0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = epoll_create1(0x80000) write(r1, &(0x7f0000000100)="a86c6e2e04ddc8aaef11ceda1cc86daf2741e8d909089a03f69ed17682f40e69a4f85b17017f7ec57edb018c0a5b09c5078174f77088e88ba7208c0b847f74e0db3cfd8f9ccf104e1f74fd0297d0ef25cbe43cdb00e7bbd3afb82ec4eee9467ff2e0704ed6818154b9de167871dd43cf5518596216e1da9cbbe80215774881eb9b5aee440b882666267655a9f7b376acbf1a19f1153df58954845f721521220fa54c6aabc008e4db3d33c90815033482241ba05eadfe0e50194010fbf7d73b9f9ec39ef0ff", 0xc5) epoll_pwait(r1, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) sendto(r0, &(0x7f0000000040)="ae", 0x1, 0x881, 0x0, 0x0) 06:03:01 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x0, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:03:01 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:03:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000003000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:03:01 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:03:01 executing program 2: socket$unix(0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01efb4f42cb664c95d3633dc0d9172ab06dfc35f828deec8afcf8ed"], 0x125) 06:03:01 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:03:01 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, 0x0) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:03:01 executing program 2: socket$unix(0x1, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01efb4f42cb664c95d3633dc0d9172ab06dfc35f828deec8afcf8ed"], 0x125) 06:03:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000006000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:03:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01efb4f42cb664c95d3633dc0d9172ab06dfc35f828deec8afcf8ed"], 0x125) 06:03:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000007000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:03:13 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140), 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:03:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = epoll_create1(0x80000) write(r1, &(0x7f0000000100)="a86c6e2e04ddc8aaef11ceda1cc86daf2741e8d909089a03f69ed17682f40e69a4f85b17017f7ec57edb018c0a5b09c5078174f77088e88ba7208c0b847f74e0db3cfd8f9ccf104e1f74fd0297d0ef25cbe43cdb00e7bbd3afb82ec4eee9467ff2e0704ed6818154b9de167871dd43cf5518596216e1da9cbbe80215774881eb9b5aee440b882666267655a9f7b376acbf1a19f1153df58954845f721521220fa54c6aabc008e4db3d33c90815033482241ba05eadfe0e50194010fbf7d73b9f9ec39ef0ff", 0xc5) epoll_pwait(r1, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) sendto(r0, &(0x7f0000000040)="ae", 0x1, 0x881, 0x0, 0x0) 06:03:13 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, 0x0) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:03:13 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:03:13 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01efb4f42cb664c95d3633dc0d9172ab06dfc35f828deec8afcf8ed"], 0x125) 06:03:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000000f000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:03:13 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:03:13 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x0, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:03:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000003f000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:03:25 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = epoll_create1(0x80000) write(r0, &(0x7f0000000100)="a86c6e2e04ddc8aaef11ceda1cc86daf2741e8d909089a03f69ed17682f40e69a4f85b17017f7ec57edb018c0a5b09c5078174f77088e88ba7208c0b847f74e0db3cfd8f9ccf104e1f74fd0297d0ef25cbe43cdb00e7bbd3afb82ec4eee9467ff2e0704ed6818154b9de167871dd43cf5518596216e1da9cbbe80215774881eb9b5aee440b882666267655a9f7b376acbf1a19f1153df58954845f721521220fa54c6aabc008e4db3d33c90815033482241ba05eadfe0e50194010fbf7d73b9f9ec39ef0ff", 0xc5) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:03:25 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:03:25 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01efb4f42cb664c95d3633dc0d9172ab06dfc35f828deec8afcf8ed"], 0x125) 06:03:25 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x0, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:03:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000040000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:03:25 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:03:25 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(0x0, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:03:25 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140), 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:03:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000fffe000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:03:25 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01efb4f42cb664c95d3633dc0d9172ab06dfc35f828deec8afcf8ed"], 0x125) 06:03:25 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01efb4f42cb664c95d3633dc0d9172ab06dfc35f828deec8afcf8ed"], 0x125) 06:03:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000003000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:03:37 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:03:37 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(0x0, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:03:37 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140), 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:03:37 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = epoll_create1(0x80000) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:03:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000006000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:03:37 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:03:37 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01efb4f42cb664c95d3633dc0d9172ab06dfc35f828deec8afcf8ed"], 0x125) 06:03:37 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x0, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:03:37 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01efb4f42cb664c95d3633dc0d9172ab06dfc35f828deec8afcf8ed"], 0x125) 06:03:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000007000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:03:37 executing program 2: syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01efb4f42cb664c95d3633dc0d9172ab06dfc35f828deec8afcf8ed"], 0x125) 06:03:37 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{0x0}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:03:37 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x0, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:03:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000000f000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:03:37 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) epoll_pwait(0xffffffffffffffff, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:03:37 executing program 2: syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01efb4f42cb664c95d3633dc0d9172ab06dfc35f828deec8afcf8ed"], 0x125) 06:03:37 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:03:37 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:03:38 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(0x0, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:03:38 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{0x0}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:03:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) epoll_pwait(0xffffffffffffffff, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:03:38 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x0, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:03:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000000fe000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:03:49 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r3, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r3, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r3, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:03:49 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, 0x0, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:03:49 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(0xffffffffffffffff, r4, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:03:49 executing program 2: syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01efb4f42cb664c95d3633dc0d9172ab06dfc35f828deec8afcf8ed"], 0x125) 06:03:49 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{0x0}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:03:49 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:03:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000000feff0019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:03:49 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) epoll_pwait(0xffffffffffffffff, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:03:49 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, 0x0, 0x125) 06:03:49 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x80000) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:03:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002020019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:04:01 executing program 1: r0 = epoll_create1(0x80000) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:04:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, 0x0, 0x125) 06:04:01 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r3, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r3, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r3, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:04:01 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(0xffffffffffffffff, r4, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:04:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002030019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:04:01 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:04:02 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, 0x0, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:04:02 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, 0x0, 0x0) 06:04:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002040019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:04:02 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, 0x0, 0x125) 06:04:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002050019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:04:02 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[], 0x125) 06:04:02 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[], 0x125) 06:04:02 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(0xffffffffffffffff, r4, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:04:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002060019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:04:02 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[], 0x125) 06:04:02 executing program 1: r0 = epoll_create1(0x80000) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:04:02 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r3, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r3, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r3, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:04:02 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, 0x0, 0x0) 06:04:02 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:04:02 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, 0x0, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:04:02 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x125) 06:04:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002070019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:04:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002080019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:04:02 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x125) 06:04:02 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0), 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:04:02 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x125) 06:04:02 executing program 1: r0 = epoll_create1(0x80000) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:04:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002180019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:04:14 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:04:14 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, 0xffffffffffffffff, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:04:14 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, 0x0, 0x0) 06:04:14 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:04:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000000021c0019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:04:14 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01e"], 0x125) 06:04:14 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x80000) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:04:14 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0), 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:04:14 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01e"], 0x125) 06:04:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000000021d0019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:04:14 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01e"], 0x125) 06:04:14 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, 0xffffffffffffffff, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:04:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002660019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:04:15 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0), 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:04:27 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, 0xffffffffffffffff, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:04:27 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:04:27 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:04:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002780019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:04:27 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x80000) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:04:27 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:04:27 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01efb4f42cb664c95d3633dc0d917"], 0x125) 06:04:27 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:04:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002f00019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:04:27 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01e"], 0x125) 06:04:27 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:04:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002fe0019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:04:27 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:04:27 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01e"], 0x125) 06:04:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000000024a0119000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:04:27 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:04:42 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x80000) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:04:42 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01e"], 0x125) 06:04:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000319000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:04:42 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:04:42 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:04:42 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, 0x0, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:04:42 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:04:42 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:04:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002800419000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:04:53 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, 0x0, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:04:53 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x80000) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:04:53 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:04:53 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01efb4f42cb664c95"], 0x125) 06:04:53 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:04:53 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780), 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:04:53 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:04:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000519000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:04:53 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01efb4f42cb664c95"], 0x125) 06:04:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000619000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:05:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000719000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:05:06 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:05:06 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780), 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:05:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x80000) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:05:06 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:06 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01efb4f42cb664c95"], 0x125) 06:05:06 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x0, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:06 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, 0x0, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:06 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01efb4f42cb664c95d3633d"], 0x125) 06:05:06 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01efb4f42cb664c95d3633d"], 0x125) 06:05:06 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x0, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002001819000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:05:06 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01efb4f42cb664c95d3633d"], 0x125) 06:05:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002001c19000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:05:06 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0), 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:06 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780), 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:05:07 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:07 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01efb4f42cb664c95d3633dc0d9"], 0x125) 06:05:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x80000) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:05:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002001d19000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:05:07 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:05:07 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01efb4f42cb664c95d3633dc0"], 0x125) 06:05:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002001f19000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:05:07 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x0, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:07 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:05:07 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0), 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:07 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01efb4f42cb664c95d3633d"], 0x125) 06:05:07 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:05:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x80000) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:05:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002002019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:05:07 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:05:20 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01efb4f42cb664c95d3633d"], 0x125) 06:05:20 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x80000) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:05:20 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:05:20 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:05:20 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, 0x0) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:20 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0), 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:20 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(0xffffffffffffffff, r4, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002003f19000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:05:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002014a19000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:05:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x80000) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:05:32 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000000000000000400bf003e0008026d1d59b13c9f39d01efb4f42cb664c95d3633d"], 0x125) 06:05:32 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:32 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:05:32 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(0xffffffffffffffff, r4, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002006619000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:05:32 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, 0x0) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:32 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:05:32 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x0, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:32 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x0) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:05:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002007819000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:05:43 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(0xffffffffffffffff, r4, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x80000) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:05:43 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:05:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002048019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:05:43 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, 0x0) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:43 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:43 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(0xffffffffffffffff, r4, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:43 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x0) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:05:43 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x0) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:05:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000000200f019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:05:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002fffe19000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:05:43 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, 0xffffffffffffffff, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:43 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(0xffffffffffffffff, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:43 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(0x0, 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:05:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:05:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002feff19000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:05:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002006619000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:05:43 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:43 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={0x0, 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:05:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000219000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:05:44 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, 0xffffffffffffffff, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:55 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, 0xffffffffffffffff, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:55 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={0x0, 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:05:55 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(0xffffffffffffffff, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:55 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(0x0, 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:05:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000319000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:05:55 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:05:55 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:05:55 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x0, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:05:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000419000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:05:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000519000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:05:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000619000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:05:55 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={0x0, 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:06:07 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:06:07 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:07 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x0, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:07 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(0x0, 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:06:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:06:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000719000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:06:07 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:07 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(0xffffffffffffffff, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002001819000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:06:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:06:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002001c19000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:06:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:06:07 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:06:07 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:06:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002001d19000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:06:07 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140), 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:07 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x0, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:07 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:19 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, 0x0, 0x0, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:06:19 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x0, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:19 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x0, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:19 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:06:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002006619000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:06:19 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x10000027f) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r3, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r3, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r3, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:19 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:19 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:06:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002007819000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:06:19 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, 0x0, 0x0, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:06:19 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x10000027f) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r3, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r3, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r3, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:19 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:31 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, 0x0, 0x0, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:06:31 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:06:31 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:06:31 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x10000027f) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r3, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r3, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r3, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:31 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000000200fe19000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:06:31 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x0, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:31 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x0, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:31 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x5, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:06:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000040000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:06:31 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:31 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000000200fffe000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:06:31 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:06:32 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:06:32 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000000020000fe000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:06:32 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:32 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x0, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}, {}], 0x4, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:06:32 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:06:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000000020000feff0000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:06:32 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:32 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:44 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}], 0x3, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:06:44 executing program 2: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f0000000000)={{r0}, {@void, @max}}) sendto(r1, &(0x7f0000000040)="ae", 0x1, 0x881, 0x0, 0x0) 06:06:44 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:06:44 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(0xffffffffffffffff, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000000020000feffffff800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:06:44 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:06:44 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:44 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:45 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:45 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000000020000190000007f0100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:06:45 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x0) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:45 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:45 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(0xffffffffffffffff, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:45 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:06:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019020000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:06:59 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(0xffffffffffffffff, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:59 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:06:59 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:59 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}], 0x3, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:06:59 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x0) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:59 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(0x0, 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019030000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:06:59 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:06:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019040000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:06:59 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:06:59 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x0) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:59 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, 0xffffffffffffffff, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:06:59 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:06:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019050000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:06:59 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}], 0x3, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:06:59 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(0x0, 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}], 0x3, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:07:12 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(0x0, 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:12 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(0x0, 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:12 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:07:12 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, 0xffffffffffffffff, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019060000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:07:12 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:07:12 executing program 2: syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:26 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:07:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019070000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:07:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}], 0x3, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:07:26 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:07:26 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(0x0, 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:26 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r3, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r3, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r3, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:26 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, 0xffffffffffffffff, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:26 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(0x0, 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019080000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:07:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019180000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:07:26 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:07:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000000020000191c0000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:07:26 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000000020000191d0000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:07:26 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}], 0x3, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:07:26 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, 0x0, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:07:26 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:26 executing program 2: syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:38 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019660000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:07:38 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, 0x0, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:07:38 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:07:38 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:38 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}], 0x2, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:07:38 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:07:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019780000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:07:38 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:38 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, 0x0, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:07:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019f00000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:07:38 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:07:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019fe0000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:07:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:07:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000000020000194a0100800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:07:38 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:38 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000300800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:07:38 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) syslog(0x1, 0x0, 0x0) tee(r3, 0xffffffffffffffff, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:38 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:07:38 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x0, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019800400800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:07:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x101, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:07:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x0, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:07:57 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x0, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:57 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:57 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000500800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:07:57 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:07:57 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:07:57 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:07:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x0, &(0x7f0000000000)={[0xfffffffffffffff8]}, 0x8) 06:07:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000600800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:08:10 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x0, 0x0, 0x0) 06:08:10 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:10 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:08:10 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x0, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000700800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:08:10 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:10 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:10 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:08:10 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:11 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:11 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x0, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019001800800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:08:11 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:08:11 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:08:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019001c00800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:08:22 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628d"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:08:22 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:22 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:22 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:22 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:22 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780), 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:08:22 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019001d00800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:08:22 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019001f00800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:08:23 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:23 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:35 executing program 1: syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:08:35 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780), 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:08:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019002000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:08:35 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:35 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628d"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:08:35 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:35 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:35 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:35 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019003f00800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:08:35 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019014a00800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:08:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019006600800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:08:35 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:08:35 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780), 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:08:35 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, 0x0, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:35 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) lseek(0xffffffffffffffff, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:35 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019007800800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:08:35 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:35 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628d"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:08:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019048000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:08:36 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:08:36 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(0x0, 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:36 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, 0x0, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000000200001900f000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:08:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019fffe00800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:08:50 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, 0x0, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:50 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:08:50 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:08:50 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed61"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:08:50 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(0x0, 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:50 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) lseek(0xffffffffffffffff, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:50 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, 0x0, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019feff00800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:08:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000200800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:08:50 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, 0x0, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000300800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:08:50 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(0x0, 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:50 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:50 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:08:50 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed61"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:09:03 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:03 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed61"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:09:03 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:09:03 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000400800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:09:03 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, 0x0, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:03 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:03 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) lseek(0xffffffffffffffff, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000500800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:09:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000600800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:09:03 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={0x0, 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:09:03 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:09:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000700800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:09:16 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) lseek(0xffffffffffffffff, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:16 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:16 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:09:16 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={0x0, 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:09:16 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:16 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000800800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:09:16 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:28 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:09:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019001800800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:09:28 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:09:28 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={0x0, 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:09:28 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780), 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:28 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:28 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:28 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019001c00800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:09:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019001d00800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:09:28 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e23"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:09:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019006600800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:09:28 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x0, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:28 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:28 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780), 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:28 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:09:28 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:09:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019007800800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:09:29 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000000200001900f000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:09:29 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e23"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:09:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000000200001900fe00800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:09:29 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:09:44 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:09:44 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780), 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:44 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:09:44 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e23"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:09:44 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x0, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019004a01800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:09:44 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:09:44 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780), 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000003800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:09:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019008004800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:09:56 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}}, 0x0) 06:09:56 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:56 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:09:56 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:56 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780), 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:56 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x0, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:56 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000005800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:09:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000006800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:09:56 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:56 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:09:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000007800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:09:56 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:56 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}}, 0x0) 06:09:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000018800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:09:56 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:56 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780), 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:57 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:09:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000000200001900001c800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:09:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000000200001900001d800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:10:10 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:10 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:10:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000000200001900001f800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:10:10 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:10 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:10 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:10 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:10:10 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}}, 0x0) 06:10:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000020800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:10:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000000200001900003f800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:10:10 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:10 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:10 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={0x0, 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000000200001900014a800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:10:21 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:21 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={0x0, 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:21 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:21 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:10:21 executing program 4: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:21 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:21 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:10:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000066800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:10:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000078800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:10:22 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:10:22 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(0xffffffffffffffff, r4, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:10:22 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={0x0, 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000480800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:10:22 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={0x0, 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:22 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:22 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, 0x0, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000000020000190000f0800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:10:22 executing program 4: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={0x0, 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000000200001900fffe800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:10:22 executing program 2: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:10:22 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={0x0, 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:22 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:10:22 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, 0x0, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:36 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:36 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:36 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, 0x0, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:36 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={0x0, 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:36 executing program 4: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:36 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7a"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:10:36 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) (fail_nth: 1) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:10:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000000200001900feff800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:10:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000000020000190000007f0100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) [ 2114.923369] FAULT_INJECTION: forcing a failure. [ 2114.923369] name failslab, interval 1, probability 0, space 0, times 0 [ 2114.925114] CPU: 1 PID: 10997 Comm: syz-executor.2 Not tainted 6.3.0-rc6-next-20230413 #1 [ 2114.926222] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2114.927224] Call Trace: [ 2114.927557] [ 2114.927855] dump_stack_lvl+0xc1/0xf0 [ 2114.928482] should_fail_ex+0x4b4/0x5b0 [ 2114.928991] should_failslab+0x9/0x20 [ 2114.929499] __kmem_cache_alloc_node+0x5b/0x310 [ 2114.930084] ? alloc_pipe_info+0x10e/0x590 [ 2114.930652] kmalloc_trace+0x26/0xc0 [ 2114.931134] alloc_pipe_info+0x10e/0x590 [ 2114.931689] splice_direct_to_actor+0x6e6/0x8c0 [ 2114.932270] ? __pfx_direct_splice_actor+0x10/0x10 [ 2114.932893] ? inode_security+0x105/0x140 [ 2114.933439] ? selinux_file_permission+0x96/0x510 [ 2114.934044] ? __pfx_splice_direct_to_actor+0x10/0x10 [ 2114.934707] ? security_file_permission+0xb5/0xe0 [ 2114.935355] do_splice_direct+0x1bc/0x290 [ 2114.935899] ? __pfx_do_splice_direct+0x10/0x10 [ 2114.936504] ? lock_is_held_type+0x9f/0x120 [ 2114.937083] do_sendfile+0xb1d/0x12b0 [ 2114.937836] ? __pfx_do_sendfile+0x10/0x10 [ 2114.938742] __x64_sys_sendfile64+0x1d5/0x210 [ 2114.939349] ? __pfx___x64_sys_sendfile64+0x10/0x10 [ 2114.940139] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 2114.940920] do_syscall_64+0x3f/0x90 [ 2114.941542] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2114.942202] RIP: 0033:0x7f0a41a3bb19 [ 2114.942785] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2114.944995] RSP: 002b:00007f0a3efb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2114.946197] RAX: ffffffffffffffda RBX: 00007f0a41b4ef60 RCX: 00007f0a41a3bb19 [ 2114.947314] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2114.948428] RBP: 00007f0a3efb11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2114.949578] R10: 000000010000027f R11: 0000000000000246 R12: 0000000000000001 [ 2114.950689] R13: 00007ffc374c0c7f R14: 00007f0a3efb1300 R15: 0000000000022000 [ 2114.951801] 06:10:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000002800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:10:36 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) (fail_nth: 2) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:10:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000003800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:10:36 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:36 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7a"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:10:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000004800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:10:36 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:36 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:36 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000005800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:10:51 executing program 4: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, 0x0, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:51 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:51 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000006800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:10:51 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:51 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) (fail_nth: 3) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:10:51 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7a"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:10:51 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:10:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000007800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) [ 2130.029714] FAULT_INJECTION: forcing a failure. [ 2130.029714] name failslab, interval 1, probability 0, space 0, times 0 [ 2130.030759] CPU: 0 PID: 11050 Comm: syz-executor.2 Not tainted 6.3.0-rc6-next-20230413 #1 [ 2130.031411] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2130.031985] Call Trace: [ 2130.032175] [ 2130.032348] dump_stack_lvl+0xc1/0xf0 [ 2130.032633] should_fail_ex+0x4b4/0x5b0 [ 2130.032932] should_failslab+0x9/0x20 [ 2130.033220] __kmem_cache_alloc_node+0x5b/0x310 [ 2130.033578] ? alloc_pipe_info+0x1e9/0x590 [ 2130.033896] ? alloc_pipe_info+0x10e/0x590 [ 2130.034215] ? alloc_pipe_info+0x1e9/0x590 [ 2130.034533] __kmalloc+0x4a/0x160 [ 2130.034800] alloc_pipe_info+0x1e9/0x590 [ 2130.035111] splice_direct_to_actor+0x6e6/0x8c0 [ 2130.035462] ? __pfx_direct_splice_actor+0x10/0x10 [ 2130.035818] ? inode_security+0x105/0x140 [ 2130.036173] ? selinux_file_permission+0x96/0x510 [ 2130.036532] ? __pfx_splice_direct_to_actor+0x10/0x10 [ 2130.036907] ? security_file_permission+0xb5/0xe0 [ 2130.037274] do_splice_direct+0x1bc/0x290 [ 2130.037659] ? __pfx_do_splice_direct+0x10/0x10 [ 2130.038013] ? lock_is_held_type+0x9f/0x120 [ 2130.038340] do_sendfile+0xb1d/0x12b0 [ 2130.038624] ? __pfx_do_sendfile+0x10/0x10 [ 2130.038994] ? ksys_write+0x17f/0x260 [ 2130.039340] __x64_sys_sendfile64+0x1d5/0x210 [ 2130.039745] ? __pfx___x64_sys_sendfile64+0x10/0x10 [ 2130.040188] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 2130.040656] do_syscall_64+0x3f/0x90 [ 2130.040989] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2130.041458] RIP: 0033:0x7f0a41a3bb19 [ 2130.041779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2130.043316] RSP: 002b:00007f0a3efb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2130.043952] RAX: ffffffffffffffda RBX: 00007f0a41b4ef60 RCX: 00007f0a41a3bb19 [ 2130.044546] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2130.045137] RBP: 00007f0a3efb11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2130.045735] R10: 000000010000027f R11: 0000000000000246 R12: 0000000000000001 [ 2130.046340] R13: 00007ffc374c0c7f R14: 00007f0a3efb1300 R15: 0000000000022000 [ 2130.046953] 06:10:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000018800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:10:51 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) (fail_nth: 4) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:11:04 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) (fail_nth: 5) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:11:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x0, 0x0, 0x0) (fail_nth: 1) 06:11:04 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:04 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000000200001900001c800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:11:04 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:04 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba404111"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:11:04 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) [ 2143.512711] FAULT_INJECTION: forcing a failure. [ 2143.512711] name failslab, interval 1, probability 0, space 0, times 0 [ 2143.513682] CPU: 1 PID: 11077 Comm: syz-executor.2 Not tainted 6.3.0-rc6-next-20230413 #1 [ 2143.514241] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2143.514809] Call Trace: [ 2143.515004] [ 2143.515169] dump_stack_lvl+0xc1/0xf0 [ 2143.515454] should_fail_ex+0x4b4/0x5b0 [ 2143.515745] should_failslab+0x9/0x20 [ 2143.516022] __kmem_cache_alloc_node+0x5b/0x310 [ 2143.516361] ? direct_splice_read+0x15b/0x990 [ 2143.516694] ? direct_splice_read+0x15b/0x990 [ 2143.517019] __kmalloc+0x4a/0x160 [ 2143.517279] direct_splice_read+0x15b/0x990 [ 2143.517583] ? percpu_ref_put_many.constprop.0+0x4c/0x110 [ 2143.517993] ? lock_is_held_type+0x9f/0x120 [ 2143.518333] ? __pfx_direct_splice_read+0x10/0x10 [ 2143.518682] ? inode_security+0x105/0x140 [ 2143.518995] ? fsnotify_perm.part.0+0x221/0x610 [ 2143.519331] ? security_file_permission+0xb5/0xe0 [ 2143.519705] ? __pfx_direct_splice_read+0x10/0x10 [ 2143.520046] vfs_splice_read+0x1c0/0x240 [ 2143.520355] splice_direct_to_actor+0x2b0/0x8c0 [ 2143.520688] ? __pfx_direct_splice_actor+0x10/0x10 [ 2143.521061] ? __pfx_splice_direct_to_actor+0x10/0x10 [ 2143.521425] ? security_file_permission+0xb5/0xe0 [ 2143.521812] do_splice_direct+0x1bc/0x290 [ 2143.522128] ? __pfx_do_splice_direct+0x10/0x10 [ 2143.522483] ? do_sendfile+0xf25/0x12b0 [ 2143.522797] do_sendfile+0xb1d/0x12b0 [ 2143.523100] ? __pfx_do_sendfile+0x10/0x10 [ 2143.523430] ? __fdget_pos+0x84/0x110 [ 2143.523729] __x64_sys_sendfile64+0x1d5/0x210 [ 2143.524067] ? __pfx___x64_sys_sendfile64+0x10/0x10 [ 2143.524436] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 2143.524849] do_syscall_64+0x3f/0x90 [ 2143.525135] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2143.525532] RIP: 0033:0x7f0a41a3bb19 [ 2143.525830] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2143.526138] FAULT_INJECTION: forcing a failure. [ 2143.526138] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2143.527136] RSP: 002b:00007f0a3efb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2143.527174] RAX: ffffffffffffffda RBX: 00007f0a41b4ef60 RCX: 00007f0a41a3bb19 [ 2143.529799] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2143.530309] RBP: 00007f0a3efb11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2143.530825] R10: 000000010000027f R11: 0000000000000246 R12: 0000000000000001 [ 2143.531342] R13: 00007ffc374c0c7f R14: 00007f0a3efb1300 R15: 0000000000022000 [ 2143.531868] [ 2143.532042] CPU: 0 PID: 11081 Comm: syz-executor.4 Not tainted 6.3.0-rc6-next-20230413 #1 [ 2143.533190] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2143.534377] Call Trace: [ 2143.534849] [ 2143.535175] dump_stack_lvl+0xc1/0xf0 [ 2143.535726] should_fail_ex+0x4b4/0x5b0 [ 2143.536305] _copy_to_user+0x2e/0x150 [ 2143.536869] simple_read_from_buffer+0xd0/0x170 [ 2143.537552] proc_fail_nth_read+0x19c/0x230 [ 2143.538193] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2143.538893] ? security_file_permission+0xb5/0xe0 [ 2143.539595] vfs_read+0x260/0x930 [ 2143.540116] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2143.540805] ? __pfx_vfs_read+0x10/0x10 [ 2143.541401] ? __fget_files+0x270/0x480 [ 2143.542009] ksys_read+0x12b/0x260 [ 2143.542541] ? __pfx_ksys_read+0x10/0x10 [ 2143.543135] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 2143.543896] do_syscall_64+0x3f/0x90 [ 2143.544434] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2143.545165] RIP: 0033:0x7f655648b69c [ 2143.545712] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2143.548162] RSP: 002b:00007f6553a4e170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2143.549215] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f655648b69c [ 2143.550196] RDX: 000000000000000f RSI: 00007f6553a4e1e0 RDI: 0000000000000005 [ 2143.551166] RBP: 00007f6553a4e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2143.552131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2143.553102] R13: 00007ffcbc24a5cf R14: 00007f6553a4e300 R15: 0000000000022000 [ 2143.554105] 06:11:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x0, 0x0, 0x0) 06:11:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000000200001900001d800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:11:05 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) (fail_nth: 6) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:11:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x0, 0x0, 0x0) 06:11:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000066800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:11:05 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:05 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:05 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780), 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0xaaaaaa9, 0x0, 0x0) 06:11:19 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:19 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0xa9aaaa0a, 0x0, 0x0) 06:11:19 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000078800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:11:19 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:19 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780), 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:19 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) (fail_nth: 7) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:11:19 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba404111"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) [ 2157.679187] FAULT_INJECTION: forcing a failure. [ 2157.679187] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2157.680138] CPU: 1 PID: 11127 Comm: syz-executor.2 Not tainted 6.3.0-rc6-next-20230413 #1 [ 2157.680744] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2157.681351] Call Trace: [ 2157.681545] [ 2157.681719] dump_stack_lvl+0xc1/0xf0 [ 2157.682022] should_fail_ex+0x4b4/0x5b0 [ 2157.682324] prepare_alloc_pages+0x178/0x500 [ 2157.682669] __alloc_pages_bulk+0x156/0x10e0 [ 2157.683012] ? __kmem_cache_alloc_node+0x1f8/0x310 [ 2157.683384] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2157.683843] ? mark_held_locks+0x9e/0xe0 [ 2157.684175] ? __pfx___alloc_pages_bulk+0x10/0x10 [ 2157.684569] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 2157.685087] ? kasan_set_track+0x25/0x30 [ 2157.685402] ? __kasan_kmalloc+0x7f/0x90 [ 2157.685713] direct_splice_read+0x190/0x990 [ 2157.686050] ? lock_is_held_type+0x9f/0x120 06:11:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000000020000190000fe800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) [ 2157.686395] ? __pfx_direct_splice_read+0x10/0x10 [ 2157.686860] ? inode_security+0x105/0x140 [ 2157.687174] ? fsnotify_perm.part.0+0x221/0x610 [ 2157.687534] ? security_file_permission+0xb5/0xe0 [ 2157.687910] ? __pfx_direct_splice_read+0x10/0x10 [ 2157.688268] vfs_splice_read+0x1c0/0x240 [ 2157.688572] splice_direct_to_actor+0x2b0/0x8c0 [ 2157.688919] ? __pfx_direct_splice_actor+0x10/0x10 [ 2157.689322] ? __pfx_splice_direct_to_actor+0x10/0x10 [ 2157.689716] ? security_file_permission+0xb5/0xe0 [ 2157.690111] do_splice_direct+0x1bc/0x290 [ 2157.690422] ? __pfx_do_splice_direct+0x10/0x10 [ 2157.690784] ? lock_is_held_type+0x9f/0x120 [ 2157.691122] do_sendfile+0xb1d/0x12b0 [ 2157.691434] ? __pfx_do_sendfile+0x10/0x10 [ 2157.691768] __x64_sys_sendfile64+0x1d5/0x210 [ 2157.692113] ? __pfx___x64_sys_sendfile64+0x10/0x10 [ 2157.692492] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 2157.692903] do_syscall_64+0x3f/0x90 [ 2157.693187] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2157.693571] RIP: 0033:0x7f0a41a3bb19 [ 2157.693861] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2157.695209] RSP: 002b:00007f0a3efb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2157.695769] RAX: ffffffffffffffda RBX: 00007f0a41b4ef60 RCX: 00007f0a41a3bb19 [ 2157.696299] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2157.696820] RBP: 00007f0a3efb11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2157.697352] R10: 000000010000027f R11: 0000000000000246 R12: 0000000000000001 [ 2157.697891] R13: 00007ffc374c0c7f R14: 00007f0a3efb1300 R15: 0000000000022000 [ 2157.698431] 06:11:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000000800200000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:11:19 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) (fail_nth: 8) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) [ 2157.849357] FAULT_INJECTION: forcing a failure. [ 2157.849357] name failslab, interval 1, probability 0, space 0, times 0 [ 2157.850404] CPU: 1 PID: 11140 Comm: syz-executor.2 Not tainted 6.3.0-rc6-next-20230413 #1 [ 2157.850983] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2157.851549] Call Trace: [ 2157.851731] [ 2157.851891] dump_stack_lvl+0xc1/0xf0 [ 2157.852157] should_fail_ex+0x4b4/0x5b0 [ 2157.852447] should_failslab+0x9/0x20 [ 2157.852719] __kmem_cache_alloc_node+0x5b/0x310 [ 2157.853041] ? kvmalloc_node+0xaa/0x200 [ 2157.853311] ? __alloc_pages_bulk+0xa29/0x10e0 [ 2157.853644] ? kvmalloc_node+0xaa/0x200 [ 2157.853927] __kmalloc_node+0x4d/0x160 [ 2157.854202] kvmalloc_node+0xaa/0x200 [ 2157.854481] seq_read_iter+0x820/0x1300 [ 2157.854795] proc_reg_read_iter+0x20e/0x2e0 [ 2157.855099] direct_splice_read+0x3c4/0x990 [ 2157.855409] ? __pfx_direct_splice_read+0x10/0x10 [ 2157.855768] ? inode_security+0x105/0x140 [ 2157.856068] ? security_file_permission+0xb5/0xe0 [ 2157.856412] ? __pfx_direct_splice_read+0x10/0x10 [ 2157.856760] vfs_splice_read+0x1c0/0x240 [ 2157.857047] splice_direct_to_actor+0x2b0/0x8c0 [ 2157.857382] ? __pfx_direct_splice_actor+0x10/0x10 [ 2157.857720] ? __pfx_splice_direct_to_actor+0x10/0x10 [ 2157.858109] ? security_file_permission+0xb5/0xe0 [ 2157.858535] do_splice_direct+0x1bc/0x290 [ 2157.858857] ? __pfx_do_splice_direct+0x10/0x10 [ 2157.859258] ? lock_is_held_type+0x9f/0x120 [ 2157.859639] do_sendfile+0xb1d/0x12b0 [ 2157.859994] ? __pfx_do_sendfile+0x10/0x10 [ 2157.860360] __x64_sys_sendfile64+0x1d5/0x210 [ 2157.860746] ? __pfx___x64_sys_sendfile64+0x10/0x10 [ 2157.861212] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 2157.861681] do_syscall_64+0x3f/0x90 [ 2157.861967] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2157.862342] RIP: 0033:0x7f0a41a3bb19 [ 2157.862609] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2157.863894] RSP: 002b:00007f0a3efb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2157.864499] RAX: ffffffffffffffda RBX: 00007f0a41b4ef60 RCX: 00007f0a41a3bb19 [ 2157.865031] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2157.865623] RBP: 00007f0a3efb11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2157.866254] R10: 000000010000027f R11: 0000000000000246 R12: 0000000000000001 [ 2157.866746] R13: 00007ffc374c0c7f R14: 00007f0a3efb1300 R15: 0000000000022000 [ 2157.867270] 06:11:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000000800300000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:11:19 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:19 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba404111"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:11:19 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780), 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:19 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000000800400000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:11:31 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:31 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0xfcffffff, 0x0, 0x0) 06:11:31 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:31 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800000000000000"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:11:31 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:31 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:31 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) (fail_nth: 9) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:11:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000000800500000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:11:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000000800600000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:11:31 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:31 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800000000000000"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:11:44 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0xfffffffc, 0x0, 0x0) 06:11:44 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800000000000000"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:11:44 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:44 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) (fail_nth: 10) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:11:44 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7a"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000000800700000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:11:44 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) [ 2183.260530] FAULT_INJECTION: forcing a failure. [ 2183.260530] name failslab, interval 1, probability 0, space 0, times 0 [ 2183.261690] CPU: 1 PID: 11211 Comm: syz-executor.2 Not tainted 6.3.0-rc6-next-20230413 #1 [ 2183.262435] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2183.263005] Call Trace: [ 2183.263190] [ 2183.263359] dump_stack_lvl+0xc1/0xf0 [ 2183.263644] should_fail_ex+0x4b4/0x5b0 [ 2183.263935] should_failslab+0x9/0x20 [ 2183.264215] __kmem_cache_alloc_node+0x5b/0x310 [ 2183.264560] ? iter_file_splice_write+0x169/0xcb0 [ 2183.264925] ? iter_file_splice_write+0x169/0xcb0 [ 2183.265283] __kmalloc+0x4a/0x160 [ 2183.265548] iter_file_splice_write+0x169/0xcb0 [ 2183.265890] ? direct_splice_read+0x6ff/0x990 [ 2183.266232] ? __kmem_cache_free+0xd1/0x2f0 [ 2183.266556] ? direct_splice_read+0x704/0x990 [ 2183.266888] ? __pfx_iter_file_splice_write+0x10/0x10 [ 2183.267256] ? __pfx_direct_splice_read+0x10/0x10 [ 2183.267608] ? inode_security+0x105/0x140 [ 2183.267911] ? security_file_permission+0xb5/0xe0 [ 2183.268261] ? __pfx_iter_file_splice_write+0x10/0x10 [ 2183.268624] direct_splice_actor+0x113/0x180 [ 2183.268936] splice_direct_to_actor+0x33a/0x8c0 [ 2183.269268] ? __pfx_direct_splice_actor+0x10/0x10 [ 2183.269618] ? __pfx_splice_direct_to_actor+0x10/0x10 [ 2183.269982] ? security_file_permission+0xb5/0xe0 [ 2183.270347] do_splice_direct+0x1bc/0x290 [ 2183.270659] ? __pfx_do_splice_direct+0x10/0x10 [ 2183.271010] ? lock_is_held_type+0x9f/0x120 [ 2183.271335] do_sendfile+0xb1d/0x12b0 [ 2183.271636] ? __pfx_do_sendfile+0x10/0x10 [ 2183.271946] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 2183.272339] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 2183.272735] __x64_sys_sendfile64+0x1d5/0x210 [ 2183.273068] ? __pfx___x64_sys_sendfile64+0x10/0x10 06:11:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000000800f00000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) [ 2183.273528] ? syscall_enter_from_user_mode+0x21/0x50 [ 2183.273556] ? syscall_enter_from_user_mode+0x2b/0x50 [ 2183.273585] do_syscall_64+0x3f/0x90 [ 2183.273603] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2183.273622] RIP: 0033:0x7f0a41a3bb19 [ 2183.273633] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2183.273649] RSP: 002b:00007f0a3efb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2183.273667] RAX: ffffffffffffffda RBX: 00007f0a41b4ef60 RCX: 00007f0a41a3bb19 [ 2183.273678] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2183.273688] RBP: 00007f0a3efb11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2183.273698] R10: 000000010000027f R11: 0000000000000246 R12: 0000000000000002 [ 2183.273708] R13: 00007ffc374c0c7f R14: 00007f0a3efb1300 R15: 0000000000022000 [ 2183.273731] 06:11:44 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) syslog(0x1, 0x0, 0x0) tee(r4, 0xffffffffffffffff, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000000801b00000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:11:44 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) (fail_nth: 11) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:11:44 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/155], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:11:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000000802700000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:11:44 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7a"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:45 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:45 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) (fail_nth: 12) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) [ 2183.680020] FAULT_INJECTION: forcing a failure. [ 2183.680020] name failslab, interval 1, probability 0, space 0, times 0 [ 2183.681127] CPU: 1 PID: 11238 Comm: syz-executor.2 Not tainted 6.3.0-rc6-next-20230413 #1 [ 2183.681687] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2183.682244] Call Trace: [ 2183.682437] [ 2183.682595] dump_stack_lvl+0xc1/0xf0 [ 2183.682864] should_fail_ex+0x4b4/0x5b0 [ 2183.683149] ? jbd2__journal_start+0x194/0x810 [ 2183.683480] should_failslab+0x9/0x20 [ 2183.683748] kmem_cache_alloc+0x5a/0x390 [ 2183.684039] jbd2__journal_start+0x194/0x810 [ 2183.684366] __ext4_journal_start_sb+0x3d7/0x560 [ 2183.684715] ? ext4_dirty_inode+0xa5/0x130 [ 2183.685001] ? __pfx_ext4_dirty_inode+0x10/0x10 [ 2183.685424] ext4_dirty_inode+0xa5/0x130 [ 2183.685837] __mark_inode_dirty+0x1aa/0xc10 [ 2183.686154] generic_update_time+0x21b/0x2b0 [ 2183.686476] file_modified_flags+0x2d4/0x330 [ 2183.686793] ? __pfx_file_modified_flags+0x10/0x10 [ 2183.687150] ext4_buffered_write_iter+0xf9/0x460 [ 2183.687505] ext4_file_write_iter+0x3ff/0x1950 [ 2183.687847] ? iter_file_splice_write+0x169/0xcb0 [ 2183.688191] ? kasan_save_stack+0x32/0x50 [ 2183.688491] ? kasan_save_stack+0x22/0x50 [ 2183.688792] ? kasan_set_track+0x25/0x30 [ 2183.689088] ? __kasan_kmalloc+0x7f/0x90 [ 2183.689383] ? __kmalloc+0x5a/0x160 [ 2183.689654] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 2183.690016] ? do_splice_direct+0x1bc/0x290 [ 2183.690335] ? do_sendfile+0xb1d/0x12b0 [ 2183.690630] ? __x64_sys_sendfile64+0x1d5/0x210 [ 2183.690961] ? do_syscall_64+0x3f/0x90 [ 2183.691244] ? entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2183.691630] ? lock_is_held_type+0x9f/0x120 [ 2183.691952] do_iter_readv_writev+0x211/0x3c0 [ 2183.692291] ? __pfx_do_iter_readv_writev+0x10/0x10 [ 2183.692653] ? avc_policy_seqno+0x9/0x20 [ 2183.692960] ? security_file_permission+0xb5/0xe0 [ 2183.693316] do_iter_write+0x189/0x7e0 [ 2183.693604] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 2183.693955] ? kasan_set_track+0x25/0x30 [ 2183.694261] vfs_iter_write+0x74/0xb0 [ 2183.694544] iter_file_splice_write+0x73f/0xcb0 [ 2183.694890] ? __pfx_iter_file_splice_write+0x10/0x10 [ 2183.695262] ? __pfx_direct_splice_read+0x10/0x10 [ 2183.695608] ? inode_security+0x105/0x140 [ 2183.695921] ? security_file_permission+0xb5/0xe0 [ 2183.696274] ? __pfx_iter_file_splice_write+0x10/0x10 [ 2183.696645] direct_splice_actor+0x113/0x180 [ 2183.696965] splice_direct_to_actor+0x33a/0x8c0 [ 2183.697313] ? __pfx_direct_splice_actor+0x10/0x10 [ 2183.697666] ? __pfx_splice_direct_to_actor+0x10/0x10 [ 2183.698040] ? security_file_permission+0xb5/0xe0 [ 2183.698404] do_splice_direct+0x1bc/0x290 [ 2183.698710] ? __pfx_do_splice_direct+0x10/0x10 [ 2183.699051] ? lock_is_held_type+0x9f/0x120 [ 2183.699373] do_sendfile+0xb1d/0x12b0 [ 2183.699664] ? __pfx_do_sendfile+0x10/0x10 [ 2183.699984] __x64_sys_sendfile64+0x1d5/0x210 [ 2183.700319] ? __pfx___x64_sys_sendfile64+0x10/0x10 [ 2183.700685] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 2183.701074] do_syscall_64+0x3f/0x90 [ 2183.701344] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2183.701708] RIP: 0033:0x7f0a41a3bb19 [ 2183.701978] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2183.703254] RSP: 002b:00007f0a3efb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2183.703784] RAX: ffffffffffffffda RBX: 00007f0a41b4ef60 RCX: 00007f0a41a3bb19 [ 2183.704286] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2183.704782] RBP: 00007f0a3efb11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2183.705279] R10: 000000010000027f R11: 0000000000000246 R12: 0000000000000002 [ 2183.705777] R13: 00007ffc374c0c7f R14: 00007f0a3efb1300 R15: 0000000000022000 [ 2183.706300] 06:11:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x0, 0x0, 0xaaaaaa9) 06:11:56 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:56 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) syslog(0x1, 0x0, 0x0) tee(r4, 0xffffffffffffffff, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:56 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) (fail_nth: 13) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:11:56 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000000200001900000080fe00000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:11:56 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/155], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:11:56 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7a"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:11:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000000800003000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:11:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x0, 0x0, 0xa9aaaa0a) 06:12:11 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/155], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:12:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000000200001900000080feff000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:12:11 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) syslog(0x1, 0x0, 0x0) tee(r4, 0xffffffffffffffff, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:12:11 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba404111"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:12:11 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7a"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:12:11 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={0x0, 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:12:11 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r2, r3, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) (fail_nth: 14) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235f"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) 06:12:11 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x0, 0x0, 0xfcffffff) 06:12:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000000800102000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) [ 2209.819287] FAULT_INJECTION: forcing a failure. [ 2209.819287] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2209.821030] CPU: 0 PID: 11295 Comm: syz-executor.2 Not tainted 6.3.0-rc6-next-20230413 #1 [ 2209.822021] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2209.823027] Call Trace: [ 2209.823354] [ 2209.823647] dump_stack_lvl+0xc1/0xf0 [ 2209.824141] should_fail_ex+0x4b4/0x5b0 [ 2209.824658] prepare_alloc_pages+0x178/0x500 [ 2209.825222] __alloc_pages+0x149/0x480 [ 2209.825729] ? lock_acquire+0x19a/0x4c0 [ 2209.826228] ? __pfx___alloc_pages+0x10/0x10 [ 2209.826808] ? lock_release+0x1e3/0x680 [ 2209.827315] ? xas_start+0x14e/0x710 [ 2209.827800] alloc_pages+0x1a0/0x260 [ 2209.828287] filemap_alloc_folio+0x374/0x410 [ 2209.828878] ? __pfx_filemap_alloc_folio+0x10/0x10 [ 2209.829518] ? __mark_inode_dirty+0x625/0xc10 [ 2209.830102] ? reacquire_held_locks+0x22b/0x4e0 [ 2209.830864] ? __mark_inode_dirty+0x625/0xc10 [ 2209.831471] __filemap_get_folio+0x285/0x8d0 [ 2209.832049] ? find_held_lock+0x2c/0x110 [ 2209.832594] ext4_da_write_begin+0x374/0x830 [ 2209.833169] ? __pfx_ext4_da_write_begin+0x10/0x10 [ 2209.833803] ? do_raw_spin_unlock+0x53/0x220 [ 2209.834387] generic_perform_write+0x25a/0x580 [ 2209.835045] ? __pfx_generic_perform_write+0x10/0x10 [ 2209.835727] ? __pfx_file_modified_flags+0x10/0x10 [ 2209.836367] ext4_buffered_write_iter+0x164/0x460 [ 2209.836999] ? stack_trace_save+0x90/0xd0 [ 2209.837528] ext4_file_write_iter+0x3ff/0x1950 [ 2209.838136] ? iter_file_splice_write+0x169/0xcb0 [ 2209.838761] ? kasan_save_stack+0x32/0x50 [ 2209.839299] ? kasan_save_stack+0x22/0x50 [ 2209.839831] ? kasan_set_track+0x25/0x30 [ 2209.840353] ? __kasan_kmalloc+0x7f/0x90 [ 2209.840882] ? __kmalloc+0x5a/0x160 [ 2209.841344] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 2209.841996] ? do_splice_direct+0x1bc/0x290 [ 2209.842565] ? do_sendfile+0xb1d/0x12b0 [ 2209.843095] ? __x64_sys_sendfile64+0x1d5/0x210 [ 2209.843690] ? do_syscall_64+0x3f/0x90 [ 2209.844197] ? entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2209.844870] ? lock_is_held_type+0x9f/0x120 [ 2209.845449] do_iter_readv_writev+0x211/0x3c0 [ 2209.846038] ? __pfx_do_iter_readv_writev+0x10/0x10 [ 2209.846697] ? avc_policy_seqno+0x9/0x20 [ 2209.847245] ? security_file_permission+0xb5/0xe0 [ 2209.847882] do_iter_write+0x189/0x7e0 [ 2209.848401] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 2209.849027] ? kasan_set_track+0x25/0x30 [ 2209.849560] vfs_iter_write+0x74/0xb0 [ 2209.850066] iter_file_splice_write+0x73f/0xcb0 [ 2209.850691] ? __pfx_iter_file_splice_write+0x10/0x10 [ 2209.851353] ? __pfx_direct_splice_read+0x10/0x10 [ 2209.851975] ? inode_security+0x105/0x140 [ 2209.852523] ? security_file_permission+0xb5/0xe0 [ 2209.853143] ? __pfx_iter_file_splice_write+0x10/0x10 [ 2209.853806] direct_splice_actor+0x113/0x180 [ 2209.854378] splice_direct_to_actor+0x33a/0x8c0 [ 2209.854997] ? __pfx_direct_splice_actor+0x10/0x10 [ 2209.855632] ? __pfx_splice_direct_to_actor+0x10/0x10 [ 2209.856283] ? security_file_permission+0xb5/0xe0 [ 2209.856918] do_splice_direct+0x1bc/0x290 [ 2209.857451] ? __pfx_do_splice_direct+0x10/0x10 [ 2209.858062] ? lock_is_held_type+0x9f/0x120 [ 2209.858635] do_sendfile+0xb1d/0x12b0 [ 2209.859154] ? __pfx_do_sendfile+0x10/0x10 [ 2209.859722] __x64_sys_sendfile64+0x1d5/0x210 [ 2209.860295] ? __pfx___x64_sys_sendfile64+0x10/0x10 [ 2209.860923] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 2209.861611] do_syscall_64+0x3f/0x90 [ 2209.862091] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2209.862748] RIP: 0033:0x7f0a41a3bb19 [ 2209.863221] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2209.865406] RSP: 002b:00007f0a3efb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2209.866361] RAX: ffffffffffffffda RBX: 00007f0a41b4ef60 RCX: 00007f0a41a3bb19 [ 2209.867251] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2209.868116] RBP: 00007f0a3efb11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2209.869000] R10: 000000010000027f R11: 0000000000000246 R12: 0000000000000002 [ 2209.869867] R13: 00007ffc374c0c7f R14: 00007f0a3efb1300 R15: 0000000000022000 [ 2209.870774] [ 2209.871822] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN NOPTI [ 2209.873254] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] [ 2209.874178] CPU: 0 PID: 11295 Comm: syz-executor.2 Not tainted 6.3.0-rc6-next-20230413 #1 [ 2209.875170] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2209.876176] RIP: 0010:folio_wait_stable+0x23/0xe0 [ 2209.876775] Code: 90 90 90 90 90 90 90 f3 0f 1e fa 55 48 89 fd 53 e8 62 58 e7 ff 48 8d 7d 18 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 a4 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b [ 2209.878967] RSP: 0018:ffff888045717488 EFLAGS: 00010213 [ 2209.879629] RAX: dffffc0000000000 RBX: ffff88801b29d1f0 RCX: ffffc90001df6000 [ 2209.880493] RDX: 0000000000000001 RSI: ffffffff81646e3e RDI: 000000000000000c [ 2209.881347] RBP: fffffffffffffff4 R08: 0000000000000001 R09: ffffffff856c1213 06:12:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000000800103000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) [ 2209.882216] R10: fffffbfff0ad8242 R11: 0000000000000001 R12: 0000000000000000 [ 2209.887361] R13: ffff88801b29d418 R14: 0000000000000000 R15: 0000000000000000 [ 2209.888224] FS: 00007f0a3efb1700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 2209.889196] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2209.889914] CR2: 00007f0a3efb0f78 CR3: 000000004515a000 CR4: 0000000000350ef0 [ 2209.890797] Call Trace: [ 2209.891119] [ 2209.891409] ext4_da_write_begin+0x38d/0x830 [ 2209.891977] ? __pfx_ext4_da_write_begin+0x10/0x10 [ 2209.892592] ? do_raw_spin_unlock+0x53/0x220 [ 2209.893159] generic_perform_write+0x25a/0x580 [ 2209.893753] ? __pfx_generic_perform_write+0x10/0x10 [ 2209.894402] ? __pfx_file_modified_flags+0x10/0x10 [ 2209.895052] ext4_buffered_write_iter+0x164/0x460 [ 2209.895677] ? stack_trace_save+0x90/0xd0 [ 2209.896209] ext4_file_write_iter+0x3ff/0x1950 [ 2209.896801] ? iter_file_splice_write+0x169/0xcb0 [ 2209.897409] ? kasan_save_stack+0x32/0x50 [ 2209.897932] ? kasan_save_stack+0x22/0x50 [ 2209.898465] ? kasan_set_track+0x25/0x30 [ 2209.898984] ? __kasan_kmalloc+0x7f/0x90 [ 2209.899501] ? __kmalloc+0x5a/0x160 [ 2209.899961] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 2209.900602] ? do_splice_direct+0x1bc/0x290 [ 2209.901141] ? do_sendfile+0xb1d/0x12b0 [ 2209.901649] ? __x64_sys_sendfile64+0x1d5/0x210 [ 2209.902232] ? do_syscall_64+0x3f/0x90 [ 2209.902742] ? entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2209.903397] ? lock_is_held_type+0x9f/0x120 [ 2209.903955] do_iter_readv_writev+0x211/0x3c0 [ 2209.904526] ? __pfx_do_iter_readv_writev+0x10/0x10 [ 2209.905156] ? avc_policy_seqno+0x9/0x20 [ 2209.905683] ? security_file_permission+0xb5/0xe0 [ 2209.906300] do_iter_write+0x189/0x7e0 [ 2209.906814] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 2209.907430] ? kasan_set_track+0x25/0x30 [ 2209.907956] vfs_iter_write+0x74/0xb0 [ 2209.908452] iter_file_splice_write+0x73f/0xcb0 [ 2209.909044] ? __pfx_iter_file_splice_write+0x10/0x10 [ 2209.909682] ? __pfx_direct_splice_read+0x10/0x10 [ 2209.910290] ? inode_security+0x105/0x140 [ 2209.910827] ? security_file_permission+0xb5/0xe0 [ 2209.911442] ? __pfx_iter_file_splice_write+0x10/0x10 [ 2209.912072] direct_splice_actor+0x113/0x180 [ 2209.912623] splice_direct_to_actor+0x33a/0x8c0 [ 2209.913207] ? __pfx_direct_splice_actor+0x10/0x10 [ 2209.913823] ? __pfx_splice_direct_to_actor+0x10/0x10 [ 2209.914456] ? security_file_permission+0xb5/0xe0 [ 2209.915076] do_splice_direct+0x1bc/0x290 [ 2209.915595] ? __pfx_do_splice_direct+0x10/0x10 [ 2209.916183] ? lock_is_held_type+0x9f/0x120 [ 2209.916742] do_sendfile+0xb1d/0x12b0 [ 2209.917235] ? __pfx_do_sendfile+0x10/0x10 [ 2209.917781] __x64_sys_sendfile64+0x1d5/0x210 [ 2209.918349] ? __pfx___x64_sys_sendfile64+0x10/0x10 [ 2209.918979] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 2209.919652] do_syscall_64+0x3f/0x90 [ 2209.920131] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2209.920765] RIP: 0033:0x7f0a41a3bb19 [ 2209.921225] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2209.923398] RSP: 002b:00007f0a3efb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2209.924309] RAX: ffffffffffffffda RBX: 00007f0a41b4ef60 RCX: 00007f0a41a3bb19 [ 2209.925181] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2209.926047] RBP: 00007f0a3efb11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2209.926920] R10: 000000010000027f R11: 0000000000000246 R12: 0000000000000002 [ 2209.927770] R13: 00007ffc374c0c7f R14: 00007f0a3efb1300 R15: 0000000000022000 [ 2209.928633] [ 2209.928931] Modules linked in: [ 2209.929592] ---[ end trace 0000000000000000 ]--- [ 2209.930381] RIP: 0010:folio_wait_stable+0x23/0xe0 [ 2209.931425] Code: 90 90 90 90 90 90 90 f3 0f 1e fa 55 48 89 fd 53 e8 62 58 e7 ff 48 8d 7d 18 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 a4 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b [ 2209.934241] RSP: 0018:ffff888045717488 EFLAGS: 00010213 [ 2209.935202] RAX: dffffc0000000000 RBX: ffff88801b29d1f0 RCX: ffffc90001df6000 [ 2209.936353] RDX: 0000000000000001 RSI: ffffffff81646e3e RDI: 000000000000000c [ 2209.937693] RBP: fffffffffffffff4 R08: 0000000000000001 R09: ffffffff856c1213 [ 2209.938856] R10: fffffbfff0ad8242 R11: 0000000000000001 R12: 0000000000000000 [ 2209.939994] R13: ffff88801b29d418 R14: 0000000000000000 R15: 0000000000000000 [ 2209.941256] FS: 00007f0a3efb1700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 2209.942707] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2209.943834] CR2: 00007f0a3efb0f78 CR3: 000000004515a000 CR4: 0000000000350ef0 06:12:11 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x0, 0x0, 0xfffffffc) 06:12:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000000800104000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:12:11 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x0, 0x0, 0xa9aaaa0a00000000) 06:12:11 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x0, 0x0, 0xfcffffff00000000) 06:12:11 executing program 1: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) syslog(0x1, 0x0, 0x0) tee(r3, 0xffffffffffffffff, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/160], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:12:11 executing program 7: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7a"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:12:11 executing program 6: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80), 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r4, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba404111"], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r4, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:12:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="200000000002000019000000800105000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="3bba28e5ab0672c2d4d03aa4db11cf8256aca53470c36983673506d90730f526d05f2363ffd78805ad3721f03d5ac1ef334727b992dd4ac0b28558c3050ecab30731e6bc06579985c6485d10ced284e9e26f7afdbe5d1200a00a03f3b57a6ec6d7707e1784bc773eb9b28ed358bd81c212267f3f4fa1ab01", 0x78, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}], 0x0, &(0x7f00000005c0)=ANY=[]) 06:12:11 executing program 5: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0xfef, 0x7e33ea83) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r4, r5, 0x81, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r6, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r6, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a8bd7000fddbdf25b3a04e3520f85a66d712e19eb46c47b01a4eb50566a7416954a2db0700000000000000696cfbc08779b713ee94fec57499e3680e4a1c7773958a44d4628dda5877ed6130778e235ff095b6f8ba8933642413a87cb7db63305060fdc735181b1bee72723807c477ece577bf8df129af7ab1d81429d2e989f8f750b914ff70bd07ba40411189de4800"/158], 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r6, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x1, 0x3, 0x0, 0x5, 0x0, 0x315, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8d90, 0x1, @perf_bp={0x0, 0x1}, 0x10, 0x9, 0x269387ea, 0x5, 0x1340, 0x7, 0x2c5}, 0xffffffffffffffff, 0xe, r1, 0x8) 06:12:11 executing program 3: syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x40000) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/179, 0xb3}], 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x80402, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syslog(0x1, 0x0, 0x0) tee(r3, r4, 0x81, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r5, 0x2, 0x0) sendmsg$AUDIT_USER_TTY(r5, &(0x7f0000000400)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={0x0, 0xa8}, 0x1, 0x0, 0x0, 0x90}, 0x0) openat(r5, &(0x7f0000000100)='./file1\x00', 0x40, 0x8) 06:12:11 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) epoll_pwait(r1, &(0x7f0000000200)=[{}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r0, 0x7, 0x7eb8, 0x7ff}) epoll_pwait(r2, &(0x7f0000000040)=[{}], 0x1, 0x7, &(0x7f0000000100)={[0x7]}, 0x8) [ 2210.615801] ================================================================== [ 2210.616676] BUG: KASAN: slab-use-after-free in rwsem_down_write_slowpath+0x13a6/0x14a0 [ 2210.617593] Read of size 4 at addr ffff888019e1b5b4 by task syz-executor.2/276 [ 2210.618434] [ 2210.618665] CPU: 0 PID: 276 Comm: syz-executor.2 Tainted: G D 6.3.0-rc6-next-20230413 #1 [ 2210.619749] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2210.620689] Call Trace: [ 2210.621001] [ 2210.621277] dump_stack_lvl+0x91/0xf0 [ 2210.621738] print_report+0xcc/0x620 [ 2210.622195] ? __virt_addr_valid+0x102/0x340 [ 2210.622734] ? rwsem_down_write_slowpath+0x13a6/0x14a0 [ 2210.623344] kasan_report+0xc0/0xf0 [ 2210.623783] ? rwsem_down_write_slowpath+0x13a6/0x14a0 [ 2210.624407] rwsem_down_write_slowpath+0x13a6/0x14a0 [ 2210.625022] ? avc_has_perm_noaudit+0x148/0x3a0 [ 2210.625590] ? selinux_inode_permission+0x3de/0x5e0 [ 2210.626167] ? __pfx_rwsem_down_write_slowpath+0x10/0x10 [ 2210.626798] ? lock_acquire+0x434/0x4c0 [ 2210.627260] ? __pfx_lock_acquire+0x10/0x10 [ 2210.627762] ? make_vfsgid+0x113/0x170 [ 2210.628229] ? make_vfsgid+0x113/0x170 [ 2210.628696] ? __pfx_make_vfsgid+0x10/0x10 [ 2210.629202] down_write+0x1c3/0x1f0 [ 2210.629635] ? __pfx_down_write+0x10/0x10 [ 2210.630111] ? may_delete+0x388/0x910 [ 2210.630583] vfs_unlink+0xd9/0x930 [ 2210.631015] ? __lookup_hash+0x36/0x190 [ 2210.631481] do_unlinkat+0x3b9/0x650 [ 2210.631932] ? __pfx_do_unlinkat+0x10/0x10 [ 2210.632429] ? __check_object_size+0x3d4/0x8c0 [ 2210.632983] ? getname_flags.part.0+0x1dd/0x4f0 [ 2210.633529] __x64_sys_unlink+0xca/0x110 [ 2210.634013] do_syscall_64+0x3f/0x90 [ 2210.634451] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2210.635047] RIP: 0033:0x7f0a41a3b457 [ 2210.635483] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2210.637485] RSP: 002b:00007ffc374bfdc8 EFLAGS: 00000206 ORIG_RAX: 0000000000000057 [ 2210.638329] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0a41a3b457 [ 2210.639138] RDX: 00007ffc374bfe00 RSI: 00007ffc374bfe00 RDI: 00007ffc374bfe90 [ 2210.639936] RBP: 00007ffc374bfe90 R08: 0000000000000001 R09: 00007ffc374bfc60 [ 2210.640727] R10: 0000555556708d13 R11: 0000000000000206 R12: 00007f0a41a95105 [ 2210.641515] R13: 00007ffc374c0f50 R14: 0000555556708c20 R15: 00007ffc374c0f90 [ 2210.642315] [ 2210.642594] [ 2210.642794] Allocated by task 11289: [ 2210.643219] kasan_save_stack+0x22/0x50 [ 2210.643684] kasan_set_track+0x25/0x30 [ 2210.644136] __kasan_slab_alloc+0x59/0x70 [ 2210.644619] kmem_cache_alloc_node+0x189/0x3a0 [ 2210.645143] copy_process+0x3c2/0x7330 [ 2210.645594] kernel_clone+0xeb/0x7d0 [ 2210.646029] __do_sys_clone+0xba/0x100 [ 2210.646478] do_syscall_64+0x3f/0x90 [ 2210.646934] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2210.647526] [ 2210.647738] Freed by task 11289: [ 2210.648120] kasan_save_stack+0x22/0x50 [ 2210.648589] kasan_set_track+0x25/0x30 [ 2210.649044] kasan_save_free_info+0x2e/0x50 [ 2210.649561] __kasan_slab_free+0x10a/0x190 [ 2210.650059] kmem_cache_free+0xff/0x4a0 [ 2210.650520] _free_event+0xab4/0x1150 [ 2210.650983] perf_event_release_kernel+0x5b8/0x7a0 [ 2210.651720] perf_release+0x37/0x50 [ 2210.652142] __fput+0x263/0xa40 [ 2210.652536] task_work_run+0x174/0x280 [ 2210.653000] exit_to_user_mode_prepare+0x17d/0x180 [ 2210.653585] syscall_exit_to_user_mode+0x1d/0x50 [ 2210.654145] do_syscall_64+0x4c/0x90 [ 2210.654590] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2210.655176] [ 2210.655380] Last potentially related work creation: [ 2210.655936] kasan_save_stack+0x22/0x50 [ 2210.656398] __kasan_record_aux_stack+0x95/0xb0 [ 2210.656952] __call_rcu_common.constprop.0+0x6a/0xb90 [ 2210.657554] put_task_struct_rcu_user+0x87/0xd0 [ 2210.658094] __schedule+0x995/0x2a00 [ 2210.658535] schedule+0xdb/0x1a0 [ 2210.658959] do_nanosleep+0x154/0x510 [ 2210.659407] hrtimer_nanosleep+0x208/0x590 [ 2210.659893] common_nsleep+0xaa/0xd0 [ 2210.660332] __x64_sys_clock_nanosleep+0x335/0x480 [ 2210.660892] do_syscall_64+0x3f/0x90 [ 2210.661323] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2210.661900] [ 2210.662098] Second to last potentially related work creation: [ 2210.662743] kasan_save_stack+0x22/0x50 [ 2210.663198] __kasan_record_aux_stack+0x95/0xb0 [ 2210.663745] __call_rcu_common.constprop.0+0x6a/0xb90 [ 2210.664332] put_task_struct_rcu_user+0x87/0xd0 [ 2210.664863] __schedule+0x995/0x2a00 [ 2210.665300] schedule+0xdb/0x1a0 [ 2210.665704] futex_wait_queue+0xf9/0x1f0 [ 2210.666166] futex_wait+0x292/0x690 [ 2210.666599] do_futex+0x303/0x380 [ 2210.667020] __x64_sys_futex+0x1ca/0x4d0 [ 2210.667505] do_syscall_64+0x3f/0x90 [ 2210.667933] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2210.668509] [ 2210.668715] The buggy address belongs to the object at ffff888019e1b580 [ 2210.668715] which belongs to the cache task_struct of size 6592 [ 2210.670068] The buggy address is located 52 bytes inside of [ 2210.670068] freed 6592-byte region [ffff888019e1b580, ffff888019e1cf40) [ 2210.671385] [ 2210.671585] The buggy address belongs to the physical page: [ 2210.672192] page:00000000d38f76e4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x19e18 [ 2210.673207] head:00000000d38f76e4 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 2210.674080] memcg:ffff88800e2bac41 [ 2210.674473] flags: 0x100000000010200(slab|head|node=0|zone=1) [ 2210.675136] page_type: 0xffffffff() [ 2210.675569] raw: 0100000000010200 ffff888008792640 ffffea000113a600 dead000000000002 [ 2210.676429] raw: 0000000000000000 0000000000040004 00000001ffffffff ffff88800e2bac41 [ 2210.677273] page dumped because: kasan: bad access detected [ 2210.677887] [ 2210.678088] Memory state around the buggy address: [ 2210.678633] ffff888019e1b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2210.679422] ffff888019e1b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2210.680209] >ffff888019e1b580: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2210.680991] ^ [ 2210.681531] ffff888019e1b600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2210.682328] ffff888019e1b680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2210.683129] ================================================================== [ 2219.700735] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) VM DIAGNOSIS: 06:12:11 Registers: info registers vcpu 0 RAX=0000000000000034 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff824fc9e5 RDI=ffffffff87f16c00 RBP=ffffffff87f16bc0 RSP=ffff888045716e78 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000034 R11=0000000000000001 R12=0000000000000034 R13=ffffffff87f16bc0 R14=0000000000000010 R15=ffffffff824fc9d0 RIP=ffffffff824fca3d RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f0a3efb1700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f0a3efb0f78 CR3=000000004515a000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffed1002c2cf58 RBX=0000000000000008 RCX=dffffc0000000000 RDX=0000000000000004 RSI=ffffffff8443db11 RDI=ffff888016167abc RBP=ffff888016167ce8 RSP=ffff888016167a00 R8 =0000000000000006 R9 =00007f0a3ef90fff R10=00007f0a3ef91fff R11=0000000000000001 R12=ffff888016167a98 R13=0000000000000009 R14=ffff88800f24921c R15=ffff888016167d21 RIP=ffffffff814bc6a0 RFL=00000282 [--S----] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555556707400 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f0a41ac2b89 CR3=000000004515a000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000001010100000000 XMM02=7463656a6e695f31313230385f7a7973 XMM03=00007f0a41b227c800007f0a41b227c0 XMM04=ffffffffffffffffffffffff00000000 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000