965644 (executing program) 2021/06/04 09:04:00 fetching corpus: 28750, signal 874334/965644 (executing program) 2021/06/04 09:04:00 fetching corpus: 28800, signal 874752/965644 (executing program) 2021/06/04 09:04:00 fetching corpus: 28850, signal 875111/965644 (executing program) 2021/06/04 09:04:00 fetching corpus: 28900, signal 875672/965644 (executing program) 2021/06/04 09:04:01 fetching corpus: 28950, signal 876050/965644 (executing program) 2021/06/04 09:04:01 fetching corpus: 29000, signal 876822/965644 (executing program) 2021/06/04 09:04:01 fetching corpus: 29050, signal 877256/965644 (executing program) 2021/06/04 09:04:02 fetching corpus: 29100, signal 877592/965644 (executing program) 2021/06/04 09:04:02 fetching corpus: 29150, signal 877939/965644 (executing program) 2021/06/04 09:04:02 fetching corpus: 29200, signal 878221/965644 (executing program) 2021/06/04 09:04:02 fetching corpus: 29250, signal 878567/965644 (executing program) 2021/06/04 09:04:03 fetching corpus: 29300, signal 878819/965644 (executing program) 2021/06/04 09:04:03 fetching corpus: 29350, signal 879244/965644 (executing program) 2021/06/04 09:04:04 fetching corpus: 29400, signal 879690/965644 (executing program) 2021/06/04 09:04:04 fetching corpus: 29450, signal 879931/965644 (executing program) 2021/06/04 09:04:04 fetching corpus: 29500, signal 880370/965644 (executing program) 2021/06/04 09:04:04 fetching corpus: 29550, signal 880833/965644 (executing program) 2021/06/04 09:04:05 fetching corpus: 29600, signal 881375/965644 (executing program) 2021/06/04 09:04:05 fetching corpus: 29650, signal 881880/965644 (executing program) 2021/06/04 09:04:05 fetching corpus: 29700, signal 882150/965644 (executing program) 2021/06/04 09:04:05 fetching corpus: 29750, signal 882520/965644 (executing program) 2021/06/04 09:04:06 fetching corpus: 29800, signal 882812/965644 (executing program) 2021/06/04 09:04:06 fetching corpus: 29850, signal 883195/965644 (executing program) 2021/06/04 09:04:06 fetching corpus: 29900, signal 883923/965644 (executing program) 2021/06/04 09:04:06 fetching corpus: 29950, signal 884314/965644 (executing program) 2021/06/04 09:04:06 fetching corpus: 30000, signal 885011/965644 (executing program) 2021/06/04 09:04:07 fetching corpus: 30050, signal 885319/965644 (executing program) 2021/06/04 09:04:07 fetching corpus: 30100, signal 886056/965644 (executing program) 2021/06/04 09:04:07 fetching corpus: 30150, signal 886430/965644 (executing program) 2021/06/04 09:04:08 fetching corpus: 30200, signal 886762/965644 (executing program) 2021/06/04 09:04:08 fetching corpus: 30250, signal 887327/965644 (executing program) 2021/06/04 09:04:08 fetching corpus: 30300, signal 887732/965644 (executing program) 2021/06/04 09:04:08 fetching corpus: 30350, signal 888032/965644 (executing program) 2021/06/04 09:04:08 fetching corpus: 30400, signal 888373/965644 (executing program) 2021/06/04 09:04:09 fetching corpus: 30450, signal 888663/965644 (executing program) 2021/06/04 09:04:09 fetching corpus: 30500, signal 889069/965644 (executing program) 2021/06/04 09:04:09 fetching corpus: 30550, signal 893580/965644 (executing program) 2021/06/04 09:04:09 fetching corpus: 30600, signal 893938/965644 (executing program) 2021/06/04 09:04:10 fetching corpus: 30650, signal 894235/965644 (executing program) 2021/06/04 09:04:10 fetching corpus: 30700, signal 894698/965648 (executing program) 2021/06/04 09:04:10 fetching corpus: 30750, signal 895127/965648 (executing program) 2021/06/04 09:04:10 fetching corpus: 30800, signal 895444/965648 (executing program) 2021/06/04 09:04:10 fetching corpus: 30850, signal 895861/965648 (executing program) 2021/06/04 09:04:11 fetching corpus: 30900, signal 896271/965648 (executing program) 2021/06/04 09:04:11 fetching corpus: 30950, signal 896795/965648 (executing program) 2021/06/04 09:04:11 fetching corpus: 31000, signal 897179/965648 (executing program) 2021/06/04 09:04:11 fetching corpus: 31050, signal 897569/965648 (executing program) 2021/06/04 09:04:12 fetching corpus: 31100, signal 898001/965652 (executing program) 2021/06/04 09:04:12 fetching corpus: 31150, signal 898305/965652 (executing program) 2021/06/04 09:04:12 fetching corpus: 31200, signal 898539/965652 (executing program) 2021/06/04 09:04:12 fetching corpus: 31250, signal 898892/965652 (executing program) 2021/06/04 09:04:13 fetching corpus: 31300, signal 899330/965652 (executing program) 2021/06/04 09:04:13 fetching corpus: 31350, signal 899578/965652 (executing program) 2021/06/04 09:04:13 fetching corpus: 31400, signal 899788/965653 (executing program) 2021/06/04 09:04:14 fetching corpus: 31450, signal 900160/965653 (executing program) 2021/06/04 09:04:14 fetching corpus: 31500, signal 900527/965653 (executing program) 2021/06/04 09:04:14 fetching corpus: 31550, signal 900950/965653 (executing program) 2021/06/04 09:04:15 fetching corpus: 31600, signal 901418/965653 (executing program) 2021/06/04 09:04:15 fetching corpus: 31650, signal 901853/965653 (executing program) 2021/06/04 09:04:15 fetching corpus: 31700, signal 902341/965659 (executing program) 2021/06/04 09:04:16 fetching corpus: 31750, signal 902719/965659 (executing program) 2021/06/04 09:04:16 fetching corpus: 31800, signal 903011/965659 (executing program) 2021/06/04 09:04:16 fetching corpus: 31850, signal 903492/965660 (executing program) 2021/06/04 09:04:16 fetching corpus: 31900, signal 903825/965660 (executing program) 2021/06/04 09:04:17 fetching corpus: 31950, signal 904212/965660 (executing program) 2021/06/04 09:04:17 fetching corpus: 32000, signal 904479/965660 (executing program) 2021/06/04 09:04:17 fetching corpus: 32050, signal 904862/965660 (executing program) 2021/06/04 09:04:17 fetching corpus: 32100, signal 905233/965660 (executing program) 2021/06/04 09:04:17 fetching corpus: 32150, signal 905553/965660 (executing program) 2021/06/04 09:04:18 fetching corpus: 32200, signal 906276/965660 (executing program) 2021/06/04 09:04:18 fetching corpus: 32250, signal 906677/965660 (executing program) 2021/06/04 09:04:18 fetching corpus: 32300, signal 907874/965660 (executing program) 2021/06/04 09:04:18 fetching corpus: 32350, signal 908302/965660 (executing program) 2021/06/04 09:04:18 fetching corpus: 32400, signal 908769/965660 (executing program) 2021/06/04 09:04:19 fetching corpus: 32450, signal 909312/965660 (executing program) 2021/06/04 09:04:19 fetching corpus: 32500, signal 909774/965660 (executing program) 2021/06/04 09:04:19 fetching corpus: 32550, signal 910476/965660 (executing program) 2021/06/04 09:04:19 fetching corpus: 32600, signal 910850/965660 (executing program) 2021/06/04 09:04:19 fetching corpus: 32650, signal 911332/965660 (executing program) 2021/06/04 09:04:20 fetching corpus: 32700, signal 911630/965660 (executing program) 2021/06/04 09:04:20 fetching corpus: 32750, signal 912035/965660 (executing program) 2021/06/04 09:04:20 fetching corpus: 32800, signal 912332/965660 (executing program) 2021/06/04 09:04:20 fetching corpus: 32850, signal 912646/965660 (executing program) 2021/06/04 09:04:20 fetching corpus: 32900, signal 912990/965660 (executing program) 2021/06/04 09:04:21 fetching corpus: 32950, signal 913338/965660 (executing program) 2021/06/04 09:04:21 fetching corpus: 33000, signal 913592/965660 (executing program) 2021/06/04 09:04:22 fetching corpus: 33050, signal 913831/965660 (executing program) 2021/06/04 09:04:22 fetching corpus: 33100, signal 914866/965660 (executing program) 2021/06/04 09:04:23 fetching corpus: 33150, signal 915130/965660 (executing program) 2021/06/04 09:04:23 fetching corpus: 33200, signal 915438/965660 (executing program) 2021/06/04 09:04:23 fetching corpus: 33250, signal 915894/965660 (executing program) 2021/06/04 09:04:23 fetching corpus: 33300, signal 916391/965660 (executing program) 2021/06/04 09:04:24 fetching corpus: 33350, signal 916858/965660 (executing program) 2021/06/04 09:04:24 fetching corpus: 33400, signal 917249/965660 (executing program) 2021/06/04 09:04:24 fetching corpus: 33450, signal 917575/965660 (executing program) 2021/06/04 09:04:24 fetching corpus: 33500, signal 917826/965660 (executing program) 2021/06/04 09:04:24 fetching corpus: 33550, signal 918218/965660 (executing program) 2021/06/04 09:04:25 fetching corpus: 33600, signal 918481/965660 (executing program) 2021/06/04 09:04:25 fetching corpus: 33650, signal 918719/965660 (executing program) 2021/06/04 09:04:25 fetching corpus: 33700, signal 919384/965660 (executing program) 2021/06/04 09:04:25 fetching corpus: 33750, signal 919600/965660 (executing program) 2021/06/04 09:04:25 fetching corpus: 33800, signal 919957/965660 (executing program) 2021/06/04 09:04:26 fetching corpus: 33850, signal 920209/965660 (executing program) 2021/06/04 09:04:26 fetching corpus: 33900, signal 920669/965660 (executing program) 2021/06/04 09:04:26 fetching corpus: 33950, signal 921001/965660 (executing program) 2021/06/04 09:04:26 fetching corpus: 34000, signal 921621/965660 (executing program) 2021/06/04 09:04:27 fetching corpus: 34050, signal 922033/965660 (executing program) [ 287.249756][ T3380] ieee802154 phy0 wpan0: encryption failed: -22 [ 287.264145][ T3380] ieee802154 phy1 wpan1: encryption failed: -22 2021/06/04 09:04:27 fetching corpus: 34100, signal 922515/965660 (executing program) 2021/06/04 09:04:27 fetching corpus: 34150, signal 923133/965660 (executing program) 2021/06/04 09:04:28 fetching corpus: 34200, signal 923535/965660 (executing program) 2021/06/04 09:04:28 fetching corpus: 34250, signal 923974/965660 (executing program) 2021/06/04 09:04:28 fetching corpus: 34300, signal 924273/965660 (executing program) 2021/06/04 09:04:28 fetching corpus: 34350, signal 924492/965660 (executing program) 2021/06/04 09:04:29 fetching corpus: 34400, signal 925042/965660 (executing program) 2021/06/04 09:04:29 fetching corpus: 34450, signal 925269/965660 (executing program) 2021/06/04 09:04:29 fetching corpus: 34500, signal 925802/965660 (executing program) 2021/06/04 09:04:30 fetching corpus: 34550, signal 926187/965660 (executing program) 2021/06/04 09:04:30 fetching corpus: 34600, signal 926532/965660 (executing program) 2021/06/04 09:04:30 fetching corpus: 34650, signal 927028/965660 (executing program) 2021/06/04 09:04:31 fetching corpus: 34700, signal 927342/965660 (executing program) 2021/06/04 09:04:31 fetching corpus: 34750, signal 927585/965660 (executing program) 2021/06/04 09:04:31 fetching corpus: 34800, signal 927776/965660 (executing program) 2021/06/04 09:04:31 fetching corpus: 34850, signal 928144/965660 (executing program) 2021/06/04 09:04:31 fetching corpus: 34900, signal 928364/965660 (executing program) 2021/06/04 09:04:32 fetching corpus: 34950, signal 928845/965660 (executing program) 2021/06/04 09:04:32 fetching corpus: 35000, signal 929215/965660 (executing program) 2021/06/04 09:04:32 fetching corpus: 35050, signal 929548/965660 (executing program) 2021/06/04 09:04:32 fetching corpus: 35100, signal 929850/965660 (executing program) 2021/06/04 09:04:32 fetching corpus: 35150, signal 930176/965660 (executing program) 2021/06/04 09:04:33 fetching corpus: 35200, signal 930817/965660 (executing program) 2021/06/04 09:04:33 fetching corpus: 35250, signal 931276/965660 (executing program) 2021/06/04 09:04:33 fetching corpus: 35300, signal 931846/965660 (executing program) 2021/06/04 09:04:33 fetching corpus: 35350, signal 932138/965660 (executing program) 2021/06/04 09:04:33 fetching corpus: 35400, signal 932353/965660 (executing program) 2021/06/04 09:04:34 fetching corpus: 35450, signal 932784/965660 (executing program) 2021/06/04 09:04:34 fetching corpus: 35500, signal 933448/965660 (executing program) 2021/06/04 09:04:34 fetching corpus: 35550, signal 933779/965660 (executing program) 2021/06/04 09:04:34 fetching corpus: 35600, signal 934312/965660 (executing program) 2021/06/04 09:04:35 fetching corpus: 35650, signal 934651/965660 (executing program) 2021/06/04 09:04:35 fetching corpus: 35700, signal 934932/965660 (executing program) 2021/06/04 09:04:35 fetching corpus: 35750, signal 935154/965660 (executing program) 2021/06/04 09:04:35 fetching corpus: 35800, signal 935459/965660 (executing program) 2021/06/04 09:04:35 fetching corpus: 35850, signal 935679/965660 (executing program) 2021/06/04 09:04:36 fetching corpus: 35900, signal 936004/965660 (executing program) 2021/06/04 09:04:36 fetching corpus: 35950, signal 936252/965660 (executing program) 2021/06/04 09:04:36 fetching corpus: 36000, signal 936508/965660 (executing program) 2021/06/04 09:04:36 fetching corpus: 36050, signal 936833/965660 (executing program) 2021/06/04 09:04:37 fetching corpus: 36100, signal 937229/965660 (executing program) 2021/06/04 09:04:37 fetching corpus: 36150, signal 937997/965660 (executing program) 2021/06/04 09:04:37 fetching corpus: 36200, signal 938293/965660 (executing program) 2021/06/04 09:04:37 fetching corpus: 36250, signal 938529/965660 (executing program) 2021/06/04 09:04:37 fetching corpus: 36300, signal 938810/965660 (executing program) 2021/06/04 09:04:38 fetching corpus: 36350, signal 939294/965660 (executing program) 2021/06/04 09:04:38 fetching corpus: 36400, signal 939555/965660 (executing program) 2021/06/04 09:04:38 fetching corpus: 36450, signal 939893/965660 (executing program) 2021/06/04 09:04:38 fetching corpus: 36500, signal 940194/965660 (executing program) 2021/06/04 09:04:39 fetching corpus: 36550, signal 940662/965660 (executing program) 2021/06/04 09:04:39 fetching corpus: 36600, signal 941102/965660 (executing program) 2021/06/04 09:04:40 fetching corpus: 36650, signal 941344/965660 (executing program) 2021/06/04 09:04:40 fetching corpus: 36700, signal 941676/965660 (executing program) 2021/06/04 09:04:40 fetching corpus: 36750, signal 943514/965660 (executing program) 2021/06/04 09:04:40 fetching corpus: 36782, signal 943686/965660 (executing program) 2021/06/04 09:04:40 fetching corpus: 36782, signal 943686/965660 (executing program) 2021/06/04 09:04:43 starting 4 fuzzer processes 09:04:44 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0xc0481273, 0xffffffffffffffff) [ 304.088483][ T49] audit: type=1400 audit(1622797484.260:8): avc: denied { execmem } for pid=8695 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 09:04:44 executing program 1: r0 = socket(0x2, 0x5, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote}, @l2={0x1f, 0x0, @fixed}, @ax25={0x3, @null}, 0x77}) 09:04:44 executing program 2: bpf$MAP_CREATE(0x9, &(0x7f0000003600), 0x40) 09:04:45 executing program 3: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) utimensat(r0, 0x0, &(0x7f0000000200), 0x0) [ 305.706272][ T8696] chnl_net:caif_netlink_parms(): no params data found [ 305.859690][ T8696] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.871560][ T8696] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.883089][ T8696] device bridge_slave_0 entered promiscuous mode [ 305.903093][ T8696] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.912799][ T8696] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.922939][ T8696] device bridge_slave_1 entered promiscuous mode [ 305.957954][ T8696] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 305.973220][ T8696] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 306.014746][ T8696] team0: Port device team_slave_0 added [ 306.029910][ T8696] team0: Port device team_slave_1 added [ 306.064873][ T8696] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 306.073366][ T8696] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 306.105191][ T8696] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 306.145575][ T8696] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 306.152988][ T8696] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 306.188178][ T8696] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 306.244130][ T8698] chnl_net:caif_netlink_parms(): no params data found [ 306.305087][ T8696] device hsr_slave_0 entered promiscuous mode [ 306.318735][ T8696] device hsr_slave_1 entered promiscuous mode [ 306.432800][ T8698] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.441046][ T8698] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.453472][ T8698] device bridge_slave_0 entered promiscuous mode [ 306.463356][ T8698] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.472184][ T8698] bridge0: port 2(bridge_slave_1) entered disabled state [ 306.482253][ T8698] device bridge_slave_1 entered promiscuous mode [ 306.535128][ T8698] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 306.551193][ T8698] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 306.603626][ T8698] team0: Port device team_slave_0 added [ 306.613663][ T8698] team0: Port device team_slave_1 added [ 306.853524][ T8698] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 306.862414][ T8698] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 306.896029][ T8698] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 306.917786][ T8700] chnl_net:caif_netlink_parms(): no params data found [ 306.932679][ T8698] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 306.941010][ T8698] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 306.967941][ T8698] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 307.072722][ T8698] device hsr_slave_0 entered promiscuous mode [ 307.080019][ T8698] device hsr_slave_1 entered promiscuous mode [ 307.091283][ T8698] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 307.101038][ T8698] Cannot create hsr debugfs directory [ 307.183944][ T8700] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.191561][ T8700] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.201384][ T8700] device bridge_slave_0 entered promiscuous mode [ 307.240519][ T8700] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.251122][ T8700] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.270372][ T8700] device bridge_slave_1 entered promiscuous mode [ 307.321318][ T8696] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 307.337911][ T8696] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 307.355461][ T8696] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 307.372464][ T8700] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 307.390895][ T8700] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 307.412202][ T8696] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 307.453831][ T8700] team0: Port device team_slave_0 added [ 307.498047][ T26] Bluetooth: hci0: command 0x0409 tx timeout [ 307.530743][ T8700] team0: Port device team_slave_1 added [ 307.584489][ T8700] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 307.592983][ T8700] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 307.620472][ T8700] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 307.635237][ T8715] chnl_net:caif_netlink_parms(): no params data found [ 307.671562][ T8700] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 307.681106][ T8700] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 307.716579][ T8700] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 307.787763][ T8700] device hsr_slave_0 entered promiscuous mode [ 307.798756][ T8700] device hsr_slave_1 entered promiscuous mode [ 307.810322][ T8700] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 307.816848][ T3013] Bluetooth: hci1: command 0x0409 tx timeout [ 307.823176][ T8700] Cannot create hsr debugfs directory [ 307.969285][ T8715] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.983402][ T8715] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.993966][ T8715] device bridge_slave_0 entered promiscuous mode [ 308.030306][ T8698] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 308.043663][ T8715] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.054841][ T8715] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.065373][ T8715] device bridge_slave_1 entered promiscuous mode [ 308.102910][ T8698] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 308.126986][ T8698] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 308.149122][ T8715] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 308.168700][ T8698] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 308.206914][ T5] Bluetooth: hci2: command 0x0409 tx timeout [ 308.208426][ T8715] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 308.278231][ T8715] team0: Port device team_slave_0 added [ 308.288843][ T8715] team0: Port device team_slave_1 added [ 308.352007][ T8696] 8021q: adding VLAN 0 to HW filter on device bond0 [ 308.379360][ T8715] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 308.388731][ T8715] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 308.423165][ T8715] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 308.451013][ T8715] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 308.460443][ T8715] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 308.493964][ T8715] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 308.522428][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 308.536343][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 308.618636][ T8696] 8021q: adding VLAN 0 to HW filter on device team0 [ 308.633767][ T8715] device hsr_slave_0 entered promiscuous mode [ 308.643162][ T8715] device hsr_slave_1 entered promiscuous mode [ 308.655623][ T8715] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 308.666062][ T8715] Cannot create hsr debugfs directory [ 308.687552][ T3013] Bluetooth: hci3: command 0x0409 tx timeout [ 308.713112][ T8700] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 308.747467][ T72] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 308.759222][ T72] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 308.778518][ T72] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.787504][ T72] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.797446][ T72] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 308.807884][ T72] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 308.817364][ T72] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.825253][ T72] bridge0: port 2(bridge_slave_1) entered forwarding state [ 308.838218][ T8700] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 308.867273][ T8700] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 308.881185][ T8700] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 308.904416][ T9426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 308.914780][ T9426] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 308.927303][ T9426] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 308.952510][ T8698] 8021q: adding VLAN 0 to HW filter on device bond0 [ 309.000689][ T9456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 309.012535][ T9456] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 309.028258][ T9456] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 309.064472][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 309.077565][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 309.100088][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 309.111476][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 309.122740][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 309.134765][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 309.167228][ T8698] 8021q: adding VLAN 0 to HW filter on device team0 [ 309.191193][ T8696] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 309.207382][ T8696] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 309.225309][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 309.234998][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 309.286457][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 309.297322][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 309.308715][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.318272][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.329136][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 309.388356][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 309.402893][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 309.414730][ T5045] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.422684][ T5045] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.435558][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 309.444915][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 309.454806][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 309.466734][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 309.501522][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 309.513987][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 309.526699][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 309.544154][ T8696] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 309.571517][ T9536] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 309.578596][ T70] Bluetooth: hci0: command 0x041b tx timeout [ 309.588895][ T9536] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 309.619880][ T3919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 309.630582][ T3919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 309.641461][ T3919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 309.652200][ T3919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 309.663813][ T8715] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 309.680431][ T8715] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 309.720867][ T8698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 309.735514][ T8715] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 309.753094][ T8715] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 309.783937][ T8700] 8021q: adding VLAN 0 to HW filter on device bond0 [ 309.807058][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 309.818262][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 309.857809][ T9536] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 309.869123][ T9536] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 309.891468][ T8700] 8021q: adding VLAN 0 to HW filter on device team0 [ 309.897083][ T70] Bluetooth: hci1: command 0x041b tx timeout [ 309.911317][ T8696] device veth0_vlan entered promiscuous mode [ 309.925939][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 309.937563][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 309.949683][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 309.961035][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 309.983482][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 309.993143][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 310.004394][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 310.016519][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 310.050896][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.059521][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.082318][ T8696] device veth1_vlan entered promiscuous mode [ 310.096178][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 310.104966][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 310.115084][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 310.125167][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.133395][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.172890][ T8698] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 310.182219][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 310.194577][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 310.222641][ T9536] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 310.233373][ T9536] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 310.244974][ T9536] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 310.271079][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 310.291755][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 310.296431][ T70] Bluetooth: hci2: command 0x041b tx timeout [ 310.322454][ T3919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 310.333172][ T3919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 310.351074][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 310.362858][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 310.374889][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 310.397126][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 310.436950][ T8696] device veth0_macvtap entered promiscuous mode [ 310.457909][ T9536] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 310.479361][ T9536] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 310.492564][ T9536] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 310.509094][ T8700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 310.538325][ T8696] device veth1_macvtap entered promiscuous mode [ 310.581314][ T8715] 8021q: adding VLAN 0 to HW filter on device bond0 [ 310.621692][ T8698] device veth0_vlan entered promiscuous mode [ 310.635606][ T70] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 310.647068][ T70] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 310.656996][ T70] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 310.670554][ T70] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 310.680773][ T70] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 310.701205][ T8696] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 310.721160][ T8698] device veth1_vlan entered promiscuous mode [ 310.735618][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 310.745778][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 310.755068][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 310.765084][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 310.777124][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 310.788736][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 310.797171][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 310.808479][ T70] Bluetooth: hci3: command 0x041b tx timeout [ 310.813640][ T8696] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 310.851270][ T8700] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 310.862244][ T9570] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 310.872216][ T9570] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 310.883666][ T9570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 310.912068][ T8696] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 310.926731][ T8696] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 310.938045][ T8696] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 310.947992][ T8696] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 310.964636][ T8715] 8021q: adding VLAN 0 to HW filter on device team0 [ 311.002127][ T70] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 311.015835][ T70] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 311.031199][ T8698] device veth0_macvtap entered promiscuous mode [ 311.078231][ T9536] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 311.089826][ T9536] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 311.104478][ T9536] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 311.120750][ T9536] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.128669][ T9536] bridge0: port 1(bridge_slave_0) entered forwarding state [ 311.136941][ T9536] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 311.146568][ T9536] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 311.155978][ T9536] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.164077][ T9536] bridge0: port 2(bridge_slave_1) entered forwarding state [ 311.186819][ T8698] device veth1_macvtap entered promiscuous mode [ 311.211184][ T9570] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 311.219496][ T9570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 311.229740][ T9570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 311.241695][ T9570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 311.254259][ T9570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 311.265121][ T9570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 311.337381][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 311.349490][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 311.363139][ T3919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 311.376508][ T3919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 311.397088][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 311.410526][ T5045] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 311.423702][ T8698] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 311.439272][ T8698] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 311.455551][ T8698] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 311.466629][ T8700] device veth0_vlan entered promiscuous mode [ 311.519201][ T70] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 311.530070][ T70] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 311.545283][ T70] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 311.555954][ T70] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 311.567788][ T70] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 311.581414][ T8698] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 311.595731][ T8698] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 311.611438][ T8698] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 311.638456][ T8700] device veth1_vlan entered promiscuous mode [ 311.646637][ T5045] Bluetooth: hci0: command 0x040f tx timeout [ 311.680884][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 311.689727][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 311.699333][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 311.709619][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 311.719306][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 311.734836][ T8698] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 311.746615][ T8698] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 311.756777][ T8698] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 311.766900][ T8698] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 311.800631][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 311.812336][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 311.825205][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 311.847786][ T8715] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 311.863765][ T9372] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 311.877070][ T9372] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 311.892576][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 311.962634][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 311.974751][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 311.976774][ T5045] Bluetooth: hci1: command 0x040f tx timeout [ 312.007093][ T9372] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 312.011525][ T8700] device veth0_macvtap entered promiscuous mode [ 312.015937][ T9372] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 312.035557][ T8700] device veth1_macvtap entered promiscuous mode [ 312.053923][ T70] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 312.062685][ T70] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 312.072094][ T70] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 312.088187][ T8715] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 312.088260][ T10] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 312.109934][ T10] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 312.124716][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 312.183452][ T8700] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 312.199018][ T8700] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 312.212343][ T8700] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 312.227610][ T8700] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 312.242252][ T8700] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 312.261406][ T10] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 312.261561][ T9570] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 312.284998][ T10] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 312.292115][ T9570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 312.324042][ T8700] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 09:04:52 executing program 0: add_key$user(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) [ 312.344489][ T8700] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 312.360938][ T8700] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 09:04:52 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) statx(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) [ 312.377639][ T5045] Bluetooth: hci2: command 0x040f tx timeout [ 312.390175][ T8700] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 312.406000][ T8700] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 312.415615][ T9570] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 312.425184][ T9570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 312.442148][ T9570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 312.453055][ T9570] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 312.466419][ T9570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 09:04:52 executing program 0: syz_genetlink_get_family_id$nbd(&(0x7f00000001c0), 0xffffffffffffffff) [ 312.494655][ T8700] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 312.523441][ T8700] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 312.541111][ T8700] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 312.569436][ T8700] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 09:04:52 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000040)={'wg0\x00'}) [ 312.624742][ T9575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 09:04:52 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 312.641580][ T9575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 312.666713][ T9575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 312.678728][ T9575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 09:04:52 executing program 0: pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000200)={0x80000001}, 0x0, &(0x7f0000000380)={&(0x7f0000000340), 0x8}) [ 312.700234][ T8715] device veth0_vlan entered promiscuous mode [ 312.760299][ T8715] device veth1_vlan entered promiscuous mode [ 312.834306][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 312.846391][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 312.848781][ T70] Bluetooth: hci3: command 0x040f tx timeout [ 312.855710][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 312.875444][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 312.891665][ T8862] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 312.897435][ T8715] device veth0_macvtap entered promiscuous mode [ 312.911714][ T8862] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 312.951365][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 312.967577][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 312.990162][ T8715] device veth1_macvtap entered promiscuous mode [ 313.014209][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 313.015223][ T10] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 313.038077][ T10] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 313.059495][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 313.085467][ T8715] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 313.100205][ T8715] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 313.112748][ T8715] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 313.127508][ T8715] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 313.141199][ T8715] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 09:04:53 executing program 2: r0 = gettid() prlimit64(r0, 0xb, &(0x7f0000000040), &(0x7f0000000080)) [ 313.154293][ T8715] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 313.167622][ T8715] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 313.183379][ T72] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 313.195128][ T72] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 313.211832][ T8715] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 313.239143][ T8715] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 313.253000][ T8715] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 313.268198][ T8715] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 313.282092][ T8715] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 313.297908][ T8715] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 313.314069][ T8715] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 313.324407][ T72] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 313.338472][ T72] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 313.358852][ T8715] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 313.372853][ T8715] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 313.385157][ T8715] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 313.395861][ T8715] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 313.512057][ T10] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 313.524405][ T10] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 313.535991][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 313.557801][ T9372] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 313.574129][ T9372] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 313.585963][ T9426] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 313.730536][ T70] Bluetooth: hci0: command 0x0419 tx timeout 09:04:53 executing program 0: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f00000002c0), 0x4) 09:04:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000034c0)={0x0, 0x0, &(0x7f0000003480)={0x0, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 09:04:54 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) recvfrom$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:04:54 executing program 1: getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x6}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={r0, 0x7fff}, &(0x7f00000000c0)=0x8) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000180), 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000100)={'ip6_vti0\x00'}) getegid() openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 09:04:54 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000640)={'wlan1\x00'}) 09:04:54 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) [ 313.930690][ T9697] ip6_vti0: mtu less than device minimum [ 313.951744][ T9699] ip6_vti0: mtu less than device minimum 09:04:54 executing program 1: syz_io_uring_setup(0x7c9f, &(0x7f0000000100)={0x0, 0xbc71}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 09:04:54 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x70, &(0x7f0000000340), &(0x7f0000000380)=0x8) 09:04:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x3}]}}, &(0x7f0000000040)=""/175, 0x26, 0xaf, 0x1}, 0x20) [ 314.051896][ T5045] Bluetooth: hci1: command 0x0419 tx timeout 09:04:54 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000), 0x4) 09:04:54 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x23, 0x0, &(0x7f0000000300)) [ 314.168051][ T9714] sctp: [Deprecated]: syz-executor.2 (pid 9714) Use of int in max_burst socket option deprecated. [ 314.168051][ T9714] Use struct sctp_assoc_value instead [ 314.457273][ T70] Bluetooth: hci2: command 0x0419 tx timeout 09:04:54 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000640)={'wlan1\x00'}) 09:04:54 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @empty}]}, &(0x7f0000000080)=0x10) 09:04:54 executing program 3: mq_open(&(0x7f0000000380)='\xec\x1b', 0x0, 0x0, &(0x7f00000003c0)) 09:04:54 executing program 1: syz_io_uring_setup(0x7c9f, &(0x7f0000000100)={0x0, 0xbc71}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 09:04:55 executing program 2: syz_mount_image$exfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@umask}, {@dmask}]}) 09:04:55 executing program 3: getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x7fff}, &(0x7f00000000c0)=0x8) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000180)={r0}, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000380), &(0x7f00000003c0)=0x4) r2 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000100)={'ip6_vti0\x00'}) [ 314.885887][ T9733] ip6_vti0: mtu less than device minimum 09:04:55 executing program 0: r0 = socket$phonet(0x23, 0x2, 0x1) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) [ 314.917564][ T9735] exFAT-fs (loop2): invalid boot record signature [ 314.926880][ T70] Bluetooth: hci3: command 0x0419 tx timeout 09:04:55 executing program 1: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@iocharset={'iocharset', 0x3d, 'cp1255'}}]}) [ 314.928928][ T9735] exFAT-fs (loop2): failed to read boot sector 09:04:55 executing program 3: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100), 0x0) accept4$packet(r0, 0x0, 0x0, 0x0) [ 314.948258][ T9735] exFAT-fs (loop2): failed to recognize exfat type [ 315.030971][ T9744] exFAT-fs (loop1): invalid boot record signature [ 315.045189][ T9735] exFAT-fs (loop2): invalid boot record signature [ 315.054910][ T9744] exFAT-fs (loop1): failed to read boot sector [ 315.064863][ T9735] exFAT-fs (loop2): failed to read boot sector [ 315.074886][ T9735] exFAT-fs (loop2): failed to recognize exfat type [ 315.107055][ T9744] exFAT-fs (loop1): failed to recognize exfat type 09:04:55 executing program 2: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x37641f06f2b1cd1f}, 0x20) 09:04:55 executing program 2: mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}) 09:04:55 executing program 0: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000500)={0x0, 0x9, 0x7fffffff, 0x1}) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) open(&(0x7f00000000c0)='./file0\x00', 0x5b3220, 0x2) pwritev2(r0, &(0x7f0000000180)=[{&(0x7f00000002c0)='Y', 0x1}], 0x1, 0x0, 0x0, 0x12) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200), 0xf642e7e) r2 = open(&(0x7f0000000900)='./file0\x00', 0x563043, 0x111) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0}, 0x24018844) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x20200, 0x0) bind$bt_l2cap(r4, &(0x7f0000000340)={0x1f, 0x2, @none, 0x7fff, 0x1}, 0xe) fallocate(r3, 0x0, 0x0, 0x4003fe) r5 = fsmount(0xffffffffffffffff, 0x1, 0x4) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000240)={0x0, r5, 0x0, 0xfc0, 0x100000000, 0xffffffff}) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x80000000000000, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x9810}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x200000) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000480)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="08002bbde5c0fdb38867753984c81cd5065bd8cfffcb4dcbdfecd128c04ba1d6c5ae6d48493c728f146f54db7c4b0000000000"], 0x1c}, 0x1, 0x0, 0x0, 0xe3d2a5cbc5e753e9}, 0x80) lseek(r0, 0x0, 0x3) 09:04:55 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) read$proc_mixer(r0, 0x0, 0x0) 09:04:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000200)) 09:04:55 executing program 3: socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) 09:04:55 executing program 1: bind$rxrpc(0xffffffffffffffff, 0x0, 0x0) 09:04:55 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) 09:04:55 executing program 1: setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000040), 0xffffffffffffff6d) 09:04:55 executing program 2: syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r0 = gettid() sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000380)={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x10, 0x200, r0, 0x4, 0x2, 'syz0\x00', &(0x7f0000000340)=['-\x00', ')\x00', 'nl80211\x00', '\x00'], 0xd, '\x00', [0x8a]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x3938700}, 0x1, 0x1}, 0x3) mmap$IORING_OFF_CQ_RING(&(0x7f0000fef000/0x10000)=nil, 0x10000, 0x0, 0x1010, 0xffffffffffffffff, 0x8000000) r1 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000002c0), 0x800) syz_io_uring_setup(0x2bf0, &(0x7f0000000200)={0x0, 0x3644, 0x10, 0x0, 0x112}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000340)={0x0, @ax25={0x3, @default, 0x2}, @generic={0x29, "e1289f417b635266d356110c7a76"}, @xdp={0x2c, 0x8, 0x0, 0xa}, 0x3, 0x0, 0x0, 0x0, 0x7f, &(0x7f0000000300)='wg1\x00', 0x0, 0x20, 0x1b}) connect$can_j1939(0xffffffffffffffff, &(0x7f00000003c0)={0x1d, r2, 0x3, {0x1}, 0xfd}, 0x18) 09:04:55 executing program 0: syz_mount_image$exfat(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080)="1e", 0x1}, {&(0x7f0000000100)="18", 0x1, 0x7fffffff}, {&(0x7f0000000200)='^', 0x1}], 0x0, 0x0) 09:04:55 executing program 2: syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r0 = gettid() sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000380)={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x10, 0x200, r0, 0x4, 0x2, 'syz0\x00', &(0x7f0000000340)=['-\x00', ')\x00', 'nl80211\x00', '\x00'], 0xd, '\x00', [0x8a]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x3938700}, 0x1, 0x1}, 0x3) mmap$IORING_OFF_CQ_RING(&(0x7f0000fef000/0x10000)=nil, 0x10000, 0x0, 0x1010, 0xffffffffffffffff, 0x8000000) r1 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000002c0), 0x800) syz_io_uring_setup(0x2bf0, &(0x7f0000000200)={0x0, 0x3644, 0x10, 0x0, 0x112}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000340)={0x0, @ax25={0x3, @default, 0x2}, @generic={0x29, "e1289f417b635266d356110c7a76"}, @xdp={0x2c, 0x8, 0x0, 0xa}, 0x3, 0x0, 0x0, 0x0, 0x7f, &(0x7f0000000300)='wg1\x00', 0x0, 0x20, 0x1b}) connect$can_j1939(0xffffffffffffffff, &(0x7f00000003c0)={0x1d, r2, 0x3, {0x1}, 0xfd}, 0x18) 09:04:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000002c0)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000340)=0x10) 09:04:55 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x0, @broadcast}}}, 0x84) [ 315.738048][ T9795] loop0: detected capacity change from 0 to 264192 09:04:55 executing program 1: socket(0x0, 0x0, 0x0) syz_io_uring_setup(0xb8, &(0x7f0000000140), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000000c0), &(0x7f00000001c0)) 09:04:55 executing program 2: pselect6(0x36e, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0) 09:04:55 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0xffffffffffffff5b) 09:04:56 executing program 2: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x0) mq_timedreceive(r0, 0x0, 0x0, 0x0, 0x0) 09:04:56 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000200)={'nat\x00'}, &(0x7f0000000280)=0x78) [ 315.861110][ T9795] loop0: detected capacity change from 0 to 264192 09:04:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}}, 0x0) 09:04:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000002c0)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000340)=0x10) 09:04:56 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000340)=ANY=[@ANYRES32], &(0x7f0000000180)=0xfe) 09:04:56 executing program 0: syz_open_dev$dri(&(0x7f00000000c0), 0x70400e42, 0xa8c41) 09:04:56 executing program 2: socketpair(0x2, 0xa, 0x83, &(0x7f0000000340)) 09:04:56 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f00000002c0)=0x1ffc0000, 0x4) [ 316.618173][ T9834] syz-executor.2 uses obsolete (PF_INET,SOCK_PACKET) 09:04:56 executing program 2: pselect6(0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000300), &(0x7f0000000380)={&(0x7f0000000340), 0x8}) 09:04:56 executing program 0: syz_io_uring_setup(0xd9, &(0x7f0000000000), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 09:04:56 executing program 2: syz_io_uring_setup(0x4992, &(0x7f0000000180)={0x0, 0x0, 0x3}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) 09:04:57 executing program 2: unshare(0x400) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, 0x0) 09:04:57 executing program 3: clock_gettime(0x5, &(0x7f00000007c0)) 09:04:57 executing program 1: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) 09:04:57 executing program 0: syz_io_uring_setup(0x14cd, &(0x7f0000000100)={0x0, 0xcd0e, 0x8}, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000000180), 0x0) syz_io_uring_setup(0x25, &(0x7f0000000280), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000340), &(0x7f0000000380)) 09:04:57 executing program 3: socket$inet(0x2, 0xa, 0x2) 09:04:57 executing program 2: mq_open(&(0x7f0000000480)='.^)+]\x00', 0x0, 0x0, 0x0) 09:04:57 executing program 1: syz_mount_image$exfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000001680)=[{&(0x7f00000004c0)="5f0dc064053de4f507238e98155460cfe98d7c67ea9a72e4ea69b519966efea3ee1fa7df67230250b9e4129420a5ce78d58d75bedd82bb88e628915bdd50fa4ed5c5394ad7c38beb8a6a31ed62e5d55aec1c1bb4ae7f60b57a3028d7967c8d015a1041327e7c8298ef0041988909836e997ea2f009442e150d62a1f8f104d1f1a65f15f29d3c3cfd7005bdf7978c46390b66ceef66b068b430f508692c2284a32e54096ad2d22a2bb00cf895632c17806abdadc1d33971238d91ef390064e377715ee2d6ca605e6d8a96e2511e1ce21cd4e248515c8785acb7db1b1cd9a6e04000b469e1e01ec7e5414740dfd182fb27a6c5965b525f7d5d6d7b6c40d4863674deae010ed7afae9afee877d46c7023c015de94f86f8515c336b85a9c879ce24b12e34c9419c9ff0a490019a2fdd968a101785b5c2af40c8383116008c6583d7dd79bce50c6217f85bf068e3c17d48df3b3fa8cc340e378d20130ecb85a9be9698795ef4917936cbc6a5ff04efb6be5735608be6df729ef89fb7a65eaa9b46d4098ef9952816a57d54b8b13e786b9d09ac7c97c622804adb2bd60dc67ab0a60ceefeacf6ff4a16c0ecf76cd3cadae9860c77ccba7e14e643440e6b2b1b973c08de2089c0a4054517e5ce68c1364a6ca0d805c55f018de82350365df3004261663115266b318896b32dddc0e505fd5da936e53d51069a6c79bf1d29f1651541d38a50611cbd182b808783dbcc352ad84816797cc94cda57f97f471443cc0b526a4ad29bf9047dd94640b388a8743670658080f6a4c21e48870b02205bc3b758b612dc476eb9205946f63d674980ff5464582f207e435c16b8b393bb023809cbcec00745e910125d880f590c8010dbb6ad2f603fcdae3897856261f7886bcfa0ed393fee72590f979a96e0e0e8690772d42cd0ead76d43df23efddde7f0388008a56001145426b3f0381dee4d3e4d80654ceb0b9e7eee5557e73ff74d63b93baff37009ae4a2364e75335827f3cbb3ce25a0b85f8a64e6f6a5ee0fdde7d173697706d954ff22d54dcf23ac05c76bc4a6021cadf41cc63803d9c27e6453b72e47808e777bea8e294d178a7e968024268d587f552c8e50543a6469a6877bd273625f6df4a6e96f52c12092dd6c36358a3d1fb87f57b1b18cc894c3f2754632e23a8070d71f04a6ae9cac9b8f001d73e379d3127c31fc94b0f6302ead016491e466924f48401df94e35c6a73b10f1d94a45cd2cb956cce1616e90e38502c4f9df0067db6439716a4e394c1563fc2765f249c104cee5b111a9d7cfdbacf16d4decdf504de9c5f739854c2b2448b19ffc5c574bb9fecc554379f85f16809a7a8da37eaede2db54b5115a12c1462f4549cf9eae06fb2e76a57313eee2cd9a6c28f1287c7a49a4d87910a644b5eaf3e56537e7d15f3aeaf877f7db069953162808811c19500c9a4e356dd08f0c12f523f3e90a444084b31ea0f646c8125f599b227602f6b890925c083956c1022c267bdc63f244a552353a86757761166f0c07c78a6e06e24deda893a584fe67284e77b43908b7165be3815af03285bb9c5706532b5b6f4238388ef04b0318db3fa79369f7a3c7d1bcc119ce85147b51dbb8edcfd2bb4909fc8a25b4abaa7bf547c2d770b7a4480e8c208fb9fb2c5344e45bfbfeeceb86c9d4c3daed17ae0ce0d42f6726ca251378f7e581943504dffceef5af9a9b82b2742ffe7dc67a101f7b81310ab5634509e1f0dfb6383f89b038e0bfb60244dd724205e254069eedbc5df0dc21fd9f1e6b4a89f61badb603e44193d2e41de53f8c31614e3e1e2ae7132488a0557589e769045baa183d8bc4b7cf045f58dc2e99fdb54933fd4205dd99fd94de95575e585d023d8839ab77a3b5a1ff0ba49313fb62b23ba12868db516a9cd7cc83c312eb90d1c28eb90c13e320264d6e89e998b1119e8e198b64eec2ab2ca4055a49bc01e36594001e9334f149b244b665bba01d9aa71b2a570efb971da8289f1c4573a4b6d0ff77a63d8035f7bb1c9c2605945fab567f7d6bfaa3c5f60c35e5323a35891dad8cf48c25fd7ab0f7b1ea79866c344a07fcf8c51578916e53adfd12433ff8557d0a9ccc94dd631f58ccae80a8a56ac2c02488f65a1cd34b0678a2351527e0eebe3060f46ea41beb762c07b0ffca952349e7e869b40179b629cdadd1a9e359fb2c1e26a375beb0d97c2d2f492fad73d44be0b0602a989d86fdfe49a9277add9ff8e3bfd87055f3c067980106877fdbd3a6a716014a52bc59a095e570db7ae45b9c9c33191f43e2eabdb3ffd405df2c3b9c6c11c427dda3f0321b716173f4ddf19651adba81abb6d50a864027d04cb2b973f8f10957eaf6f376d9bf92c9ade4c2eddc56b1cd855dae8db52f66a7b37a8703bea70a4bc27f9d1f0993515f0e4b75063901d75b2d288093633c395e95a5cc55e61be5d7291656ef9e4554702a340506c816c74a29f3e24a0b9acde5fe880251082f50783e5859661ba31e374dee784fe0b342f1866f182f6274a12201ada9c2810a4e0b1cb0fbbfa6932d7b25de0d1a2e687d9fb8e075a41e7c476d2b95ce2b2b9ced1d86de2c5aad38e4ad75b654c42a96e99fb449d667bdb44ced05ed1fa4db38c6775e1250b043b9fea6a5ea265d9cc2c3b84e37fdec737903561a0716bcebda5243075706725e08755eec49309646844f4fec9473f492744d8f0cf2923ac94eefbf5f44b369e91c978629a9b4f6fb319d81faa098f3827d52a6c51096fd8e04be8c1feff9855939f27992434b4a9177b41e2fe2a5eb8e937dea1120e90320c466c51dd8552598be86f65f790a615604ae19c873c89aa60400f48dc4db21312024c2e2479c0ae928df4089b55801c8ae6dd1ae3514750341a9b297f844f8cc4baee5b67d7c4e1595aed6ab1e5b36b60d304c86cda7adaa1f1a9aaf6fe50a13f47ef530273322a230c087668013d9c7f830ca81a536f8082ee08a173876784d21f00573ff4f4e0af2ca73cdf4ab5005d0a66a9349887cb8f4b9c93cc8340d450677c4310460cb9a4522e6b0163434e38e5010f4e0d333a2a83822d1c0951147a7afe7ec7292713e3b9bc86dabeb76faa2bf45b31fac4b6bf0a31761fd4f5b0dfd7cef3d54412dd8f258cd8a20ad3330a824016f09adac852e3ed2a5cddfb75b559f91c21f15c05cef0672c703b63bb0da46117bf3e3db65c08ed2a819ec03525f5b990fbce9a25a39cdaed950b1b877e3eeaa1f90d5513a50cf93ba11b816a9d3fa30504b551e0954a1b8fe0cff7dfaa4a7db0e3610df8a4ef4447b787341519be45962dcbc46f2ff8f44cfb576ae20db3ea7e913723fbd6f16bf0f68d21b0918706f23da0c519c27662e789087572c8f1277758b2fb2c2ab14cc2177b62d5a54dcc21a8f092e10e66fdea749e36376c2a530a5a7a97f48e2b24e7c7e415fd0d0abd6ef203b816c8755add92585c0a730476330c3d94f268a29a1b58d50c7aec01a1e5703d0ef046a964802875aec1ed0b6ca263b40b4a6db4973d5a0dd980d83ec2b58757c0bb5fa8c2a1cd664263caba58b263514a734a97f12645a3e808aa09aa6562f5dccf7fd46b87b5d10e835f0e05639a7af6b1facdf92bf704d40bd366f0d9919162f8a2dc962d6065b498e5df12912f636e3b1863fb3d8e7101f426069c5b4635ba89e104554bd86d9c94500b5adcc2b76634af3f31d08abd7a8cf459d21ef861e5b689caf9f74686a9bca77e91ea537500f9345dafd26bc8853a3da74c8f4f1d944477181c0ea7cad6d3a8aa0628fc23cb34d2a801f4e8d54f757f4b8d657d9ca4bb0086919cf8f580957019b2c7b251844b04d116de6509ed2e19735ba638011e342f1fef79561dd5697542aad68df8088e3be33d21136959ff39594e7ce8706daf9c9c2f98a0ad5c0265e94e00b2ca91fb3ee1d5eebb1e7abceeb9292feb8a752e3d071ecbe50d038234ae54dc6027ac8bc9b14a7b5cbb91de6b1df1daa7ad5885e787a6ab36da37ee8e138de1747c69b5dc9ff6e30b6bdb79f2defb34927b692d3b8f806b68e23c1fa8972e5b8973fc1692de3ed6daa892c29", 0xb41}], 0x0, 0x0) 09:04:57 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @multicast1}}}, &(0x7f0000000140)=0x90) 09:04:57 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x72, 0x0, &(0x7f0000000300)) [ 317.729587][ T9864] loop1: detected capacity change from 0 to 5 09:04:57 executing program 0: syz_mount_image$exfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='errors=']) 09:04:57 executing program 3: mq_open(&(0x7f0000000200)='#%\x00', 0x0, 0x0, 0x0) 09:04:57 executing program 2: syz_mount_image$exfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000100)="1894", 0x2, 0x7fffffff}], 0x0, &(0x7f0000000340)={[{@discard}, {@fmask}], [{@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@hash}, {@smackfsroot}, {@smackfshat={'smackfshat', 0x3d, '&'}}]}) [ 317.839904][ T9864] loop1: detected capacity change from 0 to 5 [ 317.840164][ T9874] loop2: detected capacity change from 0 to 264192 [ 317.870782][ T9874] exfat: Unknown parameter 'fowner>18446744073709551615' [ 317.888986][ T9877] exfat: Bad value for 'errors' 09:04:58 executing program 3: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x28030, 0xffffffffffffffff, 0x0) 09:04:58 executing program 1: clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket$rxrpc(0x21, 0x2, 0xa) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) [ 317.930152][ T9877] exfat: Bad value for 'errors' [ 317.956584][ T9874] loop2: detected capacity change from 0 to 264192 [ 317.968495][ T9874] exfat: Unknown parameter 'fowner>18446744073709551615' 09:04:58 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, 0x0) 09:04:58 executing program 3: mq_notify(0xffffffffffffffff, &(0x7f0000000000)) 09:04:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000034c0)={0x0, 0x0, &(0x7f0000003480)={0x0}}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000100), r0) 09:04:58 executing program 2: openat$mice(0xffffffffffffff9c, &(0x7f0000000540), 0x658383) 09:04:58 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba10", 0x1b) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000080)={@loopback, @empty, @broadcast}, 0xc) 09:04:58 executing program 0: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100), 0x0) accept4$packet(r0, 0x0, 0x0, 0x180000) 09:04:58 executing program 3: syz_mount_image$exfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='errors=continue,dmask=00000']) [ 318.211549][ T9918] exFAT-fs (loop3): invalid boot record signature [ 318.222035][ T9918] exFAT-fs (loop3): failed to read boot sector [ 318.233423][ T9918] exFAT-fs (loop3): failed to recognize exfat type [ 318.293023][ T9918] exFAT-fs (loop3): invalid boot record signature [ 318.304097][ T9918] exFAT-fs (loop3): failed to read boot sector [ 318.316780][ T9918] exFAT-fs (loop3): failed to recognize exfat type 09:04:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, &(0x7f00000000c0)) 09:04:59 executing program 2: io_uring_setup(0x6ed2, &(0x7f0000000000)={0x0, 0x2e9b, 0xa}) 09:04:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000540), &(0x7f0000000580)=0x4) 09:04:59 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x76, &(0x7f0000000340), &(0x7f0000000380)=0x8) [ 318.888860][ T9942] sctp: [Deprecated]: syz-executor.0 (pid 9942) Use of int in max_burst socket option. [ 318.888860][ T9942] Use struct sctp_assoc_value instead 09:04:59 executing program 0: openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x10000) 09:04:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000034c0)={0x0, 0x0, &(0x7f0000003480)={0x0, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 09:04:59 executing program 1: syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x7c9f, &(0x7f0000000100)={0x0, 0xbc71}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, 0x0, 0x0) 09:04:59 executing program 2: syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) syz_io_uring_setup(0x804, &(0x7f0000000000), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), 0x0) syz_io_uring_setup(0x2bf0, &(0x7f0000000200)={0x0, 0x3644, 0x10}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) 09:04:59 executing program 0: syz_mount_image$exfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x1414, &(0x7f0000000180)={[{@namecase}]}) 09:04:59 executing program 1: syz_io_uring_setup(0x804, &(0x7f0000000000), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x0, &(0x7f00000000c0)) syz_io_uring_setup(0x2bf0, &(0x7f0000000200), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) 09:04:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'macvlan0\x00', {0x2, 0x0, @initdev}}) 09:04:59 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x6f, 0x0, &(0x7f0000000300)) 09:04:59 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x24, &(0x7f0000000340), &(0x7f0000000380)=0x8) 09:04:59 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) connect$rxrpc(r0, 0x0, 0x0) 09:04:59 executing program 3: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x30, 0xffffffffffffffff, 0x8000000) 09:04:59 executing program 1: syz_io_uring_setup(0x804, &(0x7f0000000000), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x0, &(0x7f00000000c0)) syz_io_uring_setup(0x2bf0, &(0x7f0000000200), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) 09:04:59 executing program 2: add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="83", 0x1, 0xfffffffffffffffc) 09:04:59 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000540), 0x5c00, 0x0) 09:04:59 executing program 0: socket$inet(0x2, 0xd8428ab3cba555c2, 0x0) 09:04:59 executing program 2: recvfrom$l2tp6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 09:04:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[], 0x2c}}, 0x0) 09:04:59 executing program 0: syz_io_uring_setup(0x807, &(0x7f0000000000), &(0x7f0000800000/0x800000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 09:04:59 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0xd6801, 0x0) 09:04:59 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000540), 0xff00, 0x0) 09:04:59 executing program 1: syz_io_uring_setup(0xb8, &(0x7f0000000140), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000000c0), &(0x7f00000001c0)) 09:04:59 executing program 2: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000540), 0x12, 0x0) 09:04:59 executing program 1: syz_mount_image$exfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000001680)=[{&(0x7f00000004c0)="5f0dc064053de4f507238e98155460cfe98d7c67ea9a72e4ea69b519966efea3ee1fa7df67230250b9e4129420a5ce78d58d75bedd82bb88e628915bdd50fa4ed5c5394ad7c38beb8a6a31ed62e5d55aec1c1bb4ae7f60b57a3028d7967c8d015a1041327e7c8298ef0041988909836e997ea2f009442e150d62a1f8f104d1f1a65f15f29d3c3cfd7005bdf7978c46390b66ceef66b068b430f508692c2284a32e54096ad2d22a2bb00cf895632c17806abdadc1d33971238d91ef390064e377715ee2d6ca605e6d8a96e2511e1ce21cd4e248515c8785acb7db1b1cd9a6e04000b469e1e01ec7e5414740dfd182fb27a6c5965b525f7d5d6d7b6c40d4863674deae010ed7afae9afee877d46c7023c015de94f86f8515c336b85a9c879ce24b12e34c9419c9ff0a490019a2fdd968a101785b5c2af40c8383116008c6583d7dd79bce50c6217f85bf068e3c17d48df3b3fa8cc340e378d20130ecb85a9be9698795ef4917936cbc6a5ff04efb6be5735608be6df729ef89fb7a65eaa9b46d4098ef9952816a57d54b8b13e786b9d09ac7c97c622804adb2bd60dc67ab0a60ceefeacf6ff4a16c0ecf76cd3cadae9860c77ccba7e14e643440e6b2b1b973c08de2089c0a4054517e5ce68c1364a6ca0d805c55f018de82350365df3004261663115266b318896b32dddc0e505fd5da936e53d51069a6c79bf1d29f1651541d38a50611cbd182b808783dbcc352ad84816797cc94cda57f97f471443cc0b526a4ad29bf9047dd94640b388a8743670658080f6a4c21e48870b02205bc3b758b612dc476eb9205946f63d674980ff5464582f207e435c16b8b393bb023809cbcec00745e910125d880f590c8010dbb6ad2f603fcdae3897856261f7886bcfa0ed393fee72590f979a96e0e0e8690772d42cd0ead76d43df23efddde7f0388008a56001145426b3f0381dee4d3e4d80654ceb0b9e7eee5557e73ff74d63b93baff37009ae4a2364e75335827f3cbb3ce25a0b85f8a64e6f6a5ee0fdde7d173697706d954ff22d54dcf23ac05c76bc4a6021cadf41cc63803d9c27e6453b72e47808e777bea8e294d178a7e968024268d587f552c8e50543a6469a6877bd273625f6df4a6e96f52c12092dd6c36358a3d1fb87f57b1b18cc894c3f2754632e23a8070d71f04a6ae9cac9b8f001d73e379d3127c31fc94b0f6302ead016491e466924f48401df94e35c6a73b10f1d94a45cd2cb956cce1616e90e38502c4f9df0067db6439716a4e394c1563fc2765f249c104cee5b111a9d7cfdbacf16d4decdf504de9c5f739854c2b2448b19ffc5c574bb9fecc554379f85f16809a7a8da37eaede2db54b5115a12c1462f4549cf9eae06fb2e76a57313eee2cd9a6c28f1287c7a49a4d87910a644b5eaf3e56537e7d15f3aeaf877f7db069953162808811c19", 0x3ff, 0x7c02}], 0x0, 0x0) 09:04:59 executing program 0: socketpair(0x15, 0x0, 0x0, &(0x7f0000000200)) 09:04:59 executing program 3: ioperm(0x0, 0x9, 0x4) ioperm(0x0, 0x3, 0x0) 09:04:59 executing program 2: syz_mount_image$exfat(&(0x7f0000000440), 0x0, 0x0, 0x1, &(0x7f0000001680)=[{&(0x7f00000004c0)='_', 0x1, 0x7c02}], 0x0, &(0x7f00000017c0)) 09:04:59 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x73, 0x0, &(0x7f0000000300)) 09:04:59 executing program 0: recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 319.698053][T10009] loop1: detected capacity change from 0 to 124 [ 319.706878][T10011] loop2: detected capacity change from 0 to 124 09:04:59 executing program 1: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x40000}, 0x20) 09:04:59 executing program 3: syz_mount_image$exfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='errors']) [ 319.833959][T10011] loop2: detected capacity change from 0 to 124 09:05:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r0, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000d80)={0x0, 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) 09:05:00 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003740)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000003700)={0x0, 0x0, 0x0}, 0x0) [ 319.863134][T10025] exfat: Bad value for 'errors' [ 319.921257][T10025] exfat: Bad value for 'errors' 09:05:00 executing program 2: socket$inet(0x2, 0x0, 0x1000) 09:05:00 executing program 0: r0 = getegid() syz_mount_image$exfat(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB='errors=continue,namecase=1,gid=', @ANYRESHEX=r0, @ANYBLOB=',allow_utime=00000000000000000000007,uid=', @ANYBLOB]) 09:05:00 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x90) [ 320.068989][T10043] exfat: Deprecated parameter 'namecase' [ 320.078386][T10043] exfat: Bad value for 'uid' 09:05:00 executing program 2: pselect6(0x64, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0) 09:05:00 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}]}, 0x24}}, 0x0) 09:05:00 executing program 0: syz_io_uring_setup(0xbd5, &(0x7f00000001c0), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, 0x0) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, 0x0, 0x0) 09:05:00 executing program 2: syz_io_uring_setup(0x4c01, &(0x7f0000000100), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000180), 0x0) syz_io_uring_setup(0x5841, &(0x7f0000000840), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000001c0), &(0x7f00000008c0)) 09:05:00 executing program 2: syz_io_uring_setup(0x4c01, &(0x7f0000000100), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000180), 0x0) syz_io_uring_setup(0x5841, &(0x7f0000000840), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000001c0), &(0x7f00000008c0)) 09:05:00 executing program 3: openat$mice(0xffffffffffffff9c, &(0x7f0000000100), 0x18b194673a89bf52) 09:05:00 executing program 1: openat$mice(0xffffffffffffff9c, 0x0, 0x410880) 09:05:01 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 09:05:01 executing program 1: syz_io_uring_setup(0xbd5, &(0x7f00000001c0), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f0000000000)={0x8}, &(0x7f0000000040)={0x15}, 0x0, &(0x7f0000000100), 0x0) 09:05:01 executing program 2: syz_mount_image$exfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xa28005, &(0x7f0000000600)=ANY=[]) 09:05:01 executing program 0: syz_mount_image$exfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000340)={[{@discard}, {@fmask}], [{@smackfsroot}, {@smackfshat={'smackfshat', 0x3d, '&'}}]}) 09:05:01 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003740)) 09:05:01 executing program 1: syz_io_uring_setup(0xbd5, &(0x7f00000001c0), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f0000000000)={0x8}, &(0x7f0000000040)={0x15}, 0x0, &(0x7f0000000100), 0x0) 09:05:01 executing program 2: clock_gettime(0x0, 0x0) socket(0x0, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f0000000080)={0x7}, 0x0, &(0x7f0000000140)={r0, r1+10000000}, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400), 0xffffffffffffffff) 09:05:01 executing program 1: syz_io_uring_setup(0x804, &(0x7f0000000000), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) [ 321.142728][T10089] exfat: Unknown parameter 'smackfsroot' 09:05:01 executing program 3: mount_setattr(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, &(0x7f0000000440)={0x6}, 0x20) [ 321.215396][T10089] exfat: Unknown parameter 'smackfsroot' 09:05:01 executing program 1: socketpair(0x2a, 0x0, 0x0, &(0x7f00000014c0)) 09:05:01 executing program 0: socketpair(0x1d, 0x0, 0xffff, &(0x7f0000002f00)) 09:05:01 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, &(0x7f0000000240)) 09:05:01 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) 09:05:01 executing program 2: syz_mount_image$exfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000001680)=[{0x0, 0x0, 0x7c02}], 0x62000, 0x0) 09:05:01 executing program 1: pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000200)={0x80000001}, 0x0, 0x0) 09:05:01 executing program 3: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_setup(0x2bf0, &(0x7f0000000200)={0x0, 0x3644}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) [ 321.352659][T10113] loop2: detected capacity change from 0 to 124 09:05:01 executing program 0: mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)) 09:05:01 executing program 1: mq_open(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0, 0x0) 09:05:01 executing program 3: clock_gettime(0x0, &(0x7f0000000240)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'mangle\x00', 0x4, [{}, {}, {}, {}]}, 0x68) syz_io_uring_setup(0x2a7b, &(0x7f0000000100)={0x0, 0x9963, 0x1, 0x0, 0xbb}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) mmap$IORING_OFF_CQ_RING(&(0x7f0000fef000/0x10000)=nil, 0x10000, 0x0, 0x10, 0xffffffffffffffff, 0x8000000) syz_io_uring_complete(0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) syz_io_uring_complete(0x0) 09:05:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x82, 0x0, &(0x7f0000000300)) 09:05:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r0, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000d80)={0x0, 0x14}}, 0x0) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={0x0}}, 0x0) [ 321.466802][T10113] loop2: detected capacity change from 0 to 124 09:05:01 executing program 2: clock_gettime(0x0, &(0x7f0000000240)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'mangle\x00', 0x4, [{}, {}, {}, {}]}, 0x68) syz_io_uring_setup(0x2a7b, &(0x7f0000000100)={0x0, 0x9963, 0x1, 0x0, 0xbb}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) mmap$IORING_OFF_CQ_RING(&(0x7f0000fef000/0x10000)=nil, 0x10000, 0x0, 0x10, 0xffffffffffffffff, 0x8000000) syz_io_uring_complete(0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) syz_io_uring_complete(0x0) 09:05:01 executing program 0: r0 = getegid() syz_mount_image$exfat(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB='errors=continue,namecase=1,gid=', @ANYRESHEX=r0, @ANYBLOB=',allow_utime=00000000000000000000007,uid=']) 09:05:01 executing program 3: clock_gettime(0x0, &(0x7f0000000240)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'mangle\x00', 0x4, [{}, {}, {}, {}]}, 0x68) syz_io_uring_setup(0x2a7b, &(0x7f0000000100)={0x0, 0x9963, 0x1, 0x0, 0xbb}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) mmap$IORING_OFF_CQ_RING(&(0x7f0000fef000/0x10000)=nil, 0x10000, 0x0, 0x10, 0xffffffffffffffff, 0x8000000) syz_io_uring_complete(0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) syz_io_uring_complete(0x0) 09:05:01 executing program 1: mq_open(&(0x7f0000000400)='+\x00', 0x0, 0x0, 0x0) [ 321.619929][T10143] exfat: Deprecated parameter 'namecase' [ 321.633136][T10143] exfat: Bad value for 'uid' 09:05:01 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, 0x0) 09:05:01 executing program 1: syz_io_uring_setup(0x804, &(0x7f0000000000), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), 0x0) syz_io_uring_setup(0x804, &(0x7f0000000000), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 09:05:01 executing program 2: clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x0, r0+60000000}, &(0x7f0000000380)={&(0x7f0000000340), 0x8}) 09:05:01 executing program 0: r0 = getegid() syz_mount_image$exfat(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB='errors=continue,namecase=1,gid=', @ANYRESHEX=r0, @ANYBLOB=',allow_utime=00000000000000000000007,uid=', @ANYRESHEX=0x0, @ANYBLOB=',codepage']) 09:05:01 executing program 3: syz_io_uring_setup(0x12c5, &(0x7f0000000000), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x7c9f, &(0x7f0000000100)={0x0, 0xbc71, 0x8}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 09:05:01 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_setup(0x2bf0, &(0x7f0000000200), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) [ 321.758131][T10164] exfat: Deprecated parameter 'namecase' 09:05:01 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000540), &(0x7f0000000580)=0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) [ 321.773530][T10164] exfat: Deprecated parameter 'codepage' [ 321.781859][T10164] exfat: Bad value for 'codepage' 09:05:01 executing program 3: pselect6(0x40, &(0x7f00000004c0), &(0x7f0000000500)={0x6}, 0x0, &(0x7f0000000580)={0x0, 0x3938700}, 0x0) [ 321.813983][T10173] sctp: [Deprecated]: syz-executor.1 (pid 10173) Use of int in max_burst socket option. [ 321.813983][T10173] Use struct sctp_assoc_value instead [ 321.832777][T10175] sctp: [Deprecated]: syz-executor.1 (pid 10175) Use of int in max_burst socket option. [ 321.832777][T10175] Use struct sctp_assoc_value instead 09:05:02 executing program 3: socket(0x1, 0x0, 0x1000) 09:05:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000034c0)={0x0, 0x0, &(0x7f0000003480)={&(0x7f0000003400)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="1f"], 0x14}}, 0x0) 09:05:02 executing program 2: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x7f}, 0x20) 09:05:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r0, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000d80)={0x0, 0x14}}, 0x0) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 09:05:02 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, 0x0, 0x0) 09:05:02 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {}, {@errors_continue}, {@namecase}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 09:05:02 executing program 1: syz_io_uring_setup(0x7c9f, &(0x7f0000000100)={0x0, 0xbc71}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000180), 0x0) [ 322.625385][T10196] exfat: Deprecated parameter 'namecase' [ 322.633998][T10196] exfat: Unknown parameter 'euid>00000000000000060928' 09:05:02 executing program 2: getresuid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001b00)) 09:05:02 executing program 3: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000540), 0x0) bind$rxrpc(r0, 0x0, 0x0) 09:05:02 executing program 1: syz_mount_image$exfat(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB='errors=continue,namecase']) 09:05:02 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {}, {@errors_continue}, {@namecase}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 09:05:02 executing program 2: syz_mount_image$exfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000340)={[{@discard}]}) [ 322.777494][T10213] exfat: Deprecated parameter 'namecase' [ 322.784104][T10213] exfat: Bad value for 'namecase' [ 322.794655][T10217] exFAT-fs (loop2): mounting with "discard" option, but the device does not support discard [ 322.807956][T10217] exFAT-fs (loop2): invalid boot record signature 09:05:03 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {}, {@errors_continue}, {@namecase}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) [ 322.815491][T10217] exFAT-fs (loop2): failed to read boot sector [ 322.824317][T10217] exFAT-fs (loop2): failed to recognize exfat type [ 322.854285][T10213] exfat: Deprecated parameter 'namecase' [ 322.870737][T10213] exfat: Bad value for 'namecase' 09:05:03 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {}, {@errors_continue}, {@namecase}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 09:05:03 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, 0x0, &(0x7f0000000300)=0x8) 09:05:03 executing program 3: syz_io_uring_setup(0x2bf0, &(0x7f0000000200), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000340)={0x0, @ax25={0x3, @default}, @generic={0x0, "e1289f417b635266d356110c7a76"}, @xdp}) [ 322.941149][T10228] exfat: Deprecated parameter 'namecase' [ 322.948179][T10228] exfat: Unknown parameter 'euid>00000000000000060928' 09:05:03 executing program 3: pselect6(0x40, &(0x7f00000004c0)={0x3}, &(0x7f0000000500)={0x6}, 0x0, 0x0, 0x0) 09:05:03 executing program 1: socketpair(0x26, 0x0, 0x0, &(0x7f0000000280)) 09:05:03 executing program 3: syz_io_uring_setup(0x18ad, &(0x7f00000006c0)={0x0, 0x5803, 0x8}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000740), &(0x7f0000000780)) 09:05:03 executing program 2: clone(0x60804000, &(0x7f0000000180)="e7cf86a21b62ccd212", &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="d8e257aa6b714aa182915c613ff82c69dc57e54dc0977677148f292237ea66d8deb3de89e2a4e6e3dfaaad48024536a32f860141c98a620f538d320f916bdbf4e892267e85bc9418868e263e6683887060af7b5f7d7f6a0e948d89") setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@dev={0xac, 0x14, 0x14, 0x3d}, @in=@private=0xa010102, 0x4e20, 0x0, 0x4e23, 0x8, 0x0, 0xa0}, {}, {0x1, 0xffff, 0x20, 0x8}, 0x0, 0x6e6bbf, 0x2, 0x1, 0x1, 0x3}, {{@in6=@remote, 0x4d2, 0x3c}, 0x8, @in=@multicast2, 0x3507, 0x3, 0x2, 0x6, 0x7, 0xf8000000}}, 0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 09:05:03 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x1c}}, 0x0) 09:05:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7d, 0x0, &(0x7f0000000300)) 09:05:03 executing program 0: syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {}, {@errors_continue}, {@namecase}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 09:05:03 executing program 1: syz_io_uring_setup(0x2668, &(0x7f0000000000)={0x0, 0x0, 0x36}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 09:05:03 executing program 3: pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x1}, &(0x7f0000000140)={0x0, 0x989680}, 0x0) 09:05:03 executing program 1: mq_open(&(0x7f0000000380)='\xec\x1b', 0x0, 0x0, 0x0) 09:05:03 executing program 0: syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {}, {@errors_continue}, {@namecase}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 09:05:03 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x74}}, 0x0) 09:05:03 executing program 3: socket(0x23, 0x0, 0xffff) 09:05:03 executing program 2: syz_io_uring_setup(0x7c03, &(0x7f0000000000), &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) syz_io_uring_setup(0x804, &(0x7f0000000000)={0x0, 0x5e5e, 0x0, 0x1, 0x5f}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 09:05:03 executing program 1: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100), 0x0) syz_io_uring_setup(0xd9, &(0x7f0000000000)={0x0, 0x7a79, 0x3d, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 09:05:03 executing program 2: syz_io_uring_setup(0x7c03, &(0x7f0000000000), &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) syz_io_uring_setup(0x804, &(0x7f0000000000)={0x0, 0x5e5e, 0x0, 0x1, 0x5f}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 09:05:03 executing program 0: syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {}, {@errors_continue}, {@namecase}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 09:05:03 executing program 3: pselect6(0x40, &(0x7f00000004c0)={0x3}, 0x0, 0x0, 0x0, 0x0) 09:05:03 executing program 1: openat$sequencer(0xffffffffffffff9c, 0x0, 0x523000, 0x0) 09:05:03 executing program 2: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x78, 0x0, 0x37641f06f2b1cd1f}, 0x20) 09:05:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000180)=0x90) 09:05:03 executing program 0: syz_mount_image$exfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {}, {@errors_continue}, {@namecase}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 09:05:03 executing program 1: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100), 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:05:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000034c0)={0x0, 0x0, &(0x7f0000003480)={0x0, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={0x0}}, 0x0) 09:05:03 executing program 2: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x101002) 09:05:04 executing program 0: syz_mount_image$exfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {}, {@errors_continue}, {@namecase}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 09:05:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, 0x0, 0xc, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 09:05:04 executing program 3: ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) syz_io_uring_setup(0x804, &(0x7f0000000000), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) 09:05:04 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, 0x0, &(0x7f0000000540)=0x93) 09:05:04 executing program 3: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)) 09:05:04 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000540), 0x3, 0x0) 09:05:04 executing program 2: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000540), 0x0) setsockopt$inet_buf(r0, 0x0, 0x0, 0x0, 0x0) 09:05:04 executing program 0: syz_mount_image$exfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {}, {@errors_continue}, {@namecase}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 09:05:04 executing program 3: syz_io_uring_setup(0x7c03, &(0x7f0000000000), &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x804, &(0x7f0000000000)={0x0, 0x5e5e}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 09:05:04 executing program 1: ioperm(0x0, 0x9, 0x4) 09:05:04 executing program 3: syz_io_uring_setup(0x3d98, &(0x7f0000000200)={0x0, 0x0, 0x20}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) 09:05:04 executing program 1: syz_io_uring_setup(0x12c5, &(0x7f0000000000), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x7c9f, &(0x7f0000000100)={0x0, 0xbc71}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 09:05:04 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {}, {@errors_continue}, {@namecase}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 09:05:04 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x7b, &(0x7f0000000340), &(0x7f0000000380)=0x8) 09:05:04 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x6d, 0x0, &(0x7f0000000300)) 09:05:04 executing program 1: syz_open_dev$sndctrl(&(0x7f0000000000), 0xffffffffffffffff, 0x204000) 09:05:04 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x7b, &(0x7f0000000340), &(0x7f0000000380)=0x8) 09:05:04 executing program 3: syz_emit_ethernet(0x18, &(0x7f0000000140)={@local, @broadcast, @val={@void}, {@generic={0x8100, "d62067b055fc"}}}, 0x0) r0 = gettid() ptrace$peek(0x1, r0, &(0x7f0000000280)) syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x1ff) futex(&(0x7f0000000100)=0x1, 0x4, 0x2, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)=0x1, 0x1) syz_emit_ethernet(0x1e, &(0x7f00000002c0)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @void, {@can={0xc, {{0x4}, 0x7, 0x2, 0x0, 0x0, "3ab3aefc77cafd94"}}}}, &(0x7f0000000040)={0x1, 0x1, [0xd44, 0xfd7, 0x80f, 0xae6]}) read$char_usb(0xffffffffffffffff, &(0x7f00000000c0)=""/27, 0x1b) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) 09:05:04 executing program 1: syz_io_uring_setup(0x12c5, &(0x7f0000000000), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x7c9f, &(0x7f0000000100), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 09:05:04 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {}, {@errors_continue}, {@namecase}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 09:05:04 executing program 2: syz_io_uring_setup(0x54db, &(0x7f0000000000), &(0x7f0000400000/0xc00000)=nil, &(0x7f0000642000/0xc000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 09:05:04 executing program 1: syz_mount_image$exfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1414, &(0x7f0000000180)) 09:05:04 executing program 2: syz_io_uring_setup(0x54db, &(0x7f0000000000), &(0x7f0000400000/0xc00000)=nil, &(0x7f0000642000/0xc000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 09:05:04 executing program 3: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x6}, &(0x7f00000000c0)={0x77359400}, 0x0) 09:05:04 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {}, {@errors_continue}, {@namecase}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 09:05:04 executing program 1: syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)) 09:05:05 executing program 2: syz_mount_image$exfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000340)={[], [{@smackfshat={'smackfshat', 0x3d, '&'}}]}) 09:05:05 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_PID={0x8}]}, 0x24}}, 0x0) 09:05:05 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {}, {@errors_continue}, {@namecase}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 09:05:05 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_PID={0x8}]}, 0x24}}, 0x0) [ 324.942345][T10436] exfat: Unknown parameter 'smackfshat' [ 324.999733][T10436] exfat: Unknown parameter 'smackfshat' 09:05:05 executing program 1: syz_io_uring_setup(0x4992, &(0x7f0000000180), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200), 0x0) syz_io_uring_setup(0x804, &(0x7f0000000000), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 09:05:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x66, &(0x7f0000000340), &(0x7f0000000380)=0x8) 09:05:05 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {}, {@errors_continue}, {@namecase}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 09:05:05 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, 0x0) 09:05:06 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x70, 0x0, &(0x7f0000000300)) 09:05:06 executing program 2: pselect6(0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000300), &(0x7f0000000380)={&(0x7f0000000340), 0x8}) 09:05:06 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000540), 0x490502, 0x0) 09:05:06 executing program 3: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 09:05:06 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200), &(0x7f0000000240)=0x4) 09:05:06 executing program 1: epoll_create(0x8241) 09:05:06 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x6c, &(0x7f0000000340), &(0x7f0000000380)=0x8) 09:05:06 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {}, {@errors_continue}, {@namecase}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 09:05:06 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000000), 0x4) 09:05:06 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)) 09:05:06 executing program 3: syz_io_uring_setup(0x4992, &(0x7f0000000180)={0x0, 0x0, 0x3}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200), &(0x7f0000000240)) 09:05:06 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {}, {@errors_continue}, {@namecase}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 09:05:06 executing program 1: pselect6(0x40, &(0x7f0000000080)={0x7}, 0x0, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180), 0x8}) 09:05:06 executing program 3: r0 = add_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="9e", 0x1, 0xfffffffffffffffe) r1 = add_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="9e", 0x1, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) keyctl$chown(0x4, r0, 0x0, 0x0) 09:05:06 executing program 1: pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0), 0x0, &(0x7f0000000300), &(0x7f0000000380)={&(0x7f0000000340)={[0x7fffffff]}, 0x8}) 09:05:06 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000000), 0x4) 09:05:06 executing program 3: pselect6(0xfefdffff, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0) 09:05:06 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {}, {@errors_continue}, {@namecase}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 09:05:06 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000002c0)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00', 0x457dc59f}]}, &(0x7f0000000340)=0x10) 09:05:06 executing program 2: getsockname$l2tp6(0xffffffffffffffff, 0x0, 0x0) 09:05:06 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0x1, "d5"}, &(0x7f0000000180)=0x9) 09:05:06 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {}, {@errors_continue}, {@namecase}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 09:05:06 executing program 3: syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0xa8c41) 09:05:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="01"], 0x2c}}, 0x0) 09:05:06 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) 09:05:06 executing program 3: syz_mount_image$exfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x1414, &(0x7f0000000180)) 09:05:07 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000002c0)={0x0, 0x38, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x1, @rand_addr=' \x01\x00'}, @in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, &(0x7f0000000340)=0x10) 09:05:07 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, 0x0, 0xd8}, 0x9c) 09:05:07 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) 09:05:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x40, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x52}, @val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x6}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'ip6erspan0\x00'}]}, 0x40}}, 0x0) 09:05:07 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) clone(0x60804000, &(0x7f0000000180), 0x0, 0x0, 0x0) r1 = epoll_create1(0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000480)={0x0, @xdp={0x2c, 0x8, 0x0, 0x2b}, @vsock={0x28, 0x0, 0xffffffff, @hyper}, @ax25={0x3, @bcast}, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x11d816b8, 0x5, 0x20001b, 0x8, "f911b42c36d539a392fd2f544949934695ee45cf133f93e0cd026d4be5117ae30ef51eb1a8ac484a9209d2e59fdab3c87a4cf413afb1140249e41feaea7bfbfb", "e9897e6cdbbb8337930bf9f3f1e5f8248f3995082c460b3a26116a67bb7adaf9", [0x0, 0x3]}) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x1c, 0x0, 0x0, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x400}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004085}, 0x40000) 09:05:07 executing program 3: syz_io_uring_setup(0x7c03, &(0x7f0000000000), &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x804, &(0x7f0000000000), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 09:05:07 executing program 1: syz_io_uring_setup(0x4c01, &(0x7f0000000100), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000180), 0x0) syz_io_uring_setup(0x5841, &(0x7f0000000840), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x38c3, &(0x7f0000000900), &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000980), &(0x7f00000009c0)) 09:05:07 executing program 3: syz_io_uring_setup(0x7c03, &(0x7f0000000000), &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x804, &(0x7f0000000000), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 09:05:07 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) 09:05:07 executing program 1: syz_io_uring_setup(0x4c01, &(0x7f0000000100), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000180), 0x0) syz_io_uring_setup(0x5841, &(0x7f0000000840), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x38c3, &(0x7f0000000900), &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000980), &(0x7f00000009c0)) 09:05:08 executing program 1: syz_open_dev$dri(&(0x7f00000000c0), 0x70400e42, 0x0) 09:05:08 executing program 3: syz_mount_image$exfat(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB='errors=continue,n']) [ 328.081904][T10629] exfat: Unknown parameter 'n' 09:05:08 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {}, {@errors_continue}, {@namecase}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 09:05:08 executing program 1: syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x7c9f, &(0x7f0000000100)={0x0, 0xbc71}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 09:05:08 executing program 2: openat$mice(0xffffffffffffff9c, &(0x7f0000000540), 0x0) clock_gettime(0x1, &(0x7f0000000140)) [ 328.157224][T10629] exfat: Unknown parameter 'n' [ 328.201388][T10640] exfat: Deprecated parameter 'namecase' [ 328.215810][T10640] exfat: Unknown parameter 'euid>00000000000000060928' 09:05:08 executing program 1: syz_mount_image$exfat(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f00000017c0)={[{@errors_remount}]}) 09:05:08 executing program 3: openat$mice(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) [ 328.322927][T10649] exFAT-fs (loop1): invalid boot record signature [ 328.352542][T10649] exFAT-fs (loop1): failed to read boot sector [ 328.377741][T10649] exFAT-fs (loop1): failed to recognize exfat type 09:05:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockname$inet(r0, 0x0, 0x0) 09:05:08 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[], &(0x7f0000000540)=0x93) 09:05:08 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}]}, 0x24}}, 0x0) 09:05:08 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {}, {@errors_continue}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) [ 328.482248][T10649] exFAT-fs (loop1): invalid boot record signature [ 328.498985][T10649] exFAT-fs (loop1): failed to read boot sector [ 328.512819][T10649] exFAT-fs (loop1): failed to recognize exfat type [ 328.520317][T10667] exfat: Unknown parameter 'euid>00000000000000060928' 09:05:08 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000002c0), 0x4) 09:05:08 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0xfffffc8d) 09:05:08 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, 0x0, 0x0) 09:05:08 executing program 1: syz_io_uring_setup(0xbd5, &(0x7f00000001c0), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f0000000000)={0x8}, &(0x7f0000000040)={0x15}, 0x0, 0x0, 0x0) 09:05:08 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 09:05:08 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x24, 0x0, &(0x7f0000000300)) [ 328.709187][T10681] exfat: Unknown parameter 'euid>00000000000000060928' 09:05:08 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 09:05:08 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000080)) 09:05:08 executing program 2: syz_open_dev$sndctrl(&(0x7f0000000000), 0xffffffffffffffff, 0x0) 09:05:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendto(r0, &(0x7f0000000140)="9541db2e4ffa8f21d4af0b6cb0cf915c", 0x10, 0x0, 0x0, 0x0) 09:05:09 executing program 1: syz_io_uring_setup(0x7c03, &(0x7f0000000000), &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x804, &(0x7f0000000000), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), 0x0) 09:05:09 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000140)={&(0x7f0000000040), 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="c4fdffff", @ANYRES16=0x0, @ANYBLOB="00022abd7000fddbdf25050000003c00078008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB='\b\x00|A', @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="0c00080001000000000000000c0006000200000000000000000003000000000001000000"], 0x74}, 0x1, 0x0, 0x0, 0x20040004}, 0x84) 09:05:09 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000140)=""/84, &(0x7f00000001c0)=0x54) [ 328.904050][T10696] exfat: Unknown parameter 'euid>00000000000000060928' 09:05:09 executing program 2: r0 = mq_open(&(0x7f0000000380)='\xec\x1b', 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 09:05:09 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7a, 0x0, &(0x7f0000000300)) 09:05:09 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 09:05:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockname$inet(r0, &(0x7f0000000000)={0x2, 0x0, @initdev}, &(0x7f0000000040)=0x10) [ 329.208761][T10716] exfat: Unknown parameter 'euid>00000000000000060928' 09:05:09 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 09:05:09 executing program 1: syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) syz_io_uring_setup(0x804, 0x0, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) syz_io_uring_setup(0x2bf0, &(0x7f0000000200), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) 09:05:09 executing program 3: syz_io_uring_setup(0x2dfa, &(0x7f0000000000), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x7000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_setup(0x14cd, &(0x7f0000000100)={0x0, 0xcd0e}, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000000180), &(0x7f00000001c0)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000200)=@IORING_OP_TIMEOUT_REMOVE, 0xcb34) 09:05:09 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000100)={'ip6_vti0\x00'}) 09:05:09 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@fmask}, {@errors_continue}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) [ 329.388734][T10731] ip6_vti0: mtu less than device minimum 09:05:09 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), 0x4) 09:05:09 executing program 2: r0 = gettid() ioprio_set$pid(0x1, r0, 0x2007) [ 329.428171][T10734] exfat: Unknown parameter 'euid>00000000000000060928' 09:05:09 executing program 3: r0 = add_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="9e", 0x1, 0xfffffffffffffffe) keyctl$set_timeout(0x3, r0, 0x0) add_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="9e", 0x1, 0xfffffffffffffffe) 09:05:09 executing program 1: r0 = openat$mice(0xffffffffffffff9c, 0x0, 0x0) accept4$packet(r0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x4992, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x3d2}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200), &(0x7f0000000240)) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x0, 0x0) 09:05:09 executing program 3: r0 = add_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="9e", 0x1, 0xfffffffffffffffe) keyctl$set_timeout(0x3, r0, 0x0) add_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="9e", 0x1, 0xfffffffffffffffe) 09:05:09 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xee00}}, {@errors_continue}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 09:05:09 executing program 2: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000540), 0x18, 0x0) 09:05:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r0, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000d80)={0x0, 0x14}}, 0x0) 09:05:09 executing program 3: r0 = getpgid(0x0) prlimit64(r0, 0x0, &(0x7f0000000040)={0x4}, 0x0) [ 329.639455][T10752] exfat: Unknown parameter 'euid>00000000000000060928' 09:05:09 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) 09:05:10 executing program 3: syz_io_uring_setup(0x6d2f, &(0x7f0000000000)={0x0, 0x18c3, 0x8}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 09:05:10 executing program 2: syz_mount_image$exfat(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) 09:05:10 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@errors_continue}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) 09:05:10 executing program 1: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) 09:05:10 executing program 2: syz_mount_image$exfat(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x2, &(0x7f0000001680)=[{&(0x7f00000004c0)="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", 0x3ff, 0x7c02}, {&(0x7f00000014c0)="d7", 0x1}], 0x62000, &(0x7f00000017c0)={[], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) [ 329.978630][T10771] exfat: Unknown parameter 'euid>00000000000000060928' 09:05:10 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f00000031c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) [ 330.003583][T10778] loop2: detected capacity change from 0 to 124 [ 330.075953][T10778] loop2: detected capacity change from 0 to 124 09:05:10 executing program 3: syz_io_uring_setup(0x4992, &(0x7f0000000180)={0x0, 0x2ff1, 0x3, 0x2}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200), &(0x7f0000000240)) syz_io_uring_setup(0x804, &(0x7f0000000000)={0x0, 0x5e5e, 0x0, 0x1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 09:05:10 executing program 1: socket(0x29, 0x5, 0xc42) 09:05:10 executing program 2: syz_mount_image$exfat(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:05:10 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@errors_continue}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}, {@fowner_eq}]}) 09:05:10 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x84800, 0x0) 09:05:10 executing program 2: statx(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 09:05:10 executing program 3: syz_mount_image$exfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='errors=continue,dmask=']) [ 330.334142][T10798] exfat: Unknown parameter 'euid>00000000000000060928' 09:05:10 executing program 2: syz_mount_image$exfat(0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000080)="1e", 0x1}, {&(0x7f0000000100)="18", 0x1, 0x7fffffff}], 0x0, 0x0) [ 330.385922][T10805] exfat: Bad value for 'dmask' 09:05:10 executing program 1: syz_io_uring_setup(0x25, &(0x7f0000000280), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000340), &(0x7f0000000380)) [ 330.463190][T10805] exfat: Bad value for 'dmask' [ 330.491713][T10810] loop2: detected capacity change from 0 to 264192 09:05:10 executing program 1: pselect6(0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000300), &(0x7f0000000380)={&(0x7f0000000340)={[0x7fffffff]}, 0x8}) 09:05:10 executing program 3: syz_io_uring_setup(0x4992, &(0x7f0000000180), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_io_uring_setup(0x804, &(0x7f0000000000), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x0, 0x0) 09:05:10 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@errors_continue}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}, {@dont_appraise}]}) 09:05:10 executing program 3: pselect6(0x40, &(0x7f00000004c0), &(0x7f0000000500)={0x6}, 0x0, 0x0, 0x0) [ 330.627552][T10810] loop2: detected capacity change from 0 to 264192 [ 330.660650][T10831] exfat: Unknown parameter 'euid>00000000000000060928' 09:05:10 executing program 3: clock_gettime(0x0, &(0x7f0000000240)={0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={r0}, 0x0) 09:05:10 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x6c, 0x0, &(0x7f0000000300)) 09:05:10 executing program 1: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:05:10 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@errors_continue}], [{@euid_gt={'euid>', 0xee00}}, {@appraise_type}]}) 09:05:11 executing program 1: syz_mount_image$exfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='errors=continue']) 09:05:11 executing program 2: syz_io_uring_setup(0xd9, &(0x7f0000000000)={0x0, 0x7a79, 0x3d}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) [ 330.891800][T10846] exfat: Unknown parameter 'euid>00000000000000060928' 09:05:11 executing program 2: ioperm(0x0, 0xf3, 0x8) [ 331.003005][T10852] exFAT-fs (loop1): invalid boot record signature 09:05:11 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@errors_continue}], [{@euid_gt={'euid>', 0xee00}}]}) [ 331.030301][T10852] exFAT-fs (loop1): failed to read boot sector 09:05:11 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x5423) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) [ 331.054036][T10852] exFAT-fs (loop1): failed to recognize exfat type [ 331.071329][T10859] exfat: Unknown parameter 'euid>00000000000000060928' 09:05:11 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x79, 0x11, 0x30}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 331.135875][T10852] exFAT-fs (loop1): invalid boot record signature [ 331.146332][T10852] exFAT-fs (loop1): failed to read boot sector [ 331.154907][T10852] exFAT-fs (loop1): failed to recognize exfat type 09:05:11 executing program 0: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000540)={[{@errors_continue}]}) 09:05:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x541b, &(0x7f0000000180)={0x0, @in={0x2, 0x0, @local}, @l2tp, @sco}) 09:05:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x68, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x52}, @val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x6}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x5}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x6}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'ip6erspan0\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x10008004}, 0x4000) 09:05:12 executing program 1: madvise(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0) [ 331.875906][T10880] exFAT-fs (loop0): invalid boot record signature [ 331.916242][T10880] exFAT-fs (loop0): failed to read boot sector [ 331.925591][T10880] exFAT-fs (loop0): failed to recognize exfat type 09:05:12 executing program 1: io_uring_setup(0x22ed, &(0x7f0000001900)={0x0, 0x0, 0x2, 0x0, 0x1df}) 09:05:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x68, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x52}, @val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x6}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x5}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x6}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'ip6erspan0\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x10008004}, 0x4000) 09:05:12 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x401c5820, &(0x7f0000001800)={'veth0_virt_wifi\x00', @ifru_mtu}) 09:05:12 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8904, 0x0) 09:05:12 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3991f9c24aa56f15199fad0093c59d66b5ece0200c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c29184ff7f0000cef809606056fe5c34664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48b45ef4adf634be763289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd0224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffaa6b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5acd3de3a83209da17a0faf60fd6ad9b97aa5fa684803660000000000000003926b81e3b59c9b081d6a0899431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa499d7b82ea4f4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a8488273d82ea9c34a1ccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b6c4a000000002b435ac15fc0288d9b2a169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be03f8a6ef2cd317902f19e385be9e48dc003913653282830689da6b53b263339863297771429d120000003341bf4a00fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94e6932c1b0317bc0cfd3467decb05cfd9fcb32c8ed1dbd9d10a64c108285e71b5565b1768ee58969c41595229df17bcad65fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4b6ab7929a57affe7d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ecbbc55bf404e4e1f74b7eed82571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7df8be5877050a81301bb997316dbf17866fb84d4173731efe895ffecd05560926e9038b2444302d3e959efc71f665c4d75cf2458e3542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad0557baf403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f4df90400000000000063ab6b047600d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3734cffe86e66964ae09bb6d163118e4cbe024fd452277c3887d6116c6cc9d8046c216c1f895778cb25122a2a998de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bdea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1513a8250df98674152f94e32409e2a3bce109b60000000000000000d6d5210d7560eb92d6a97a276098ccf76386f1535bef1497f92186086e29c6bc5a1f9f59d4f21137abf9a404abde7750898b1bd627e87306703be8672d70d1ab5b075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30235b928a31d2eca55f74a23641f61f2d5b308cf0d031b056237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854356cb4906000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d493be19f810049209b085f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c4ff000000745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba891cea599b079b4b4ba686fcdf240430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254a83186c1526af6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b70ebc660309e1e245b0fdf9743af930cd6db49a47613808bad959719c0010000000378a921c7f7f8433c2e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1e40b0c1fb2d4b205aa00b6d713acebc5b014e61a543a5a194f9ac1cd76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f9360984b5c2d4523497e4d64f95f084ff6467f6f87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e49acaf766218b54a9d624778e1c4cba6e6390a9f302c6eb2df7766411bef0efecb0f477db103463af2847e6ade5b9e065ec0d0ba58fedae5f08818fca475b169469f9efd131925d98c34b3cb26fe26796dd43b87e1cd2a39f5cf21d2e80a64ac97e71cafc29bfb78db090dd12225efeda2e93bf7f6ba7865e9c375a780929dfa5a210bf5858e2a4ff8e8d1e8c9cceed07c6312b734c72510d335acc94f76e7078ce4066f1e0ac9429f8013683301277a11e25b248b61180cb6207a0e26757f3f1bfc6c080000001fb74afb17f3b5239bc2243853d5234afb05ed6024e94dee34666c5b5522b54cb433efa54b4e9022533e6a4598b453c9e549847c89bdee957dfa9ded9f16fdcd1b681e4c72f32fa3334313e334cc140daec7dcb22f463457a1a5ac230bbded8625832a2b6dbf837704aa89a7543208debe71d934cedaf85f1bf43f23baa076b051342ab9651cc11d9b8b7e68e931ca4795a720797959d07a0fd82c77020c0a2b1924bc8dca0c4ca73f4e8ca2de4a1689b1717d9d008131206bb60c09ffbd2b5bdb327f45a583073d0e2045ab7b9dacefd8921f9078fcc568aa1f9c419115c2042f506b50aef369859f67fe4044a6943d7c2b028146743512d95f76bdbf5d5dabd3e8b9f9729caf7f85c826842fea43486e2bead66fdded6184965168ada42a2ed63f484f677dd4dd00b3a39010aa9baddee202b1ea070e44b59d396a3a280379bec2d22cda1f4d3fd6768326578dad0e36b505c117ee65ab8f4dab871a0f19da9cf1cf2e4606c1d1761d6709e05483f2632dc94c7d0d5a64529bd8244f7849f559d31723263828419495ccd94a0e7f4d7393f0fcdc2b208665eba3ff4576b7a630c49c0c4490dd1ad354a5330a68b559ffa9ba4a2aeaefbbf2670d4b42246bd2cd088abca23528c19ca0310000000000000000000000000000000000000000000000b7548ab4acda49b43cba2f5a00297571804d1ba60dccc123f9299cd805a86ba037d83ed22f1a3fd2c1dd6f5611a2bfd4e8d6ab0ced838dbf3c116ee881988bc7f346def734d39d027e274918567d0e3459b067ec94dab1dd846353c7e2e8a8671ee124b389d3e3d8230b2e586f3cbb480000000000000000000000000000695f2305ac82faab3ab89aa1a6ca88a5e4bfa1f66dde9926d9fadd27b13fce909bd25a815b7fe6d52df39a9fac5ea8aa4a07f142e04b6e63d88b26061266fe98fbe1d95c836bb436e3ac8f8a051571d712afe4b11351e9f807a14e30758be72b5dd3414b5a8835a2b6127696e1b88c949d797a4d74abdc692f418109e6016dbf9d071bdd5671a819c1f07689ed9488bb030fdbc5b135a291bf2308a9bca01d94407fff2abfcc420fdf68c301fd2916afef9e1ebe197ea39ee61d1fd3e69091c1e678c73a5b821c71e4a8a3160a4e213cb4cca9de89b2f88c6ca4ce9e73e4bfba317e78acb1fb8d03f11caa1e46801c6388e22a8b1672e943754e8ba5b7947ea662d376fef4f7fe11dc0a8f5fe04c94f0ef4a0c2a7cdb50c0856551ed0a595257d5d8b21167fb1e099a952c0b84c0fc21b6f1542fe26ea726b900000000000000000000003a5be11e8f3e74417b17e6bd56838c99a542131300cff4865d917d7a710ce17ed255f84e3626c834d2a2e57d6f5d2542abb47999579ee2f1fb35fd62fd26854ecfaea44e53ea66c2ad3d1baf7f7561d6b444780872b0e92fcabc46afb5ed3824fe909d4a747a86741770c527d8e3e0e7308c2214decef3250ad1dae3870b946ab6403a5b1901749c8569ce8f38fb5583238439edc734e801674c4ad54cd461220f86b19c3742599ae8f617c196f9ec21b3126834f760698ce542d512d02728291638fb574a141c38de9c84ed9d997e6c3ad9ce5d54a8ce14a733b2710477c96a88782d50ea208fdec71d7b11fa1222dab559bc4833be1620af245f561f6108cfdebb3e04bc7a97da138b93b5d007773780122b5c30fe357c83611bc620c14f3ceed92e0ff912876fb8bbf4f318c60ce9d5c9b184f852d18584d042baa4a6adf5f31f65688d4444415016f7be6278c87902c6579338458ab364156718a783d9df9741f046b71cbea178316558cd2f84b298aadb3da89b0ebd4a31fd548da448be21dea5cdbb54754357beb0083eb62b6fe8af377fad76635e66b1f82b878b56804d6f0af1fd85e3a19f8fd0a99f2d2ae223fde7af5f4c9bdb73f1cd029136b49c84e7d826deb7edba2d6af0d24f8d96e92b98f265b9b03406b0692215530debcde6052b9bfcec8098b3e83400af98b5af196c82b1e196c2833ed46ccc75d816ec1f307c96a6d79b180266e2cb370d250b0be1d71a7b2c15572bd7bfc3edb39f6fbae42f85f80a0ef857a1108c7a9030deb16ed40b574028223e778ff28dc64a"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r1}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) connect$inet(r2, &(0x7f0000002840)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 09:05:12 executing program 0: io_uring_setup(0xfffffffc, &(0x7f0000000800)) 09:05:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r2 = socket(0x15, 0x5, 0x0) getsockopt(r2, 0x200000000114, 0x271f, 0x0, &(0x7f00000001c0)) 09:05:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="020100030c000000000000000000000005000600000000000a00000000000000ff0100000000000000000000000000010000000000000000050005"], 0x60}}, 0x0) 09:05:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r2 = socket(0x15, 0x5, 0x0) getsockopt(r2, 0x200000000114, 0x271c, 0x0, &(0x7f00000001c0)) 09:05:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r2 = socket(0x15, 0x5, 0x0) getsockopt(r2, 0x200000000114, 0x2716, 0x0, &(0x7f00000001c0)) 09:05:12 executing program 3: pipe(&(0x7f00000003c0)) bpf$ITER_CREATE(0x21, &(0x7f0000000340), 0xec) 09:05:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r2 = socket(0x15, 0x5, 0x0) getsockopt(r2, 0x200000000114, 0x8, 0x0, &(0x7f00000001c0)) 09:05:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r2 = socket(0x15, 0x5, 0x0) getsockopt(r2, 0x200000000114, 0x271c, 0x0, &(0x7f00000001c0)) 09:05:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec3, 0x0) readv(r2, &(0x7f0000000580)=[{&(0x7f0000000200)=""/105, 0x69}], 0x1) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000280)='\n', 0x1}], 0x1) 09:05:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r2 = socket(0x15, 0x5, 0x0) getsockopt(r2, 0x200000000114, 0x271d, 0x0, &(0x7f00000001c0)) 09:05:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000049c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[{0x10, 0x0, 0x0, 'M'}], 0x10}}], 0x1, 0x0) 09:05:13 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 09:05:13 executing program 2: mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x812008, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x4900, 0x10) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000140)=0x1) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), r1) open$dir(&(0x7f0000000780)='./file0\x00', 0x8027e, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fstat(r1, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r2]) 09:05:13 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x20000009}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x102440, 0x0) fcntl$setlease(r2, 0x400, 0x0) [ 333.002849][ C2] hrtimer: interrupt took 33050 ns 09:05:15 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000000840)=[{&(0x7f0000000180)="98", 0x1}, {&(0x7f0000000400)='=', 0x1, 0x8000000000000}], 0x0, 0x0) 09:05:15 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000049c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[{0x10, 0x0, 0x0, 'M'}], 0x10}}], 0x1, 0x0) [ 335.466787][ T49] audit: type=1800 audit(1622797515.640:9): pid=10945 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=13947 res=0 errno=0 [ 335.503704][T10952] loop3: detected capacity change from 0 to 272 [ 335.545105][ T49] audit: type=1804 audit(1622797515.720:10): pid=10954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/syzkaller-testdir109921936/syzkaller.zcvDPY/94/file0" dev="sda1" ino=13947 res=1 errno=0 [ 335.642401][T10958] loop0: detected capacity change from 0 to 32768 09:05:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='cubic\x00', 0x6) 09:05:15 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:15 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) [ 335.739931][T10963] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 09:05:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000049c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[{0x10, 0x0, 0x0, 'M'}], 0x10}}], 0x1, 0x0) 09:05:15 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 09:05:15 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) [ 335.839898][T10974] loop3: detected capacity change from 0 to 272 09:05:16 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_MPATH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001700000008"], 0x28}}, 0x0) 09:05:16 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) [ 335.986995][T10982] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 336.007581][T10985] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 09:05:16 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000049c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[{0x10, 0x0, 0x0, 'M'}], 0x10}}], 0x1, 0x0) 09:05:16 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) [ 336.116741][T10991] loop3: detected capacity change from 0 to 272 09:05:16 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) 09:05:16 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:16 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:16 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x87) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@mcast1}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) 09:05:16 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:16 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) [ 336.294558][T11003] loop3: detected capacity change from 0 to 272 09:05:16 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:16 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:16 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 336.495667][T11023] loop3: detected capacity change from 0 to 272 09:05:16 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:16 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:16 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:16 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:16 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) [ 336.719917][T11037] loop3: detected capacity change from 0 to 272 09:05:16 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:17 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:17 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 336.946505][T11049] loop3: detected capacity change from 0 to 272 09:05:17 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:17 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 09:05:17 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:17 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) [ 337.237927][T11067] loop3: detected capacity change from 0 to 272 09:05:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:17 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 09:05:17 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:17 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:17 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:17 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 09:05:17 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) [ 337.537413][T11083] loop3: detected capacity change from 0 to 272 09:05:17 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:17 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:17 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:18 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 337.850025][T11102] loop3: detected capacity change from 0 to 272 09:05:18 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:18 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:18 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:18 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:18 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:18 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:18 executing program 1: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) [ 338.039621][T11121] loop3: detected capacity change from 0 to 272 09:05:18 executing program 1: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 09:05:18 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:18 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:18 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:18 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) [ 338.522427][T11138] loop3: detected capacity change from 0 to 272 09:05:18 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:18 executing program 1: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 09:05:18 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:18 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) [ 338.706609][T11149] loop3: detected capacity change from 0 to 272 09:05:18 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:18 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:19 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:19 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) [ 338.872887][T11162] loop3: detected capacity change from 0 to 272 09:05:19 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:19 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:19 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:19 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) [ 339.136941][T11181] loop3: detected capacity change from 0 to 272 09:05:19 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:19 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:19 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:19 executing program 3: chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:19 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:19 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:19 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:19 executing program 3: chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:19 executing program 0: mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r0 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 09:05:19 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:19 executing program 0: mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r0 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 09:05:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:20 executing program 0: mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r0 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 09:05:20 executing program 3: chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:20 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:20 executing program 0: r0 = open(0x0, 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:20 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:20 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:20 executing program 0: r0 = open(0x0, 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:20 executing program 3: syz_mount_image$minix(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:20 executing program 0: r0 = open(0x0, 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:20 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) [ 340.172364][T11244] loop3: detected capacity change from 0 to 272 09:05:20 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:20 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:20 executing program 3: syz_mount_image$minix(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:20 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:20 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:20 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 340.604123][T11259] loop3: detected capacity change from 0 to 272 09:05:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:21 executing program 3: syz_mount_image$minix(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:21 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:21 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) [ 340.901428][T11274] loop3: detected capacity change from 0 to 272 09:05:21 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:21 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:21 executing program 3: syz_mount_image$minix(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:21 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) [ 341.204440][T11288] loop3: detected capacity change from 0 to 272 09:05:21 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:21 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:21 executing program 3: syz_mount_image$minix(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) [ 341.430423][T11304] loop3: detected capacity change from 0 to 272 09:05:21 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:21 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:22 executing program 3: syz_mount_image$minix(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:22 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:22 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 341.889814][T11321] loop3: detected capacity change from 0 to 272 09:05:22 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:22 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:22 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:22 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:22 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:22 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:22 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:22 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:22 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:22 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) [ 342.563646][T11363] loop3: detected capacity change from 0 to 8 [ 342.605139][T11363] Unable to read inode block [ 342.641721][T11363] MINIX-fs: get root inode failed 09:05:22 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:22 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:23 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:23 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) [ 342.915469][T11376] loop3: detected capacity change from 0 to 8 09:05:23 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) [ 342.995560][T11376] Unable to read inode block [ 343.055683][T11376] MINIX-fs: get root inode failed 09:05:23 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:23 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:23 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) [ 343.438570][T11392] loop3: detected capacity change from 0 to 8 [ 343.448808][T11392] Unable to read inode block [ 343.454345][T11392] MINIX-fs: get root inode failed 09:05:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:23 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:23 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:23 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:24 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:24 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:24 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 343.836797][T11408] loop3: detected capacity change from 0 to 8 [ 343.853658][T11408] Unable to read inode block [ 343.877145][T11408] MINIX-fs: get root inode failed 09:05:24 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:24 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:24 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:24 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:24 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:24 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) [ 344.453593][T11424] loop3: detected capacity change from 0 to 8 [ 344.467941][T11424] Unable to read inode block [ 344.484579][T11424] MINIX-fs: get root inode failed 09:05:24 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:24 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:24 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) [ 344.754834][T11439] loop3: detected capacity change from 0 to 8 [ 344.797497][T11439] Unable to read inode block [ 344.812959][T11439] MINIX-fs: get root inode failed 09:05:25 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:25 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:25 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:25 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:25 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) [ 345.086705][T11455] loop3: detected capacity change from 0 to 272 [ 345.117210][T11455] MINIX-fs: deleted inode referenced: 1 [ 345.124117][T11455] MINIX-fs: get root inode failed 09:05:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:25 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:25 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:25 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) [ 345.356868][T11472] loop3: detected capacity change from 0 to 272 [ 345.389886][T11472] MINIX-fs: deleted inode referenced: 1 [ 345.400683][T11472] MINIX-fs: get root inode failed 09:05:25 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:25 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:25 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) [ 345.612965][T11485] loop3: detected capacity change from 0 to 272 [ 345.640685][T11485] MINIX-fs: deleted inode referenced: 1 [ 345.650291][T11485] MINIX-fs: get root inode failed 09:05:25 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:25 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:25 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:25 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, 0x0, 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:25 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {0x0, 0x0, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:25 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) [ 345.807101][T11501] loop3: detected capacity change from 0 to 272 [ 345.818304][T11501] MINIX-fs: deleted inode referenced: 1 [ 345.825316][T11501] MINIX-fs: get root inode failed 09:05:26 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, 0x0, 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:26 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:26 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {0x0, 0x0, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:26 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, 0x0, 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:26 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) [ 346.245962][T11517] loop3: detected capacity change from 0 to 272 [ 346.332383][T11517] MINIX-fs: deleted inode referenced: 1 [ 346.350622][T11517] MINIX-fs: get root inode failed 09:05:26 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:26 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:26 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:26 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:26 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {0x0, 0x0, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:26 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) [ 346.643470][T11537] loop3: detected capacity change from 0 to 272 09:05:26 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) [ 346.677902][T11537] MINIX-fs: deleted inode referenced: 1 [ 346.688321][T11537] MINIX-fs: get root inode failed 09:05:26 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00), 0x0, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:27 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) [ 346.845672][T11545] loop3: detected capacity change from 0 to 272 09:05:27 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) [ 346.952866][T11545] MINIX-fs: deleted inode referenced: 1 [ 346.966613][T11545] MINIX-fs: get root inode failed 09:05:27 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:27 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:05:27 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:27 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:27 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:27 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00), 0x0, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) [ 347.173535][T11566] loop3: detected capacity change from 0 to 272 09:05:27 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:27 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) [ 347.214561][T11566] MINIX-fs: deleted inode referenced: 1 [ 347.257899][T11566] MINIX-fs: get root inode failed 09:05:27 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 09:05:27 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:27 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00), 0x0, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:27 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c461"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) [ 347.490790][T11581] loop3: detected capacity change from 0 to 272 [ 347.529680][T11581] MINIX-fs: deleted inode referenced: 1 [ 347.537724][T11581] MINIX-fs: get root inode failed 09:05:27 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:27 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 09:05:27 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c461"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:27 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 09:05:27 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3c2, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) [ 347.764612][T11599] loop3: detected capacity change from 0 to 272 09:05:27 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c461"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:28 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) [ 347.822374][T11599] MINIX-fs: deleted inode referenced: 1 09:05:28 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, 0x0, 0x0, 0x0) [ 347.860076][T11599] MINIX-fs: get root inode failed 09:05:28 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:28 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3c2, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:28 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:28 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, 0x0, 0x0, 0x0) [ 348.226354][T11616] loop3: detected capacity change from 0 to 272 [ 348.283063][T11616] MINIX-fs: deleted inode referenced: 1 [ 348.295382][T11616] MINIX-fs: get root inode failed 09:05:28 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, 0x0, 0x0, 0x0) 09:05:28 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:28 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:28 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3c2, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:28 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) [ 348.698314][ T3380] ieee802154 phy0 wpan0: encryption failed: -22 09:05:28 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) [ 348.709280][ T3380] ieee802154 phy1 wpan1: encryption failed: -22 [ 348.731116][T11631] loop3: detected capacity change from 0 to 272 [ 348.775191][T11631] MINIX-fs: deleted inode referenced: 1 [ 348.803627][T11631] MINIX-fs: get root inode failed 09:05:29 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:29 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x5a3, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:29 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) [ 349.117746][T11646] loop3: detected capacity change from 0 to 272 [ 349.163094][T11646] MINIX-fs: deleted inode referenced: 1 09:05:29 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:29 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) [ 349.192185][T11646] MINIX-fs: get root inode failed 09:05:29 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) [ 349.244169][T11655] loop1: detected capacity change from 0 to 264192 09:05:29 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:29 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 09:05:29 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x5a3, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) [ 349.432250][ T49] audit: type=1804 audit(1622797529.610:11): pid=11655 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir556745803/syzkaller.hAXk7M/140/file1/bus" dev="loop1" ino=3 res=1 errno=0 [ 349.447742][T11667] loop3: detected capacity change from 0 to 272 [ 349.487265][T11667] MINIX-fs: deleted inode referenced: 1 [ 349.494493][T11667] MINIX-fs: get root inode failed [ 349.597045][ T49] audit: type=1804 audit(1622797529.780:12): pid=11655 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir556745803/syzkaller.hAXk7M/140/file1/bus" dev="loop1" ino=3 res=1 errno=0 09:05:29 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x0) 09:05:30 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:30 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0xb, &(0x7f0000004f80)={0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, &(0x7f0000001700)=0x84) 09:05:30 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x5a3, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) [ 349.966779][T11681] loop3: detected capacity change from 0 to 272 [ 350.034270][T11681] MINIX-fs: deleted inode referenced: 1 [ 350.059695][T11681] MINIX-fs: get root inode failed 09:05:30 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x0) 09:05:30 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:30 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0xb, &(0x7f0000004f80)={0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, &(0x7f0000001700)=0x84) 09:05:30 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0xb, &(0x7f0000004f80)={0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, &(0x7f0000001700)=0x84) 09:05:30 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x693, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:30 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:30 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) r1 = memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x0) [ 350.535180][T11698] loop3: detected capacity change from 0 to 272 [ 350.552487][T11698] MINIX-fs: deleted inode referenced: 1 [ 350.574757][T11698] MINIX-fs: get root inode failed 09:05:30 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0xb, &(0x7f0000004f80)={0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, &(0x7f0000001700)=0x84) 09:05:30 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:30 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 09:05:31 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x693, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:31 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0xb, &(0x7f0000004f80)={0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, &(0x7f0000001700)=0x84) 09:05:31 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) [ 350.891455][T11716] loop3: detected capacity change from 0 to 272 [ 350.934595][T11716] MINIX-fs: deleted inode referenced: 1 [ 350.947947][T11716] MINIX-fs: get root inode failed 09:05:31 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x149842, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4611b72"], 0x5) memfd_create(&(0x7f0000000140)='#\xa3\x8dnod6Q\xcc\x8d\xdag\xd3\xec#\xca\xd2\xfezW', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 09:05:31 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:31 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x693, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:31 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0xb, &(0x7f0000004f80)={0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, &(0x7f0000001700)=0x84) 09:05:31 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) [ 351.243471][T11731] loop3: detected capacity change from 0 to 272 [ 351.272503][T11731] MINIX-fs: deleted inode referenced: 1 [ 351.281954][T11731] MINIX-fs: get root inode failed 09:05:31 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0xb, &(0x7f0000004f80)={0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, &(0x7f0000001700)=0x84) 09:05:31 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:31 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0xb, &(0x7f0000004f80)={0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, &(0x7f0000001700)=0x84) 09:05:31 executing program 0: prlimit64(0x0, 0x6, &(0x7f0000000180), 0x0) r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 09:05:31 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x70b, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) [ 351.553083][T11750] loop3: detected capacity change from 0 to 272 [ 351.607755][T11750] MINIX-fs: deleted inode referenced: 1 [ 351.616533][T11750] MINIX-fs: get root inode failed [ 351.634514][T11749] ------------[ cut here ]------------ [ 351.649234][T11749] WARNING: CPU: 1 PID: 11749 at fs/io-wq.c:244 io_wqe_enqueue+0x7f6/0x910 [ 351.675261][T11749] Modules linked in: [ 351.720021][T11749] CPU: 1 PID: 11749 Comm: syz-executor.0 Not tainted 5.13.0-rc4-syzkaller #0 [ 351.776255][T11749] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 351.791723][T11749] RIP: 0010:io_wqe_enqueue+0x7f6/0x910 [ 351.799977][T11749] Code: ef e8 3e a3 d8 ff e9 2d f9 ff ff 4c 89 ef e8 31 a3 d8 ff e9 53 f9 ff ff 48 89 ef e8 24 a3 d8 ff e9 9f fa ff ff e8 aa 1a 94 ff <0f> 0b e9 08 fb ff ff 48 8b 7c 24 08 e8 19 a3 d8 ff e9 ca fd ff ff [ 351.836355][T11749] RSP: 0018:ffffc90000e3fc78 EFLAGS: 00010212 [ 351.849991][T11749] RAX: 0000000000003811 RBX: 0000000000000001 RCX: ffffc90001639000 [ 351.862939][T11749] RDX: 0000000000040000 RSI: ffffffff81dff6b6 RDI: 0000000000000003 09:05:32 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c00e900305ca260495bb66d7b00469f410000000000000001ff0001"], 0x6c}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="9a50", 0x2, 0x1, &(0x7f0000000080)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000008c0)=0x22) 09:05:32 executing program 3: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x70b, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 09:05:32 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0xb, &(0x7f0000004f80)={0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, &(0x7f0000001700)=0x84) [ 351.887145][T11749] RBP: ffff88801494a810 R08: 0000000000000000 R09: ffff88801494a8a3 [ 351.929594][T11749] R10: ffffffff81dff1bc R11: 0000000000000002 R12: ffff88801494a800 [ 351.947921][T11749] R13: ffff88801494a898 R14: ffff88801494a8e8 R15: 0000000000000000 [ 351.964764][T11749] FS: 00007fe134468700(0000) GS:ffff88802cb00000(0000) knlGS:0000000000000000 [ 351.985890][T11749] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 352.018900][T11749] CR2: 000000000040c0e0 CR3: 0000000072963000 CR4: 0000000000150ee0 [ 352.033142][T11749] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 352.043404][T11749] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 352.052587][T11749] Call Trace: [ 352.060810][T11749] io_queue_async_work+0x2d0/0x5f0 [ 352.065114][T11761] loop3: detected capacity change from 0 to 272 [ 352.070305][T11749] __io_queue_sqe+0x806/0x10f0 [ 352.083852][T11749] ? io_issue_sqe+0x66b0/0x66b0 [ 352.095964][T11749] ? lock_downgrade+0x6e0/0x6e0 [ 352.103118][T11749] __io_req_task_submit+0x103/0x120 [ 352.110393][T11749] io_async_task_func+0x23e/0x4c0 [ 352.117329][T11761] MINIX-fs: deleted inode referenced: 1 [ 352.117316][T11749] tctx_task_work+0x24e/0x550 [ 352.117352][T11749] task_work_run+0xdd/0x1a0 [ 352.125584][T11761] MINIX-fs: get root inode failed [ 352.132038][T11749] exit_to_user_mode_prepare+0x24a/0x280 [ 352.153221][T11749] syscall_exit_to_user_mode+0x19/0x60 [ 352.162365][T11749] do_syscall_64+0x47/0xb0 [ 352.171709][T11749] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 352.180107][T11749] RIP: 0033:0x4665d9 [ 352.188516][T11749] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 352.221900][T11749] RSP: 002b:00007fe134468188 EFLAGS: 00000246 ORIG_RAX: 0000000000000030 [ 352.235065][T11749] RAX: 0000000000000000 RBX: 000000000056bf80 RCX: 00000000004665d9 [ 352.244510][T11749] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000004 [ 352.253981][T11749] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 352.266485][T11749] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 352.282353][T11749] R13: 00007ffe2f2a5b4f R14: 00007fe134468300 R15: 0000000000022000 [ 352.295938][T11749] Kernel panic - not syncing: panic_on_warn set ... [ 352.303801][T11749] CPU: 1 PID: 11749 Comm: syz-executor.0 Not tainted 5.13.0-rc4-syzkaller #0 [ 352.317625][T11749] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 352.330912][T11749] Call Trace: [ 352.334617][T11749] dump_stack+0x141/0x1d7 [ 352.340530][T11749] panic+0x306/0x73d [ 352.345658][T11749] ? __warn_printk+0xf3/0xf3 [ 352.351022][T11749] ? __warn.cold+0x1a/0x44 [ 352.355971][T11749] ? io_wqe_enqueue+0x7f6/0x910 [ 352.362218][T11749] __warn.cold+0x35/0x44 [ 352.368205][T11749] ? io_wqe_enqueue+0x7f6/0x910 [ 352.375191][T11749] report_bug+0x1bd/0x210 [ 352.380294][T11749] handle_bug+0x3c/0x60 [ 352.385207][T11749] exc_invalid_op+0x14/0x40 [ 352.391385][T11749] asm_exc_invalid_op+0x12/0x20 [ 352.399602][T11749] RIP: 0010:io_wqe_enqueue+0x7f6/0x910 09:05:32 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0xb, &(0x7f0000004f80)={0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, &(0x7f0000001700)=0x84) [ 352.407857][T11749] Code: ef e8 3e a3 d8 ff e9 2d f9 ff ff 4c 89 ef e8 31 a3 d8 ff e9 53 f9 ff ff 48 89 ef e8 24 a3 d8 ff e9 9f fa ff ff e8 aa 1a 94 ff <0f> 0b e9 08 fb ff ff 48 8b 7c 24 08 e8 19 a3 d8 ff e9 ca fd ff ff [ 352.434295][T11749] RSP: 0018:ffffc90000e3fc78 EFLAGS: 00010212 [ 352.440966][T11749] RAX: 0000000000003811 RBX: 0000000000000001 RCX: ffffc90001639000 [ 352.451732][T11749] RDX: 0000000000040000 RSI: ffffffff81dff6b6 RDI: 0000000000000003 [ 352.463798][T11749] RBP: ffff88801494a810 R08: 0000000000000000 R09: ffff88801494a8a3 [ 352.477072][T11749] R10: ffffffff81dff1bc R11: 0000000000000002 R12: ffff88801494a800 [ 352.488403][T11749] R13: ffff88801494a898 R14: ffff88801494a8e8 R15: 0000000000000000 [ 352.500868][T11749] ? io_wqe_enqueue+0x2fc/0x910 [ 352.507531][T11749] ? io_wqe_enqueue+0x7f6/0x910 [ 352.514878][T11749] ? io_wqe_enqueue+0x7f6/0x910 [ 352.521720][T11749] io_queue_async_work+0x2d0/0x5f0 [ 352.526886][T11749] __io_queue_sqe+0x806/0x10f0 [ 352.531664][T11749] ? io_issue_sqe+0x66b0/0x66b0 [ 352.536956][T11749] ? lock_downgrade+0x6e0/0x6e0 [ 352.542964][T11749] __io_req_task_submit+0x103/0x120 [ 352.550068][T11749] io_async_task_func+0x23e/0x4c0 [ 352.558624][T11749] tctx_task_work+0x24e/0x550 [ 352.565303][T11749] task_work_run+0xdd/0x1a0 [ 352.572588][T11749] exit_to_user_mode_prepare+0x24a/0x280 [ 352.579905][T11749] syscall_exit_to_user_mode+0x19/0x60 [ 352.585841][T11749] do_syscall_64+0x47/0xb0 [ 352.592092][T11749] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 352.600357][T11749] RIP: 0033:0x4665d9 [ 352.605835][T11749] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 352.633832][T11749] RSP: 002b:00007fe134468188 EFLAGS: 00000246 ORIG_RAX: 0000000000000030 [ 352.644361][T11749] RAX: 0000000000000000 RBX: 000000000056bf80 RCX: 00000000004665d9 [ 352.653158][T11749] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000004 [ 352.662110][T11749] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 352.671341][T11749] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 352.682308][T11749] R13: 00007ffe2f2a5b4f R14: 00007fe134468300 R15: 0000000000022000 [ 352.694448][T11749] Kernel Offset: disabled [ 352.701138][T11749] Rebooting in 86400 seconds.. VM DIAGNOSIS: 09:05:32 Registers: info registers vcpu 0 RAX=0000000000000001 RBX=ffff888015946180 RCX=1ffffffff2046962 RDX=dffffc0000000000 RSI=ffffffff896b9e00 RDI=ffffffff89c262c0 RBP=ffff888015946180 RSP=ffffc900070a7468 R8 =0000000000000000 R9 =ffffffff9022c8b7 R10=0000000000000001 R11=0000000000000000 R12=0000000000000000 R13=0000000000000001 R14=ffffea000133d440 R15=ffff888026cb57a8 RIP=ffffffff8916b932 RFL=00000086 [--S--P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 0000000000000000 ffffffff 00c00000 GS =0000 ffff88802ca00000 ffffffff 00c00000 LDT=0000 0000000000000000 ffffffff 00c00000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f7197b1c718 CR3=000000000bc8e000 CR4=00150ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000005487a800000000005487a0 XMM02=ffffffffffffffffffffffffffffffff XMM03=ffffffffffffffffffffffffffffffff XMM04=fffffffffffffffffffffffffffffffe XMM05=ffffffffffffffffffffffffffffffff XMM06=ffffffffffffffffffffffffffffffff XMM07=00000000000000000000000000000000 XMM08=ffffffffffffffffffffffffffffffff XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000037 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff842ad4f1 RDI=ffffffff90a4b4a0 RBP=ffffffff90a4b460 RSP=ffffc90000e3f648 R8 =0000000000000000 R9 =0000000000000000 R10=ffffffff842ad4e2 R11=000000000000001f R12=0000000000000000 R13=0000000000000037 R14=ffffffff90a4b460 R15=dffffc0000000000 RIP=ffffffff842ad51a RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 00007fe134468700 ffffffff 00c00000 GS =0000 ffff88802cb00000 ffffffff 00c00000 LDT=0000 0000000000000000 00000000 00000000 TR =0040 fffffe000003e000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe000003c000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000000433440 CR3=0000000072963000 CR4=00150ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000bfe62e42fefa39ef XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 2 RAX=0000000000000010 RBX=ffff88801c580540 RCX=0000000000000004 RDX=ffff888025aac080 RSI=ffffffff84a027ed RDI=0000000000000003 RBP=ffff888014abf028 RSP=ffffc900011d7188 R8 =000000000000001f R9 =0000000000000000 R10=ffffffff84a027de R11=0000000000000000 R12=0000000000000004 R13=ffff88801c58059c R14=ffffc90000355100 R15=ffff88801c580548 RIP=ffffffff84a027fb RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 000000c00034c090 ffffffff 00c00000 GS =0000 ffff88802cc00000 ffffffff 00c00000 LDT=0000 0000000000000000 00000000 00000000 TR =0040 fffffe0000079000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000077000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000000aa5744 CR3=0000000046e64000 CR4=00150ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffffffffffffffffffffffffffff XMM01=ffffffffffffffffffffffffffffffff XMM02=ffffffffffffffffffffffffffffffff XMM03=ffffffffffffffffffffffffffffffff XMM04=ffffffffffffffffffffffffffffffff XMM05=ffffffffffffffffffffffffffffffff XMM06=ffffffffffffffffffffffffffffffff XMM07=000000000000000000e800a800000000 XMM08=2570756c6c25706f6f6c2f7665642f00 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 3 RAX=0000000000000001 RBX=0000000000000000 RCX=1ffff11002871d80 RDX=0000000000000001 RSI=dffffc0000000000 RDI=ffff88801438ec02 RBP=ffff88801438ec00 RSP=ffffc900005c8cc0 R8 =0000000000000001 R9 =ffff88801438ec03 R10=ffffed1002871d80 R11=0000000000000000 R12=0000000000004516 R13=ffffed1002871d80 R14=0000000000000001 R15=ffff88802cd36500 RIP=ffffffff815a183a RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 ffffffff 00c00000 DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 000000c00002ec90 ffffffff 00c00000 GS =0000 ffff88802cd00000 ffffffff 00c00000 LDT=0000 0000000000000000 00000000 00000000 TR =0040 fffffe00000b4000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe00000b2000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007faeccf7303c CR3=0000000046e64000 CR4=00150ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=652e29646e616d6d6f632a282e637069 XMM03=00000000000000000000000000000000 XMM04=30202c30783028343674696d696c7270 XMM05=2c3472202c307830202c307830202c39 XMM06=30303030663778302826202c30783020 XMM07=7830202c3078307b3d29303436303030 XMM08=690a29307830202c7d7d307830202c30 XMM09=3072287265746e655f676e6972755f6f XMM10=30202c307830202c653661327830202c XMM11=68730a29307830202c307830202c3078 XMM12=0a29317830202c3372286e776f647475 XMM13=666c65732f636f72702f273d29303030 XMM14=202c307830202c273030785c6578652f XMM15=202c3172287664616572700a29307830